IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206k
unknown
http://185.215.113.206/6c4adf523b719729.php/
unknown
http://185.215.113.206/6c4adf523b719729.phpz
unknown
http://185.215.113.206/j
unknown
http://185.215.113.206/6c4adf523b719729.php6
unknown
http://185.215.113.206/6c4adf523b719729.phpv
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
F31000
unkown
page execute and read and write
malicious
4CD0000
direct allocation
page read and write
malicious
96E000
heap
page read and write
malicious
4851000
heap
page read and write
4E30000
direct allocation
page execute and read and write
1D16D000
stack
page read and write
864000
heap
page read and write
864000
heap
page read and write
B5F000
stack
page read and write
1079000
unkown
page execute and read and write
4851000
heap
page read and write
36CF000
stack
page read and write
4870000
heap
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
950000
direct allocation
page read and write
470F000
stack
page read and write
85E000
stack
page read and write
864000
heap
page read and write
864000
heap
page read and write
9C8000
heap
page read and write
4851000
heap
page read and write
370E000
stack
page read and write
4850000
heap
page read and write
1D1AD000
stack
page read and write
109E000
unkown
page execute and read and write
370000
heap
page read and write
434F000
stack
page read and write
3E4F000
stack
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
14BE000
unkown
page execute and read and write
4851000
heap
page read and write
4851000
heap
page read and write
40CF000
stack
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
F31000
unkown
page execute and write copy
3F8E000
stack
page read and write
864000
heap
page read and write
4851000
heap
page read and write
864000
heap
page read and write
106D000
unkown
page execute and read and write
4851000
heap
page read and write
4CB0000
heap
page read and write
1D2AC000
stack
page read and write
9F5000
heap
page read and write
3EE000
stack
page read and write
3BCF000
stack
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
420F000
stack
page read and write
4E0F000
stack
page read and write
864000
heap
page read and write
864000
heap
page read and write
1CDDE000
stack
page read and write
14AF000
unkown
page execute and read and write
4D0E000
stack
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
6FE000
stack
page read and write
484F000
stack
page read and write
4851000
heap
page read and write
9B3000
heap
page read and write
14A8000
unkown
page execute and read and write
4851000
heap
page read and write
864000
heap
page read and write
864000
heap
page read and write
4E80000
direct allocation
page execute and read and write
1660000
unkown
page execute and write copy
950000
direct allocation
page read and write
344F000
stack
page read and write
6F5000
stack
page read and write
4851000
heap
page read and write
950000
direct allocation
page read and write
4851000
heap
page read and write
121A000
unkown
page execute and read and write
4E40000
direct allocation
page execute and read and write
950000
direct allocation
page read and write
4851000
heap
page read and write
1CD9F000
stack
page read and write
4851000
heap
page read and write
9FA000
heap
page read and write
864000
heap
page read and write
950000
direct allocation
page read and write
8AC000
stack
page read and write
3FCE000
stack
page read and write
4E70000
direct allocation
page execute and read and write
3D4E000
stack
page read and write
864000
heap
page read and write
3A8F000
stack
page read and write
950000
direct allocation
page read and write
864000
heap
page read and write
4E20000
direct allocation
page execute and read and write
864000
heap
page read and write
4851000
heap
page read and write
2F0F000
stack
page read and write
864000
heap
page read and write
448F000
stack
page read and write
4851000
heap
page read and write
EDE000
stack
page read and write
950000
direct allocation
page read and write
4CFB000
direct allocation
page read and write
2E0F000
stack
page read and write
1CC9E000
stack
page read and write
9E0000
heap
page read and write
864000
heap
page read and write
94B000
heap
page read and write
3C0E000
stack
page read and write
864000
heap
page read and write
424E000
stack
page read and write
4851000
heap
page read and write
950000
direct allocation
page read and write
C5E000
stack
page read and write
4851000
heap
page read and write
330F000
stack
page read and write
8EE000
stack
page read and write
4851000
heap
page read and write
460E000
stack
page read and write
1D01F000
stack
page read and write
398E000
stack
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
410E000
stack
page read and write
860000
heap
page read and write
4851000
heap
page read and write
864000
heap
page read and write
9D8000
heap
page read and write
474E000
stack
page read and write
2D0F000
stack
page read and write
864000
heap
page read and write
4851000
heap
page read and write
348E000
stack
page read and write
950000
direct allocation
page read and write
864000
heap
page read and write
300F000
stack
page read and write
950000
direct allocation
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
950000
direct allocation
page read and write
864000
heap
page read and write
4851000
heap
page read and write
4CD0000
direct allocation
page read and write
950000
direct allocation
page read and write
864000
heap
page read and write
960000
heap
page read and write
4851000
heap
page read and write
3ACE000
stack
page read and write
310F000
stack
page read and write
165F000
unkown
page execute and read and write
4851000
heap
page read and write
394F000
stack
page read and write
358F000
stack
page read and write
3D0F000
stack
page read and write
4950000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
4851000
heap
page read and write
4E60000
direct allocation
page execute and read and write
4CD0000
direct allocation
page read and write
950000
direct allocation
page read and write
864000
heap
page read and write
45CF000
stack
page read and write
4851000
heap
page read and write
380000
heap
page read and write
864000
heap
page read and write
4851000
heap
page read and write
F30000
unkown
page readonly
1483000
unkown
page execute and read and write
930000
heap
page read and write
4851000
heap
page read and write
1CF1E000
stack
page read and write
384E000
stack
page read and write
3E8E000
stack
page read and write
9D5000
heap
page read and write
1206000
unkown
page execute and read and write
4851000
heap
page read and write
864000
heap
page read and write
96A000
heap
page read and write
864000
heap
page read and write
92E000
stack
page read and write
4851000
heap
page read and write
864000
heap
page read and write
380F000
stack
page read and write
4851000
heap
page read and write
864000
heap
page read and write
334E000
stack
page read and write
14BE000
unkown
page execute and write copy
4851000
heap
page read and write
4851000
heap
page read and write
F5C000
unkown
page execute and read and write
E9E000
stack
page read and write
F1E000
stack
page read and write
F30000
unkown
page read and write
864000
heap
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
4E50000
direct allocation
page execute and read and write
4851000
heap
page read and write
950000
direct allocation
page read and write
1CC5F000
stack
page read and write
1CEDE000
stack
page read and write
864000
heap
page read and write
1CB5E000
stack
page read and write
864000
heap
page read and write
940000
heap
page read and write
4851000
heap
page read and write
9AF000
heap
page read and write
864000
heap
page read and write
947000
heap
page read and write
438E000
stack
page read and write
4858000
heap
page read and write
9FC000
heap
page read and write
4851000
heap
page read and write
14BF000
unkown
page execute and write copy
31C000
stack
page read and write
44CE000
stack
page read and write
864000
heap
page read and write
1D06D000
stack
page read and write
320F000
stack
page read and write
80E000
stack
page read and write
4851000
heap
page read and write
4860000
heap
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
4E50000
direct allocation
page execute and read and write
4851000
heap
page read and write
13A8000
unkown
page execute and read and write
4851000
heap
page read and write
864000
heap
page read and write
35CE000
stack
page read and write
864000
heap
page read and write
864000
heap
page read and write
864000
heap
page read and write
There are 227 hidden memdumps, click here to show them.