IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.phps
unknown
http://185.215.113.206/l
unknown
http://185.215.113.206/6c4adf523b719729.php;
unknown
http://185.215.113.206/6c4adf523b719729.phpk
unknown
http://185.215.113.206/I
unknown
http://185.215.113.206/6c4adf523b719729.php&
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
191000
unkown
page execute and read and write
malicious
4C60000
direct allocation
page read and write
malicious
E0E000
heap
page read and write
malicious
47E1000
heap
page read and write
47E1000
heap
page read and write
DF0000
direct allocation
page read and write
3A5E000
stack
page read and write
191000
unkown
page execute and write copy
47E1000
heap
page read and write
DD4000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
DF0000
direct allocation
page read and write
D40000
heap
page read and write
1D12D000
stack
page read and write
47E1000
heap
page read and write
DF0000
direct allocation
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
CFE000
stack
page read and write
DD4000
heap
page read and write
605000
unkown
page execute and read and write
391E000
stack
page read and write
2A40000
direct allocation
page read and write
47E1000
heap
page read and write
DD4000
heap
page read and write
DD4000
heap
page read and write
3A1F000
stack
page read and write
DF0000
direct allocation
page read and write
DD4000
heap
page read and write
469F000
stack
page read and write
3F1E000
stack
page read and write
DF0000
direct allocation
page read and write
1CFEE000
stack
page read and write
341E000
stack
page read and write
DF0000
direct allocation
page read and write
1CD5E000
stack
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
47A000
unkown
page execute and read and write
71D000
unkown
page execute and write copy
47E1000
heap
page read and write
DD4000
heap
page read and write
47E1000
heap
page read and write
2D9F000
stack
page read and write
DD4000
heap
page read and write
47E1000
heap
page read and write
2DDE000
stack
page read and write
DD4000
heap
page read and write
351F000
stack
page read and write
47E1000
heap
page read and write
DD4000
heap
page read and write
DD4000
heap
page read and write
47E4000
heap
page read and write
2D9000
unkown
page execute and read and write
47DF000
stack
page read and write
459E000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
455F000
stack
page read and write
4C9E000
stack
page read and write
6E1000
unkown
page execute and read and write
D30000
heap
page read and write
E00000
heap
page read and write
47E1000
heap
page read and write
3CDE000
stack
page read and write
47E1000
heap
page read and write
2FE000
unkown
page execute and read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
4C20000
trusted library allocation
page read and write
47E1000
heap
page read and write
441F000
stack
page read and write
E70000
heap
page read and write
DF0000
direct allocation
page read and write
4DB0000
direct allocation
page execute and read and write
1D3CE000
stack
page read and write
DD4000
heap
page read and write
DF0000
direct allocation
page read and write
1CD1F000
stack
page read and write
47E1000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
DD4000
heap
page read and write
47E1000
heap
page read and write
365F000
stack
page read and write
DF0000
direct allocation
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
1D22C000
stack
page read and write
4D9F000
stack
page read and write
DD4000
heap
page read and write
419F000
stack
page read and write
315F000
stack
page read and write
47E1000
heap
page read and write
DD4000
heap
page read and write
47E1000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
3F5E000
stack
page read and write
1CADE000
stack
page read and write
47E1000
heap
page read and write
DF0000
direct allocation
page read and write
47E1000
heap
page read and write
41DE000
stack
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
DD4000
heap
page read and write
E6E000
heap
page read and write
2A2C000
stack
page read and write
47E0000
heap
page read and write
2F1E000
stack
page read and write
1CE5F000
stack
page read and write
445E000
stack
page read and write
9DC000
stack
page read and write
47E1000
heap
page read and write
DE0000
heap
page read and write
2EDF000
stack
page read and write
DF0000
direct allocation
page read and write
305E000
stack
page read and write
1CC1E000
stack
page read and write
47E1000
heap
page read and write
37DE000
stack
page read and write
3E1E000
stack
page read and write
DD4000
heap
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
DD4000
heap
page read and write
1D3D0000
heap
page read and write
4800000
heap
page read and write
32DE000
stack
page read and write
2A50000
heap
page read and write
2A57000
heap
page read and write
DAE000
stack
page read and write
DD4000
heap
page read and write
47E1000
heap
page read and write
1D2CE000
stack
page read and write
2A40000
direct allocation
page read and write
DD4000
heap
page read and write
47E1000
heap
page read and write
46DE000
stack
page read and write
71C000
unkown
page execute and write copy
4E00000
direct allocation
page execute and read and write
DD4000
heap
page read and write
DD4000
heap
page read and write
DD4000
heap
page read and write
1CF9F000
stack
page read and write
1D0ED000
stack
page read and write
4C40000
heap
page read and write
47E1000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
DD4000
heap
page read and write
DD0000
heap
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
DD4000
heap
page read and write
47E1000
heap
page read and write
70E000
unkown
page execute and read and write
29EE000
stack
page read and write
10CF000
stack
page read and write
38DF000
stack
page read and write
2B5F000
stack
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
DF0000
direct allocation
page read and write
DD4000
heap
page read and write
3B9E000
stack
page read and write
2C9E000
stack
page read and write
DD4000
heap
page read and write
DD4000
heap
page read and write
47E1000
heap
page read and write
DD4000
heap
page read and write
DD4000
heap
page read and write
47E1000
heap
page read and write
466000
unkown
page execute and read and write
47E1000
heap
page read and write
369E000
stack
page read and write
E52000
heap
page read and write
DD4000
heap
page read and write
47E1000
heap
page read and write
DF0000
direct allocation
page read and write
DD4000
heap
page read and write
47E1000
heap
page read and write
E85000
heap
page read and write
33DF000
stack
page read and write
3B5F000
stack
page read and write
190000
unkown
page read and write
28AE000
stack
page read and write
1BC000
unkown
page execute and read and write
4DD0000
direct allocation
page execute and read and write
DD4000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
379F000
stack
page read and write
706000
unkown
page execute and read and write
42DF000
stack
page read and write
4C8B000
direct allocation
page read and write
DD4000
heap
page read and write
DD4000
heap
page read and write
47E1000
heap
page read and write
E65000
heap
page read and write
47E1000
heap
page read and write
CF4000
stack
page read and write
DD4000
heap
page read and write
319E000
stack
page read and write
47E1000
heap
page read and write
431E000
stack
page read and write
47E1000
heap
page read and write
8BA000
unkown
page execute and read and write
E4F000
heap
page read and write
47E1000
heap
page read and write
3C9F000
stack
page read and write
1CE9E000
stack
page read and write
409E000
stack
page read and write
DD4000
heap
page read and write
2C5F000
stack
page read and write
E0A000
heap
page read and write
2A5B000
heap
page read and write
1CBDF000
stack
page read and write
DF0000
direct allocation
page read and write
47F0000
heap
page read and write
301F000
stack
page read and write
2CD000
unkown
page execute and read and write
47E1000
heap
page read and write
71C000
unkown
page execute and read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
190000
unkown
page readonly
29AE000
stack
page read and write
47E1000
heap
page read and write
405F000
stack
page read and write
329F000
stack
page read and write
DD4000
heap
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
3DDF000
stack
page read and write
355E000
stack
page read and write
8BB000
unkown
page execute and write copy
47E1000
heap
page read and write
There are 226 hidden memdumps, click here to show them.