IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.php/s
unknown
http://185.215.113.206/6c4adf523b719729.php/
unknown
http://185.215.113.206/J
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/6c4adf523b719729.phpEs
unknown
http://185.215.113.206/6c4adf523b719729.php%
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
F1E000
heap
page read and write
malicious
4DB0000
direct allocation
page read and write
malicious
361000
unkown
page execute and read and write
malicious
4931000
heap
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
32AF000
stack
page read and write
49D000
unkown
page execute and read and write
4931000
heap
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
492F000
stack
page read and write
392E000
stack
page read and write
1090000
direct allocation
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
4940000
heap
page read and write
2BD0000
direct allocation
page execute and read and write
10C4000
heap
page read and write
F1A000
heap
page read and write
4931000
heap
page read and write
10B0000
direct allocation
page read and write
1090000
direct allocation
page read and write
BDE000
stack
page read and write
2BEB000
heap
page read and write
EFE000
stack
page read and write
F9F000
heap
page read and write
10C4000
heap
page read and write
3BAE000
stack
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
B60000
heap
page read and write
47EF000
stack
page read and write
4931000
heap
page read and write
1090000
direct allocation
page read and write
10C4000
heap
page read and write
4931000
heap
page read and write
10C4000
heap
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
360000
unkown
page readonly
10C4000
heap
page read and write
10C4000
heap
page read and write
1CD0F000
stack
page read and write
4931000
heap
page read and write
3F2F000
stack
page read and write
4F00000
direct allocation
page execute and read and write
4931000
heap
page read and write
4931000
heap
page read and write
10C4000
heap
page read and write
1090000
direct allocation
page read and write
3CEE000
stack
page read and write
4931000
heap
page read and write
1090000
direct allocation
page read and write
10C4000
heap
page read and write
3B6F000
stack
page read and write
3A2F000
stack
page read and write
A7A000
unkown
page execute and read and write
316F000
stack
page read and write
4931000
heap
page read and write
10C4000
heap
page read and write
8E3000
unkown
page execute and write copy
10C4000
heap
page read and write
4931000
heap
page read and write
F00000
heap
page read and write
4A30000
trusted library allocation
page read and write
3DEF000
stack
page read and write
7CE000
unkown
page execute and read and write
10C4000
heap
page read and write
10C4000
heap
page read and write
4931000
heap
page read and write
10C4000
heap
page read and write
4F10000
direct allocation
page execute and read and write
108E000
stack
page read and write
64A000
unkown
page execute and read and write
10C4000
heap
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
4CE000
unkown
page execute and read and write
1D21C000
stack
page read and write
33EF000
stack
page read and write
37EE000
stack
page read and write
36AE000
stack
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
456F000
stack
page read and write
10C4000
heap
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
446E000
stack
page read and write
8CA000
unkown
page execute and read and write
4931000
heap
page read and write
360000
unkown
page read and write
10C0000
heap
page read and write
302F000
stack
page read and write
10C4000
heap
page read and write
4931000
heap
page read and write
10C4000
heap
page read and write
1CE8E000
stack
page read and write
B70000
heap
page read and write
1090000
direct allocation
page read and write
1D11D000
stack
page read and write
2BC0000
direct allocation
page execute and read and write
4EF0000
direct allocation
page execute and read and write
3CAF000
stack
page read and write
4D70000
heap
page read and write
442F000
stack
page read and write
F5E000
heap
page read and write
4931000
heap
page read and write
38EF000
stack
page read and write
10C4000
heap
page read and write
10C4000
heap
page read and write
1CC0E000
stack
page read and write
2BE7000
heap
page read and write
636000
unkown
page execute and read and write
F93000
heap
page read and write
F10000
heap
page read and write
306E000
stack
page read and write
46AF000
stack
page read and write
31AE000
stack
page read and write
10C4000
heap
page read and write
4931000
heap
page read and write
129E000
stack
page read and write
361000
unkown
page execute and write copy
4931000
heap
page read and write
2DEF000
stack
page read and write
4931000
heap
page read and write
2F2E000
stack
page read and write
1D25E000
stack
page read and write
4931000
heap
page read and write
10C4000
heap
page read and write
4931000
heap
page read and write
1090000
direct allocation
page read and write
4EEF000
stack
page read and write
10C4000
heap
page read and write
432E000
stack
page read and write
10C4000
heap
page read and write
2EEF000
stack
page read and write
3E2E000
stack
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
342E000
stack
page read and write
10C4000
heap
page read and write
4931000
heap
page read and write
8E4000
unkown
page execute and write copy
4931000
heap
page read and write
1D35F000
stack
page read and write
4931000
heap
page read and write
1090000
direct allocation
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
10C4000
heap
page read and write
4931000
heap
page read and write
366F000
stack
page read and write
4931000
heap
page read and write
104E000
stack
page read and write
4F00000
direct allocation
page execute and read and write
8A5000
unkown
page execute and read and write
2BBE000
stack
page read and write
406F000
stack
page read and write
1090000
direct allocation
page read and write
10C4000
heap
page read and write
4DDB000
direct allocation
page read and write
10B0000
direct allocation
page read and write
4931000
heap
page read and write
10C4000
heap
page read and write
1090000
direct allocation
page read and write
4931000
heap
page read and write
41EE000
stack
page read and write
10C4000
heap
page read and write
F64000
heap
page read and write
3F6E000
stack
page read and write
10C4000
heap
page read and write
10C4000
heap
page read and write
4931000
heap
page read and write
4F20000
direct allocation
page execute and read and write
1CD4E000
stack
page read and write
F79000
heap
page read and write
38C000
unkown
page execute and read and write
10C4000
heap
page read and write
2B7B000
stack
page read and write
41AF000
stack
page read and write
4F30000
direct allocation
page execute and read and write
10C4000
heap
page read and write
482E000
stack
page read and write
4931000
heap
page read and write
EF4000
stack
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
4F00000
direct allocation
page execute and read and write
2BE0000
heap
page read and write
10C4000
heap
page read and write
1090000
direct allocation
page read and write
B0C000
stack
page read and write
356E000
stack
page read and write
8D5000
unkown
page execute and read and write
4A9000
unkown
page execute and read and write
1CE4F000
stack
page read and write
3A6E000
stack
page read and write
2CEF000
stack
page read and write
4931000
heap
page read and write
10C4000
heap
page read and write
4931000
heap
page read and write
4930000
heap
page read and write
8E3000
unkown
page execute and read and write
10C4000
heap
page read and write
4DEE000
stack
page read and write
40AE000
stack
page read and write
4931000
heap
page read and write
46EE000
stack
page read and write
4950000
heap
page read and write
32EE000
stack
page read and write
1090000
direct allocation
page read and write
1CF8E000
stack
page read and write
10C4000
heap
page read and write
139E000
stack
page read and write
45AE000
stack
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
352F000
stack
page read and write
1CFCE000
stack
page read and write
1D0CF000
stack
page read and write
37AF000
stack
page read and write
1090000
direct allocation
page read and write
1090000
direct allocation
page read and write
4931000
heap
page read and write
42EF000
stack
page read and write
10C4000
heap
page read and write
There are 221 hidden memdumps, click here to show them.