IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.php/c
unknown
http://185.215.113.206/6c4adf523b719729.phpS
unknown
http://185.215.113.206/_
unknown
http://185.215.113.206/Z
unknown
http://185.215.113.206/6c4adf523b719729.phpk
unknown
http://185.215.113.206/6c4adf523b719729.php6
unknown
http://185.215.113.206j
unknown
http://185.215.113.206/4
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
11AE000
heap
page read and write
malicious
181000
unkown
page execute and read and write
malicious
4F20000
direct allocation
page read and write
malicious
4A91000
heap
page read and write
4A91000
heap
page read and write
3DFF000
stack
page read and write
32FE000
stack
page read and write
3F3F000
stack
page read and write
4A91000
heap
page read and write
1CFAF000
stack
page read and write
38FF000
stack
page read and write
4A91000
heap
page read and write
46BF000
stack
page read and write
4A91000
heap
page read and write
46A000
unkown
page execute and read and write
4A91000
heap
page read and write
FE0000
heap
page read and write
5070000
direct allocation
page execute and read and write
33FF000
stack
page read and write
3B7F000
stack
page read and write
4A90000
heap
page read and write
4A91000
heap
page read and write
5EB000
unkown
page execute and read and write
4A91000
heap
page read and write
456000
unkown
page execute and read and write
10D0000
heap
page read and write
4A80000
direct allocation
page read and write
139E000
stack
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
6FD000
unkown
page execute and read and write
1D29E000
stack
page read and write
4A91000
heap
page read and write
4ED0000
trusted library allocation
page read and write
180000
unkown
page read and write
4A91000
heap
page read and write
32BF000
stack
page read and write
2D3E000
stack
page read and write
50C0000
direct allocation
page execute and read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
2F7F000
stack
page read and write
4A7F000
stack
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
5090000
direct allocation
page execute and read and write
1CEAE000
stack
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
11A0000
heap
page read and write
4A91000
heap
page read and write
4A80000
direct allocation
page read and write
50B0000
direct allocation
page execute and read and write
4A91000
heap
page read and write
1D39E000
stack
page read and write
40BE000
stack
page read and write
4A91000
heap
page read and write
FF0000
heap
page read and write
4A91000
heap
page read and write
3CFE000
stack
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
50D0000
direct allocation
page execute and read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
46FE000
stack
page read and write
4A91000
heap
page read and write
2CFE000
stack
page read and write
1CE6F000
stack
page read and write
4A80000
direct allocation
page read and write
4A91000
heap
page read and write
505F000
stack
page read and write
4A91000
heap
page read and write
4AA3000
heap
page read and write
1D24F000
stack
page read and write
6CD000
unkown
page execute and read and write
2C9000
unkown
page execute and read and write
407F000
stack
page read and write
3E3E000
stack
page read and write
42FF000
stack
page read and write
4A80000
direct allocation
page read and write
31BE000
stack
page read and write
50A0000
direct allocation
page execute and read and write
2BD000
unkown
page execute and read and write
457F000
stack
page read and write
47FF000
stack
page read and write
37BF000
stack
page read and write
E8C000
stack
page read and write
367F000
stack
page read and write
357E000
stack
page read and write
4A91000
heap
page read and write
2C7E000
stack
page read and write
2E7F000
stack
page read and write
4A91000
heap
page read and write
50A0000
direct allocation
page execute and read and write
4A91000
heap
page read and write
70C000
unkown
page execute and write copy
5080000
direct allocation
page execute and read and write
4F20000
direct allocation
page read and write
113E000
stack
page read and write
2D70000
heap
page read and write
4A80000
direct allocation
page read and write
4A80000
direct allocation
page read and write
50AE000
stack
page read and write
37FE000
stack
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
3BBE000
stack
page read and write
4A91000
heap
page read and write
121F000
heap
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
1CFEE000
stack
page read and write
4A91000
heap
page read and write
4A80000
direct allocation
page read and write
4A80000
direct allocation
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
2D77000
heap
page read and write
41FE000
stack
page read and write
36BE000
stack
page read and write
2D50000
heap
page read and write
4A91000
heap
page read and write
4F5E000
stack
page read and write
4A91000
heap
page read and write
4A80000
direct allocation
page read and write
4A91000
heap
page read and write
4F4B000
direct allocation
page read and write
4A91000
heap
page read and write
11A8000
heap
page read and write
4A91000
heap
page read and write
70B000
unkown
page execute and read and write
4A80000
direct allocation
page read and write
4AA0000
heap
page read and write
3F7E000
stack
page read and write
4A91000
heap
page read and write
3CBF000
stack
page read and write
41BF000
stack
page read and write
180000
unkown
page readonly
181000
unkown
page execute and write copy
6F3000
unkown
page execute and read and write
1D14E000
stack
page read and write
45BE000
stack
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
393E000
stack
page read and write
317F000
stack
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
70B000
unkown
page execute and write copy
1223000
heap
page read and write
353F000
stack
page read and write
483E000
stack
page read and write
3A7E000
stack
page read and write
4A80000
direct allocation
page read and write
11F3000
heap
page read and write
4A91000
heap
page read and write
447E000
stack
page read and write
1D4DC000
stack
page read and write
4A91000
heap
page read and write
1D3DD000
stack
page read and write
1AC000
unkown
page execute and read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
4F20000
direct allocation
page read and write
4A91000
heap
page read and write
3A3F000
stack
page read and write
4A80000
direct allocation
page read and write
4A91000
heap
page read and write
F85000
stack
page read and write
1209000
heap
page read and write
433E000
stack
page read and write
8AA000
unkown
page execute and write copy
1D0EE000
stack
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
2D40000
heap
page read and write
4A91000
heap
page read and write
443F000
stack
page read and write
4A91000
heap
page read and write
F8E000
stack
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
2CBC000
stack
page read and write
343E000
stack
page read and write
4A91000
heap
page read and write
4A80000
direct allocation
page read and write
122C000
heap
page read and write
307F000
stack
page read and write
4AB0000
heap
page read and write
8A9000
unkown
page execute and read and write
117E000
stack
page read and write
4A80000
direct allocation
page read and write
497E000
stack
page read and write
2D7B000
heap
page read and write
50A0000
direct allocation
page execute and read and write
FF5000
heap
page read and write
2EE000
unkown
page execute and read and write
493F000
stack
page read and write
4A91000
heap
page read and write
149E000
stack
page read and write
4A91000
heap
page read and write
There are 197 hidden memdumps, click here to show them.