IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.phptop
unknown
http://185.215.113.206/-
unknown
http://185.215.113.206/:
unknown
http://185.215.113.206/6c4adf523b719729.phpK
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
http://185.215.113.206/6c4adf523b719729.php2
unknown
http://185.215.113.206/6c4adf523b719729.phpR
unknown
http://185.215.113.206/6c4adf523b719729.php.
unknown
http://185.215.113.206/6c4adf523b719729.phpt;
unknown
http://185.215.113.2067
unknown
There are 3 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4FF0000
direct allocation
page read and write
malicious
AC1000
unkown
page execute and read and write
malicious
152E000
heap
page read and write
malicious
14F0000
direct allocation
page read and write
5140000
direct allocation
page execute and read and write
47EE000
stack
page read and write
312F000
stack
page read and write
4B6F000
stack
page read and write
13E0000
heap
page read and write
1CF8E000
stack
page read and write
34EF000
stack
page read and write
3CAE000
stack
page read and write
1D34D000
stack
page read and write
4B80000
heap
page read and write
1D44D000
stack
page read and write
4B71000
heap
page read and write
3DEE000
stack
page read and write
4B71000
heap
page read and write
AC0000
unkown
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
3B6E000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
1D20E000
stack
page read and write
4B71000
heap
page read and write
102E000
unkown
page execute and read and write
14F0000
direct allocation
page read and write
14F0000
direct allocation
page read and write
4B70000
heap
page read and write
466F000
stack
page read and write
512F000
stack
page read and write
32AE000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
1036000
unkown
page execute and read and write
33AF000
stack
page read and write
47AF000
stack
page read and write
950000
heap
page read and write
1D1CF000
stack
page read and write
14F0000
direct allocation
page read and write
1510000
direct allocation
page read and write
AC0000
unkown
page readonly
100A000
unkown
page execute and read and write
1574000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
15A5000
heap
page read and write
43EF000
stack
page read and write
1D6E0000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
1588000
heap
page read and write
48EF000
stack
page read and write
14F0000
direct allocation
page read and write
D96000
unkown
page execute and read and write
14F0000
direct allocation
page read and write
BFD000
unkown
page execute and read and write
362F000
stack
page read and write
316E000
stack
page read and write
4B71000
heap
page read and write
376F000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
8F4000
stack
page read and write
1CE4E000
stack
page read and write
4B71000
heap
page read and write
2EC0000
direct allocation
page execute and read and write
416F000
stack
page read and write
14F0000
direct allocation
page read and write
46AE000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
1044000
unkown
page execute and read and write
4B71000
heap
page read and write
5FC000
stack
page read and write
14EE000
stack
page read and write
4B71000
heap
page read and write
1D6E4000
heap
page read and write
11E0000
unkown
page execute and write copy
4B71000
heap
page read and write
33EE000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
1520000
heap
page read and write
4B71000
heap
page read and write
452F000
stack
page read and write
C09000
unkown
page execute and read and write
302E000
stack
page read and write
14F0000
direct allocation
page read and write
2EE0000
heap
page read and write
1D08F000
stack
page read and write
152A000
heap
page read and write
366E000
stack
page read and write
A9D000
stack
page read and write
5150000
direct allocation
page execute and read and write
14F0000
direct allocation
page read and write
37AE000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4A6E000
stack
page read and write
1D48D000
stack
page read and write
442E000
stack
page read and write
326F000
stack
page read and write
402F000
stack
page read and write
13E5000
heap
page read and write
3C6F000
stack
page read and write
4B71000
heap
page read and write
2EBF000
stack
page read and write
4B71000
heap
page read and write
502E000
stack
page read and write
4B71000
heap
page read and write
501B000
direct allocation
page read and write
5130000
direct allocation
page execute and read and write
4B71000
heap
page read and write
42AF000
stack
page read and write
39EF000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
13C0000
heap
page read and write
C2E000
unkown
page execute and read and write
2ED0000
direct allocation
page execute and read and write
38AF000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
2FEF000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
3F2E000
stack
page read and write
4B71000
heap
page read and write
13AC000
stack
page read and write
12EE000
stack
page read and write
14F0000
direct allocation
page read and write
492E000
stack
page read and write
4B71000
heap
page read and write
352E000
stack
page read and write
1D6DE000
stack
page read and write
4B71000
heap
page read and write
2EE7000
heap
page read and write
5140000
direct allocation
page execute and read and write
14F0000
direct allocation
page read and write
4B71000
heap
page read and write
4A2F000
stack
page read and write
406E000
stack
page read and write
AEC000
unkown
page execute and read and write
1D0CE000
stack
page read and write
4FB0000
trusted library allocation
page read and write
4B71000
heap
page read and write
8FE000
stack
page read and write
132E000
stack
page read and write
4B71000
heap
page read and write
3DAF000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
5170000
direct allocation
page execute and read and write
4B71000
heap
page read and write
38EE000
stack
page read and write
14F0000
direct allocation
page read and write
4B71000
heap
page read and write
1D5DE000
stack
page read and write
5160000
direct allocation
page execute and read and write
1045000
unkown
page execute and write copy
456E000
stack
page read and write
4B71000
heap
page read and write
F25000
unkown
page execute and read and write
4B71000
heap
page read and write
14F0000
direct allocation
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
3A2E000
stack
page read and write
41AE000
stack
page read and write
42EE000
stack
page read and write
13B0000
heap
page read and write
1CF4F000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
5140000
direct allocation
page execute and read and write
14F0000
direct allocation
page read and write
4B71000
heap
page read and write
3EEF000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
1D58C000
stack
page read and write
11DF000
unkown
page execute and read and write
4B71000
heap
page read and write
DAA000
unkown
page execute and read and write
3B2F000
stack
page read and write
A30000
heap
page read and write
4B71000
heap
page read and write
1044000
unkown
page execute and write copy
1D30F000
stack
page read and write
4B71000
heap
page read and write
1510000
direct allocation
page read and write
136E000
stack
page read and write
AC1000
unkown
page execute and write copy
4B71000
heap
page read and write
There are 198 hidden memdumps, click here to show them.