Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/2
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php3
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php.
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/
|
unknown
|
||
http://185.215.113.206/:U
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
BA1000
|
unkown
|
page execute and read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E4F000
|
stack
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
8EC000
|
stack
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
324B000
|
heap
|
page read and write
|
||
BA1000
|
unkown
|
page execute and write copy
|
||
AF4000
|
heap
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
17CE000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
1D38E000
|
stack
|
page read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
408F000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
46CF000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
1DA00000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
BCC000
|
unkown
|
page execute and read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
12EA000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
BA0000
|
unkown
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
3230000
|
direct allocation
|
page execute and read and write
|
||
AF4000
|
heap
|
page read and write
|
||
52FB000
|
direct allocation
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
CE9000
|
unkown
|
page execute and read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
12B3000
|
unkown
|
page execute and write copy
|
||
4E51000
|
heap
|
page read and write
|
||
1D61D000
|
stack
|
page read and write
|
||
4A8F000
|
stack
|
page read and write
|
||
12B2000
|
unkown
|
page execute and read and write
|
||
4E51000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
BA0000
|
unkown
|
page readonly
|
||
3CCF000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
1D10E000
|
stack
|
page read and write
|
||
E76000
|
unkown
|
page execute and read and write
|
||
420E000
|
stack
|
page read and write
|
||
1D75E000
|
stack
|
page read and write
|
||
18CF000
|
stack
|
page read and write
|
||
12D0000
|
direct allocation
|
page execute and read and write
|
||
D0E000
|
unkown
|
page execute and read and write
|
||
4E51000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
13F0000
|
direct allocation
|
page execute and read and write
|
||
5410000
|
direct allocation
|
page execute and read and write
|
||
4E51000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
1D20F000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
4D4E000
|
stack
|
page read and write
|
||
4BCF000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
41CF000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
111D000
|
unkown
|
page execute and read and write
|
||
31EE000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
3230000
|
direct allocation
|
page execute and read and write
|
||
CDD000
|
unkown
|
page execute and read and write
|
||
458F000
|
stack
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
322E000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
1D48F000
|
stack
|
page read and write
|
||
134A000
|
heap
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
1333000
|
heap
|
page read and write
|
||
3247000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4E67000
|
heap
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
448D000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
E8A000
|
unkown
|
page execute and read and write
|
||
4D0F000
|
stack
|
page read and write
|
||
1D24E000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
1D8FE000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
1355000
|
heap
|
page read and write
|
||
1D5CF000
|
stack
|
page read and write
|
||
110D000
|
unkown
|
page execute and read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
470E000
|
stack
|
page read and write
|
||
1107000
|
unkown
|
page execute and read and write
|
||
3240000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
13E0000
|
direct allocation
|
page execute and read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
1D9FF000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
3230000
|
direct allocation
|
page execute and read and write
|
||
4E51000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4ACE000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
1D4CE000
|
stack
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
10E1000
|
unkown
|
page execute and read and write
|
||
1D34F000
|
stack
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
1D71D000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
111E000
|
unkown
|
page execute and write copy
|
||
9E5000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
494F000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
1D85D000
|
stack
|
page read and write
|
||
480F000
|
stack
|
page read and write
|
||
1371000
|
heap
|
page read and write
|
||
31AC000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
111D000
|
unkown
|
page execute and write copy
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
540F000
|
stack
|
page read and write
|
||
1007000
|
unkown
|
page execute and read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
There are 225 hidden memdumps, click here to show them.