Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206xj:o
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/m
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpl
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpH
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5130000
|
direct allocation
|
page read and write
|
||
7E1000
|
unkown
|
page execute and read and write
|
||
143E000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
1D4AD000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
1499000
|
heap
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
1D6EC000
|
stack
|
page read and write
|
||
12FF000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
142B000
|
stack
|
page read and write
|
||
14B6000
|
heap
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
AB6000
|
unkown
|
page execute and read and write
|
||
2F90000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
12F5000
|
stack
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
172F000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
1D1FE000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
1D2FE000
|
stack
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
FF5000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
91D000
|
unkown
|
page execute and read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
D67000
|
unkown
|
page execute and write copy
|
||
5130000
|
direct allocation
|
page read and write
|
||
1D35E000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
49EF000
|
stack
|
page read and write
|
||
80C000
|
unkown
|
page execute and read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
399F000
|
stack
|
page read and write
|
||
1D5AD000
|
stack
|
page read and write
|
||
4B2F000
|
stack
|
page read and write
|
||
2F9B000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
515B000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
339F000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
D66000
|
unkown
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
50E0000
|
trusted library allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
1D1BF000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
39DE000
|
stack
|
page read and write
|
||
1D45F000
|
stack
|
page read and write
|
||
44E0000
|
heap
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
ACA000
|
unkown
|
page execute and read and write
|
||
4C6F000
|
stack
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
D58000
|
unkown
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CB0000
|
heap
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
143A000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
1483000
|
heap
|
page read and write
|
||
EFE000
|
unkown
|
page execute and read and write
|
||
526F000
|
stack
|
page read and write
|
||
76C000
|
stack
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA3000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
D66000
|
unkown
|
page execute and write copy
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
329F000
|
stack
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
EFF000
|
unkown
|
page execute and write copy
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
2F97000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
7E1000
|
unkown
|
page execute and write copy
|
||
7E0000
|
unkown
|
page readonly
|
||
1D5ED000
|
stack
|
page read and write
|
||
516E000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
5130000
|
direct allocation
|
page read and write
|
||
162E000
|
stack
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
C51000
|
unkown
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
14A7000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
1D07F000
|
stack
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
1D0BE000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
D2E000
|
unkown
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
94E000
|
unkown
|
page execute and read and write
|
||
929000
|
unkown
|
page execute and read and write
|
||
319F000
|
stack
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
D50000
|
unkown
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
There are 196 hidden memdumps, click here to show them.