Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php2
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phphc_
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.214.172
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
701000
|
unkown
|
page execute and read and write
|
||
11BE000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
C7A000
|
unkown
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
701000
|
unkown
|
page execute and write copy
|
||
2B67000
|
heap
|
page read and write
|
||
E35000
|
unkown
|
page execute and write copy
|
||
2B4E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
86E000
|
unkown
|
page execute and read and write
|
||
1034000
|
heap
|
page read and write
|
||
4D6E000
|
stack
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
101C000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
2B6B000
|
heap
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
11B0000
|
heap
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
1D48E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
1218000
|
heap
|
page read and write
|
||
1CE1E000
|
stack
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
1D38E000
|
stack
|
page read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
6F4000
|
stack
|
page read and write
|
||
1D1AC000
|
stack
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
1CB9E000
|
stack
|
page read and write
|
||
1CDDF000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
B74000
|
unkown
|
page execute and read and write
|
||
F8D000
|
stack
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
1CCDD000
|
stack
|
page read and write
|
||
1CC9F000
|
stack
|
page read and write
|
||
72C000
|
unkown
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
9EA000
|
unkown
|
page execute and read and write
|
||
1034000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1CF5E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
48B5000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
C90000
|
unkown
|
page execute and write copy
|
||
1202000
|
heap
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1D2EE000
|
stack
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
4E6F000
|
stack
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
48B1000
|
heap
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
E34000
|
unkown
|
page execute and write copy
|
||
9D6000
|
unkown
|
page execute and read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
1034000
|
heap
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
E34000
|
unkown
|
page execute and read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
1CF1F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
11BA000
|
heap
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
1D490000
|
heap
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
117E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
1D05F000
|
stack
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
C54000
|
unkown
|
page execute and read and write
|
||
1034000
|
heap
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
1D0AD000
|
stack
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
C81000
|
unkown
|
page execute and read and write
|
||
43AF000
|
stack
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
4D5B000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
C90000
|
unkown
|
page execute and read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
1D1EE000
|
stack
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
35C000
|
stack
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
1034000
|
heap
|
page read and write
|
||
C91000
|
unkown
|
page execute and write copy
|
||
1180000
|
direct allocation
|
page read and write
|
||
700000
|
unkown
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1D492000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
2B50000
|
direct allocation
|
page execute and read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
849000
|
unkown
|
page execute and read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
113F000
|
stack
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
48B0000
|
heap
|
page read and write
|
||
83D000
|
unkown
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
There are 226 hidden memdumps, click here to show them.