Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206k
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpt
|
unknown
|
||
http://185.215.113.206/=c
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpYB
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206/Pc
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php1B
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
971000
|
unkown
|
page execute and read and write
|
||
53C0000
|
direct allocation
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
1D97D000
|
stack
|
page read and write
|
||
971000
|
unkown
|
page execute and write copy
|
||
17E0000
|
direct allocation
|
page read and write
|
||
5520000
|
direct allocation
|
page execute and read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4DCF000
|
stack
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
17E0000
|
direct allocation
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
17E0000
|
direct allocation
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
1D44F000
|
stack
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
16BB000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
3C4F000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
AAD000
|
unkown
|
page execute and read and write
|
||
AB9000
|
unkown
|
page execute and read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
1D48E000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
3B0F000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
418E000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
ADE000
|
unkown
|
page execute and read and write
|
||
4F31000
|
heap
|
page read and write
|
||
19EE000
|
stack
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
17E0000
|
direct allocation
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
1843000
|
heap
|
page read and write
|
||
3C8E000
|
stack
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
53FC000
|
stack
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
1869000
|
heap
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
490E000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
1D58E000
|
stack
|
page read and write
|
||
5570000
|
direct allocation
|
page execute and read and write
|
||
EEB000
|
unkown
|
page execute and read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
EC1000
|
unkown
|
page execute and read and write
|
||
450F000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
17E0000
|
direct allocation
|
page read and write
|
||
17E0000
|
direct allocation
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F0F000
|
stack
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
4F31000
|
heap
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
3ECF000
|
stack
|
page read and write
|
||
EF9000
|
unkown
|
page execute and read and write
|
||
4F47000
|
heap
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
17E0000
|
direct allocation
|
page read and write
|
||
14F4000
|
stack
|
page read and write
|
||
54FF000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
112C000
|
stack
|
page read and write
|
||
1D73E000
|
stack
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
17E0000
|
direct allocation
|
page read and write
|
||
1876000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
17CE000
|
stack
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
4A0F000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
440E000
|
stack
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
11FE000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
3D8F000
|
stack
|
page read and write
|
||
1D83D000
|
stack
|
page read and write
|
||
163B000
|
heap
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
1093000
|
unkown
|
page execute and read and write
|
||
5550000
|
direct allocation
|
page execute and read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
970000
|
unkown
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
1D6FF000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
478F000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
EE3000
|
unkown
|
page execute and read and write
|
||
53C0000
|
direct allocation
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
43CF000
|
stack
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
17E0000
|
direct allocation
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
1637000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
1D34E000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
99C000
|
unkown
|
page execute and read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4C8F000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
1D87D000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
17E0000
|
direct allocation
|
page read and write
|
||
388F000
|
stack
|
page read and write
|
||
378E000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
464F000
|
stack
|
page read and write
|
||
5530000
|
direct allocation
|
page execute and read and write
|
||
C46000
|
unkown
|
page execute and read and write
|
||
EFA000
|
unkown
|
page execute and write copy
|
||
4F31000
|
heap
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
428F000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
C5A000
|
unkown
|
page execute and read and write
|
||
4F31000
|
heap
|
page read and write
|
||
39CF000
|
stack
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
17E0000
|
direct allocation
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
53C0000
|
direct allocation
|
page read and write
|
||
1094000
|
unkown
|
page execute and write copy
|
||
16C5000
|
heap
|
page read and write
|
||
167E000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
17E0000
|
direct allocation
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
1858000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
454D000
|
stack
|
page read and write
|
||
53EB000
|
direct allocation
|
page read and write
|
||
48CF000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
DE7000
|
unkown
|
page execute and read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
1D5FE000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
17FA000
|
heap
|
page read and write
|
||
17E0000
|
direct allocation
|
page read and write
|
||
17E0000
|
direct allocation
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
1D30F000
|
stack
|
page read and write
|
||
EF9000
|
unkown
|
page execute and write copy
|
There are 198 hidden memdumps, click here to show them.