IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/0
unknown
http://185.215.113.206/6c4adf523b719729.phpN
unknown
http://185.215.113.206/6c4adf523b719729.php/
unknown
http://185.215.113.206/6c4adf523b719729.phpz
unknown
http://185.215.113.206/6c4adf523b719729.phpfh
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

Domains

Name
IP
Malicious
s-part-0015.t-0009.t-msedge.net
13.107.246.43

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
681000
unkown
page execute and read and write
malicious
5020000
direct allocation
page read and write
malicious
140E000
heap
page read and write
malicious
4B9F000
stack
page read and write
504B000
direct allocation
page read and write
12C0000
direct allocation
page read and write
351F000
stack
page read and write
4BA1000
heap
page read and write
12E4000
heap
page read and write
12C0000
direct allocation
page read and write
12E4000
heap
page read and write
47DF000
stack
page read and write
341E000
stack
page read and write
3F5E000
stack
page read and write
12E4000
heap
page read and write
2E1E000
stack
page read and write
12E4000
heap
page read and write
DC0000
heap
page read and write
4BA1000
heap
page read and write
12E4000
heap
page read and write
12C0000
direct allocation
page read and write
2E97000
heap
page read and write
4BA1000
heap
page read and write
BC6000
unkown
page execute and read and write
431E000
stack
page read and write
469F000
stack
page read and write
309F000
stack
page read and write
4BA1000
heap
page read and write
5160000
direct allocation
page execute and read and write
33DF000
stack
page read and write
12E4000
heap
page read and write
4BA1000
heap
page read and write
3F1F000
stack
page read and write
4BA1000
heap
page read and write
1482000
heap
page read and write
1D1EE000
stack
page read and write
365F000
stack
page read and write
4BC0000
heap
page read and write
4BA1000
heap
page read and write
4BA1000
heap
page read and write
1D0AF000
stack
page read and write
12E4000
heap
page read and write
2E90000
heap
page read and write
355E000
stack
page read and write
4BA1000
heap
page read and write
BF6000
unkown
page execute and read and write
5170000
direct allocation
page execute and read and write
DA3000
unkown
page execute and write copy
455F000
stack
page read and write
12E4000
heap
page read and write
2E80000
direct allocation
page execute and read and write
10F5000
stack
page read and write
2E60000
direct allocation
page execute and read and write
12E4000
heap
page read and write
419F000
stack
page read and write
12C0000
direct allocation
page read and write
4BA1000
heap
page read and write
12E4000
heap
page read and write
4BA1000
heap
page read and write
4BA0000
heap
page read and write
3CDE000
stack
page read and write
4BA1000
heap
page read and write
4BA1000
heap
page read and write
495E000
stack
page read and write
12E4000
heap
page read and write
459E000
stack
page read and write
1D32F000
stack
page read and write
1D47D000
stack
page read and write
1D762000
heap
page read and write
12E4000
heap
page read and write
1400000
heap
page read and write
4BA1000
heap
page read and write
4BA1000
heap
page read and write
491F000
stack
page read and write
680000
unkown
page read and write
441F000
stack
page read and write
4BA1000
heap
page read and write
1D37D000
stack
page read and write
4BA1000
heap
page read and write
1452000
heap
page read and write
7C9000
unkown
page execute and read and write
4A5F000
stack
page read and write
15FE000
stack
page read and write
4BA1000
heap
page read and write
12E4000
heap
page read and write
12E4000
heap
page read and write
5160000
direct allocation
page execute and read and write
12AE000
stack
page read and write
1D4BE000
stack
page read and write
956000
unkown
page execute and read and write
46DE000
stack
page read and write
12C0000
direct allocation
page read and write
4BA1000
heap
page read and write
12E0000
heap
page read and write
12E4000
heap
page read and write
32DE000
stack
page read and write
12E4000
heap
page read and write
7BD000
unkown
page execute and read and write
4BA1000
heap
page read and write
1CFAE000
stack
page read and write
12E4000
heap
page read and write
12E4000
heap
page read and write
4BA1000
heap
page read and write
96A000
unkown
page execute and read and write
515F000
stack
page read and write
12C0000
direct allocation
page read and write
4BA1000
heap
page read and write
329F000
stack
page read and write
1D0ED000
stack
page read and write
12E4000
heap
page read and write
6AC000
unkown
page execute and read and write
12E4000
heap
page read and write
5180000
direct allocation
page execute and read and write
5160000
direct allocation
page execute and read and write
1CE6E000
stack
page read and write
DA2000
unkown
page execute and read and write
C06000
unkown
page execute and read and write
140A000
heap
page read and write
4BA1000
heap
page read and write
12E4000
heap
page read and write
4BA1000
heap
page read and write
12C0000
direct allocation
page read and write
2E70000
direct allocation
page execute and read and write
4BA1000
heap
page read and write
12E4000
heap
page read and write
4BA1000
heap
page read and write
12E4000
heap
page read and write
1D22E000
stack
page read and write
12E4000
heap
page read and write
12E4000
heap
page read and write
369E000
stack
page read and write
1CF6F000
stack
page read and write
12E4000
heap
page read and write
2F9F000
stack
page read and write
12E4000
heap
page read and write
1D5BE000
stack
page read and write
4BA1000
heap
page read and write
1D75E000
stack
page read and write
12E4000
heap
page read and write
4BA1000
heap
page read and write
4FE0000
trusted library allocation
page read and write
C07000
unkown
page execute and write copy
505E000
stack
page read and write
37DE000
stack
page read and write
3C9F000
stack
page read and write
4BA1000
heap
page read and write
4BA1000
heap
page read and write
42DF000
stack
page read and write
12E4000
heap
page read and write
4BA1000
heap
page read and write
12C0000
direct allocation
page read and write
12C0000
direct allocation
page read and write
319F000
stack
page read and write
4A9E000
stack
page read and write
7EE000
unkown
page execute and read and write
12C0000
direct allocation
page read and write
4BA1000
heap
page read and write
4BA1000
heap
page read and write
12C0000
direct allocation
page read and write
4BA1000
heap
page read and write
41DD000
stack
page read and write
4BA1000
heap
page read and write
409E000
stack
page read and write
12E4000
heap
page read and write
3DDF000
stack
page read and write
3E1E000
stack
page read and write
4BA1000
heap
page read and write
405F000
stack
page read and write
12E4000
heap
page read and write
4BA1000
heap
page read and write
481E000
stack
page read and write
4BA1000
heap
page read and write
BEE000
unkown
page execute and read and write
4BA1000
heap
page read and write
4BA1000
heap
page read and write
3A1F000
stack
page read and write
63C000
stack
page read and write
3B9E000
stack
page read and write
12E4000
heap
page read and write
DD0000
heap
page read and write
C06000
unkown
page execute and write copy
12C0000
direct allocation
page read and write
680000
unkown
page readonly
13F0000
direct allocation
page read and write
12E4000
heap
page read and write
4BA1000
heap
page read and write
4BA1000
heap
page read and write
391E000
stack
page read and write
4FE0000
heap
page read and write
12E4000
heap
page read and write
38DF000
stack
page read and write
4BA1000
heap
page read and write
12C0000
direct allocation
page read and write
1D760000
heap
page read and write
4BA1000
heap
page read and write
681000
unkown
page execute and write copy
4BA1000
heap
page read and write
4BA1000
heap
page read and write
4BA1000
heap
page read and write
1469000
heap
page read and write
379F000
stack
page read and write
120E000
stack
page read and write
4BA1000
heap
page read and write
124E000
stack
page read and write
4BA1000
heap
page read and write
4BA1000
heap
page read and write
445E000
stack
page read and write
13F0000
direct allocation
page read and write
4BA1000
heap
page read and write
13EE000
stack
page read and write
4BB0000
heap
page read and write
4BA1000
heap
page read and write
3A5E000
stack
page read and write
3B5F000
stack
page read and write
5190000
direct allocation
page execute and read and write
4BA1000
heap
page read and write
4BA1000
heap
page read and write
12C0000
direct allocation
page read and write
4BA1000
heap
page read and write
12E4000
heap
page read and write
2E5E000
stack
page read and write
4BA1000
heap
page read and write
12E4000
heap
page read and write
12E4000
heap
page read and write
1D65E000
stack
page read and write
AF1000
unkown
page execute and read and write
12B0000
heap
page read and write
4BA1000
heap
page read and write
4BA1000
heap
page read and write
2DDC000
stack
page read and write
10FF000
stack
page read and write
2E9B000
heap
page read and write
4BA1000
heap
page read and write
There are 223 hidden memdumps, click here to show them.