IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.phpd
unknown
http://185.215.113.206/6c4adf523b719729.phpM
unknown
http://185.215.113.206/6c4adf523b719729.phpy
unknown
http://185.215.113.206/6c4adf523b719729.phpz
unknown
http://185.215.113.206/6c4adf523b719729.php%
unknown
http://185.215.113.206/6c4adf523b719729.phpU
unknown
http://185.215.113.206/6c4adf523b719729.phpe
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
F48000
heap
page read and write
malicious
5F1000
unkown
page execute and read and write
malicious
4BA0000
direct allocation
page read and write
malicious
75E000
unkown
page execute and read and write
4D20000
direct allocation
page execute and read and write
3ACE000
stack
page read and write
45CF000
stack
page read and write
F10000
direct allocation
page read and write
E04000
heap
page read and write
35CE000
stack
page read and write
F2E000
heap
page read and write
4711000
heap
page read and write
438E000
stack
page read and write
4711000
heap
page read and write
E04000
heap
page read and write
F10000
direct allocation
page read and write
4711000
heap
page read and write
1CF3D000
stack
page read and write
E04000
heap
page read and write
4810000
trusted library allocation
page read and write
4711000
heap
page read and write
E04000
heap
page read and write
4720000
heap
page read and write
F10000
direct allocation
page read and write
4F5000
stack
page read and write
72D000
unkown
page execute and read and write
4D10000
direct allocation
page execute and read and write
4711000
heap
page read and write
4711000
heap
page read and write
1FC000
stack
page read and write
4711000
heap
page read and write
E04000
heap
page read and write
F2A000
heap
page read and write
E04000
heap
page read and write
E04000
heap
page read and write
1CDFE000
stack
page read and write
3A8F000
stack
page read and write
2E0F000
stack
page read and write
31CF000
stack
page read and write
4BA0000
direct allocation
page read and write
320E000
stack
page read and write
330F000
stack
page read and write
4711000
heap
page read and write
F10000
direct allocation
page read and write
410E000
stack
page read and write
4711000
heap
page read and write
370E000
stack
page read and write
3C0E000
stack
page read and write
DF0000
heap
page read and write
E04000
heap
page read and write
E04000
heap
page read and write
4711000
heap
page read and write
E04000
heap
page read and write
550000
heap
page read and write
E04000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
5CE000
stack
page read and write
460E000
stack
page read and write
3D4D000
stack
page read and write
2F8E000
stack
page read and write
4BDE000
stack
page read and write
E04000
heap
page read and write
448F000
stack
page read and write
308F000
stack
page read and write
4711000
heap
page read and write
61C000
unkown
page execute and read and write
4B80000
heap
page read and write
E04000
heap
page read and write
1CC6F000
stack
page read and write
E04000
heap
page read and write
4D20000
direct allocation
page execute and read and write
105D000
stack
page read and write
115E000
stack
page read and write
36CF000
stack
page read and write
3E4F000
stack
page read and write
4711000
heap
page read and write
4CDF000
stack
page read and write
2CCF000
stack
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
D18000
unkown
page execute and read and write
B40000
unkown
page execute and read and write
2A8B000
stack
page read and write
A5C000
unkown
page execute and read and write
560000
heap
page read and write
4711000
heap
page read and write
E04000
heap
page read and write
4711000
heap
page read and write
E04000
heap
page read and write
B79000
unkown
page execute and write copy
5F1000
unkown
page execute and write copy
2940000
heap
page read and write
4711000
heap
page read and write
1CB6E000
stack
page read and write
4711000
heap
page read and write
D19000
unkown
page execute and write copy
4711000
heap
page read and write
348E000
stack
page read and write
E04000
heap
page read and write
4711000
heap
page read and write
4714000
heap
page read and write
4711000
heap
page read and write
4FF000
stack
page read and write
E04000
heap
page read and write
4711000
heap
page read and write
1CB2F000
stack
page read and write
4711000
heap
page read and write
E04000
heap
page read and write
2947000
heap
page read and write
FA8000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
3F8F000
stack
page read and write
F10000
direct allocation
page read and write
1CDAF000
stack
page read and write
1CEFF000
stack
page read and write
E04000
heap
page read and write
4711000
heap
page read and write
F10000
direct allocation
page read and write
3BCF000
stack
page read and write
3FCE000
stack
page read and write
4711000
heap
page read and write
F10000
direct allocation
page read and write
E04000
heap
page read and write
4711000
heap
page read and write
2BCE000
stack
page read and write
F10000
direct allocation
page read and write
4710000
heap
page read and write
4711000
heap
page read and write
293E000
stack
page read and write
398E000
stack
page read and write
334E000
stack
page read and write
1CCAE000
stack
page read and write
4BA0000
direct allocation
page read and write
40CF000
stack
page read and write
4711000
heap
page read and write
44CE000
stack
page read and write
F43000
heap
page read and write
739000
unkown
page execute and read and write
4711000
heap
page read and write
424E000
stack
page read and write
434F000
stack
page read and write
1D07E000
stack
page read and write
B6A000
unkown
page execute and read and write
E04000
heap
page read and write
4711000
heap
page read and write
E04000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
4730000
heap
page read and write
4711000
heap
page read and write
F10000
direct allocation
page read and write
B7A000
unkown
page execute and write copy
4D00000
direct allocation
page execute and read and write
3D0F000
stack
page read and write
4711000
heap
page read and write
E04000
heap
page read and write
B79000
unkown
page execute and read and write
2F4F000
stack
page read and write
4711000
heap
page read and write
1CA2E000
stack
page read and write
E04000
heap
page read and write
4711000
heap
page read and write
E04000
heap
page read and write
4711000
heap
page read and write
F10000
direct allocation
page read and write
380F000
stack
page read and write
30CE000
stack
page read and write
F10000
direct allocation
page read and write
E04000
heap
page read and write
3E8E000
stack
page read and write
8DA000
unkown
page execute and read and write
4D50000
direct allocation
page execute and read and write
F10000
direct allocation
page read and write
8C6000
unkown
page execute and read and write
E04000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
2A4F000
stack
page read and write
4711000
heap
page read and write
1D03C000
stack
page read and write
E04000
heap
page read and write
E04000
heap
page read and write
4711000
heap
page read and write
E04000
heap
page read and write
4711000
heap
page read and write
2B8F000
stack
page read and write
4711000
heap
page read and write
4D40000
direct allocation
page execute and read and write
E04000
heap
page read and write
358F000
stack
page read and write
E04000
heap
page read and write
2E4E000
stack
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
E04000
heap
page read and write
384E000
stack
page read and write
420F000
stack
page read and write
2D0E000
stack
page read and write
F75000
heap
page read and write
4711000
heap
page read and write
470F000
stack
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
F10000
direct allocation
page read and write
E04000
heap
page read and write
4D20000
direct allocation
page execute and read and write
394F000
stack
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
E04000
heap
page read and write
E00000
heap
page read and write
4BCB000
direct allocation
page read and write
4D30000
direct allocation
page execute and read and write
4711000
heap
page read and write
4711000
heap
page read and write
5F0000
unkown
page read and write
E04000
heap
page read and write
F10000
direct allocation
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
F89000
heap
page read and write
4711000
heap
page read and write
294B000
heap
page read and write
5F0000
unkown
page readonly
344F000
stack
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
F20000
heap
page read and write
4711000
heap
page read and write
1D17E000
stack
page read and write
4711000
heap
page read and write
F0F000
stack
page read and write
4711000
heap
page read and write
B63000
unkown
page execute and read and write
There are 226 hidden memdumps, click here to show them.