IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.phpS
unknown
http://185.215.113.206/6c4adf523b719729.phpc
unknown
http://185.215.113.206/6c4adf523b719729.php/
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/6c4adf523b719729.phpF
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

Domains

Name
IP
Malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45
ax-0001.ax-msedge.net
150.171.27.10
fp2e7a.wpc.phicdn.net
192.229.221.95
tse1.mm.bing.net
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
998000
heap
page read and write
malicious
E11000
unkown
page execute and read and write
malicious
4E80000
direct allocation
page read and write
malicious
E00000
direct allocation
page read and write
49FF000
stack
page read and write
9D7000
heap
page read and write
8C4000
heap
page read and write
840000
heap
page read and write
34BF000
stack
page read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
970000
heap
page read and write
4A01000
heap
page read and write
387F000
stack
page read and write
1CCFE000
stack
page read and write
D7C000
stack
page read and write
43BF000
stack
page read and write
8C4000
heap
page read and write
E00000
direct allocation
page read and write
4FF0000
direct allocation
page execute and read and write
4A01000
heap
page read and write
48BF000
stack
page read and write
4E60000
heap
page read and write
4A01000
heap
page read and write
4A10000
heap
page read and write
3C7E000
stack
page read and write
2EFF000
stack
page read and write
1CDFF000
stack
page read and write
8C4000
heap
page read and write
830000
heap
page read and write
35FF000
stack
page read and write
33BE000
stack
page read and write
4A01000
heap
page read and write
403D000
stack
page read and write
8AD000
stack
page read and write
4A01000
heap
page read and write
4FBF000
stack
page read and write
4A01000
heap
page read and write
E00000
direct allocation
page read and write
4A01000
heap
page read and write
313E000
stack
page read and write
8C4000
heap
page read and write
39BF000
stack
page read and write
3EFE000
stack
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
1522000
unkown
page execute and read and write
8C4000
heap
page read and write
4A00000
heap
page read and write
8C4000
heap
page read and write
97A000
heap
page read and write
4A01000
heap
page read and write
3EBF000
stack
page read and write
E3C000
unkown
page execute and read and write
4DC000
stack
page read and write
323F000
stack
page read and write
477F000
stack
page read and write
960000
heap
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
34FE000
stack
page read and write
4EAB000
direct allocation
page read and write
3DBE000
stack
page read and write
2FFF000
stack
page read and write
2DE0000
direct allocation
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
1380000
unkown
page execute and read and write
10FA000
unkown
page execute and read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
E00000
direct allocation
page read and write
427F000
stack
page read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
4A01000
heap
page read and write
E00000
direct allocation
page read and write
4A01000
heap
page read and write
453E000
stack
page read and write
377E000
stack
page read and write
138F000
unkown
page execute and write copy
327E000
stack
page read and write
E00000
direct allocation
page read and write
5010000
direct allocation
page execute and read and write
1390000
unkown
page execute and write copy
4A01000
heap
page read and write
8C4000
heap
page read and write
1523000
unkown
page execute and write copy
4A01000
heap
page read and write
4A01000
heap
page read and write
E00000
direct allocation
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
8C4000
heap
page read and write
2DCF000
stack
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
42BE000
stack
page read and write
4FC0000
direct allocation
page execute and read and write
1281000
unkown
page execute and read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
337F000
stack
page read and write
8C4000
heap
page read and write
4A01000
heap
page read and write
8C4000
heap
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
2DF0000
heap
page read and write
4A01000
heap
page read and write
417E000
stack
page read and write
8C4000
heap
page read and write
138F000
unkown
page execute and read and write
8C4000
heap
page read and write
2DFB000
heap
page read and write
467E000
stack
page read and write
5020000
direct allocation
page execute and read and write
4FF0000
direct allocation
page execute and read and write
4A01000
heap
page read and write
1D30C000
stack
page read and write
8C4000
heap
page read and write
10E6000
unkown
page execute and read and write
2DF7000
heap
page read and write
8C4000
heap
page read and write
4A01000
heap
page read and write
1CE3E000
stack
page read and write
1D44F000
stack
page read and write
1D20D000
stack
page read and write
E10000
unkown
page read and write
39FE000
stack
page read and write
1351000
unkown
page execute and read and write
3C3F000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
8C4000
heap
page read and write
4A01000
heap
page read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
1CF7E000
stack
page read and write
43FE000
stack
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
413F000
stack
page read and write
5DE000
stack
page read and write
4A01000
heap
page read and write
F59000
unkown
page execute and read and write
44FF000
stack
page read and write
373F000
stack
page read and write
97E000
heap
page read and write
9F9000
heap
page read and write
90E000
stack
page read and write
E00000
direct allocation
page read and write
8C4000
heap
page read and write
4A01000
heap
page read and write
9F1000
heap
page read and write
4A01000
heap
page read and write
1CF3E000
stack
page read and write
5D4000
stack
page read and write
F4D000
unkown
page execute and read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
3B3E000
stack
page read and write
363E000
stack
page read and write
3D7F000
stack
page read and write
4A01000
heap
page read and write
38BE000
stack
page read and write
95E000
stack
page read and write
4A01000
heap
page read and write
E00000
direct allocation
page read and write
E00000
direct allocation
page read and write
9C4000
heap
page read and write
5000000
direct allocation
page execute and read and write
4A01000
heap
page read and write
3AFF000
stack
page read and write
8C4000
heap
page read and write
1D07F000
stack
page read and write
30FF000
stack
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
E11000
unkown
page execute and write copy
1D1BF000
stack
page read and write
4A01000
heap
page read and write
1D34E000
stack
page read and write
E00000
direct allocation
page read and write
4FF0000
direct allocation
page execute and read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
DBE000
stack
page read and write
C3E000
stack
page read and write
48FE000
stack
page read and write
4A01000
heap
page read and write
993000
heap
page read and write
D3E000
stack
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
1D0BE000
stack
page read and write
4A01000
heap
page read and write
8C4000
heap
page read and write
E10000
unkown
page readonly
8C4000
heap
page read and write
4EBE000
stack
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
1379000
unkown
page execute and read and write
8C4000
heap
page read and write
4A01000
heap
page read and write
47BE000
stack
page read and write
463F000
stack
page read and write
8C4000
heap
page read and write
F7E000
unkown
page execute and read and write
E00000
direct allocation
page read and write
8C4000
heap
page read and write
4B00000
trusted library allocation
page read and write
4A01000
heap
page read and write
3FFF000
stack
page read and write
E00000
direct allocation
page read and write
8C4000
heap
page read and write
4A01000
heap
page read and write
DFE000
stack
page read and write
E00000
direct allocation
page read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
2DE0000
direct allocation
page read and write
8C0000
heap
page read and write
There are 222 hidden memdumps, click here to show them.