IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.phpa-
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
21000
unkown
page execute and read and write
malicious
FBE000
heap
page read and write
malicious
4E30000
direct allocation
page read and write
malicious
49A1000
heap
page read and write
399E000
stack
page read and write
49A1000
heap
page read and write
5B1000
unkown
page execute and write copy
49A1000
heap
page read and write
2D40000
direct allocation
page read and write
49B7000
heap
page read and write
335E000
stack
page read and write
10B4000
heap
page read and write
5B0000
unkown
page execute and write copy
449F000
stack
page read and write
10B4000
heap
page read and write
10B4000
heap
page read and write
F20000
heap
page read and write
49A1000
heap
page read and write
5A0000
unkown
page execute and read and write
49A1000
heap
page read and write
40DF000
stack
page read and write
49A1000
heap
page read and write
10B4000
heap
page read and write
30A000
unkown
page execute and read and write
4FE0000
direct allocation
page execute and read and write
128F000
stack
page read and write
10B4000
heap
page read and write
3F9F000
stack
page read and write
36DF000
stack
page read and write
49A1000
heap
page read and write
1004000
heap
page read and write
10B4000
heap
page read and write
10B4000
heap
page read and write
2D40000
direct allocation
page read and write
10B4000
heap
page read and write
2D40000
direct allocation
page read and write
49A1000
heap
page read and write
10B4000
heap
page read and write
BBC000
stack
page read and write
F10000
heap
page read and write
1D560000
heap
page read and write
49A1000
heap
page read and write
1D54E000
stack
page read and write
489E000
stack
page read and write
2D40000
direct allocation
page read and write
2D57000
heap
page read and write
485F000
stack
page read and write
3C1E000
stack
page read and write
10B4000
heap
page read and write
49A1000
heap
page read and write
20000
unkown
page readonly
4E5B000
direct allocation
page read and write
13CF000
stack
page read and write
49A1000
heap
page read and write
5B0000
unkown
page execute and read and write
1CCBE000
stack
page read and write
49A1000
heap
page read and write
10B4000
heap
page read and write
49A1000
heap
page read and write
1D1CD000
stack
page read and write
49A1000
heap
page read and write
4C000
unkown
page execute and read and write
4DE0000
trusted library allocation
page read and write
10B4000
heap
page read and write
169000
unkown
page execute and read and write
4F90000
direct allocation
page execute and read and write
49A1000
heap
page read and write
F8E000
stack
page read and write
10B4000
heap
page read and write
2F9E000
stack
page read and write
1D03F000
stack
page read and write
425E000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
45DF000
stack
page read and write
2D40000
direct allocation
page read and write
49A1000
heap
page read and write
1001000
heap
page read and write
359F000
stack
page read and write
49A1000
heap
page read and write
4E30000
direct allocation
page read and write
35DE000
stack
page read and write
381F000
stack
page read and write
FB8000
heap
page read and write
1D40E000
stack
page read and write
475E000
stack
page read and write
2F6000
unkown
page execute and read and write
2BAE000
stack
page read and write
18E000
unkown
page execute and read and write
49A1000
heap
page read and write
2D40000
direct allocation
page read and write
49A1000
heap
page read and write
345F000
stack
page read and write
1016000
heap
page read and write
20000
unkown
page read and write
411E000
stack
page read and write
15D000
unkown
page execute and read and write
1CF3E000
stack
page read and write
2CEC000
stack
page read and write
10B4000
heap
page read and write
10B4000
heap
page read and write
49A1000
heap
page read and write
10B4000
heap
page read and write
2D2E000
stack
page read and write
31DF000
stack
page read and write
10B4000
heap
page read and write
3E5F000
stack
page read and write
1D564000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
1D07E000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
3D5E000
stack
page read and write
49A1000
heap
page read and write
1CDBF000
stack
page read and write
10B4000
heap
page read and write
1CDFE000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
10B4000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
49A1000
heap
page read and write
1D17F000
stack
page read and write
49A1000
heap
page read and write
10B4000
heap
page read and write
3D1F000
stack
page read and write
30DE000
stack
page read and write
4E6E000
stack
page read and write
49A1000
heap
page read and write
471F000
stack
page read and write
3FDD000
stack
page read and write
10B4000
heap
page read and write
10B4000
heap
page read and write
598000
unkown
page execute and read and write
49A1000
heap
page read and write
10B4000
heap
page read and write
21000
unkown
page execute and write copy
49A1000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
385E000
stack
page read and write
EFE000
stack
page read and write
1032000
heap
page read and write
4E30000
direct allocation
page read and write
321E000
stack
page read and write
10B4000
heap
page read and write
49A1000
heap
page read and write
10B4000
heap
page read and write
10B4000
heap
page read and write
49A1000
heap
page read and write
FF7000
heap
page read and write
4F6F000
stack
page read and write
3ADE000
stack
page read and write
1D44D000
stack
page read and write
49A1000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
10B4000
heap
page read and write
10B4000
heap
page read and write
49A1000
heap
page read and write
4E10000
heap
page read and write
492000
unkown
page execute and read and write
1CEFF000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
435F000
stack
page read and write
49A1000
heap
page read and write
2CAF000
stack
page read and write
2D30000
heap
page read and write
49A1000
heap
page read and write
3A9F000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
2D40000
direct allocation
page read and write
FB0000
heap
page read and write
439E000
stack
page read and write
421F000
stack
page read and write
1D30D000
stack
page read and write
49A1000
heap
page read and write
331F000
stack
page read and write
10B0000
heap
page read and write
49A1000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
49A1000
heap
page read and write
2D40000
direct allocation
page read and write
10B4000
heap
page read and write
49A1000
heap
page read and write
12CE000
stack
page read and write
49A1000
heap
page read and write
10B4000
heap
page read and write
3BDF000
stack
page read and write
10B4000
heap
page read and write
371E000
stack
page read and write
751000
unkown
page execute and read and write
49A1000
heap
page read and write
309F000
stack
page read and write
752000
unkown
page execute and write copy
49A1000
heap
page read and write
2D40000
direct allocation
page read and write
49B0000
heap
page read and write
4F80000
direct allocation
page execute and read and write
395F000
stack
page read and write
1D2CD000
stack
page read and write
10B4000
heap
page read and write
2D50000
heap
page read and write
49C0000
heap
page read and write
10B4000
heap
page read and write
10B4000
heap
page read and write
10B4000
heap
page read and write
49A1000
heap
page read and write
EF4000
stack
page read and write
2E5F000
stack
page read and write
3E9E000
stack
page read and write
2D40000
direct allocation
page read and write
49A1000
heap
page read and write
10B4000
heap
page read and write
44DE000
stack
page read and write
575000
unkown
page execute and read and write
461E000
stack
page read and write
499F000
stack
page read and write
2D40000
direct allocation
page read and write
2D40000
direct allocation
page read and write
10B4000
heap
page read and write
349E000
stack
page read and write
2F5F000
stack
page read and write
49A1000
heap
page read and write
21000
unkown
page execute and write copy
2D40000
direct allocation
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
2D40000
direct allocation
page read and write
49A0000
heap
page read and write
There are 226 hidden memdumps, click here to show them.