Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpm%A
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpA%%
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5260000
|
direct allocation
|
page read and write
|
||
15DE000
|
heap
|
page read and write
|
||
811000
|
unkown
|
page execute and read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
F39000
|
unkown
|
page execute and read and write
|
||
1D71D000
|
stack
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
38AE000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
D84000
|
unkown
|
page execute and read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
AE6000
|
unkown
|
page execute and read and write
|
||
1400000
|
heap
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
148E000
|
stack
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
1D1AF000
|
stack
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
4B2F000
|
stack
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
D61000
|
unkown
|
page execute and read and write
|
||
43ED000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
539F000
|
stack
|
page read and write
|
||
1636000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
83C000
|
unkown
|
page execute and read and write
|
||
810000
|
unkown
|
page readonly
|
||
34EE000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
2FAB000
|
heap
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
1D32E000
|
stack
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
1D81C000
|
stack
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
5260000
|
direct allocation
|
page read and write
|
||
1D6DD000
|
stack
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
1D58F000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
D9A000
|
unkown
|
page execute and read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
D8B000
|
unkown
|
page execute and read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
1440000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
810000
|
unkown
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
15DA000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
1D5DD000
|
stack
|
page read and write
|
||
1445000
|
heap
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
1D9BF000
|
stack
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
811000
|
unkown
|
page execute and write copy
|
||
30EF000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
12F5000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
97E000
|
unkown
|
page execute and read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
312B000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
1D48E000
|
stack
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
5410000
|
direct allocation
|
page execute and read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
D9B000
|
unkown
|
page execute and write copy
|
||
322F000
|
stack
|
page read and write
|
||
528B000
|
direct allocation
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
1D8BE000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
AFA000
|
unkown
|
page execute and read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
D9A000
|
unkown
|
page execute and write copy
|
||
3EEE000
|
stack
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
C83000
|
unkown
|
page execute and read and write
|
||
43AF000
|
stack
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
959000
|
unkown
|
page execute and read and write
|
||
15CE000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
F3A000
|
unkown
|
page execute and write copy
|
||
3B2E000
|
stack
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
4DAF000
|
stack
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
FCC000
|
stack
|
page read and write
|
||
158E000
|
stack
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
1D42E000
|
stack
|
page read and write
|
||
49EF000
|
stack
|
page read and write
|
||
94D000
|
unkown
|
page execute and read and write
|
||
33AE000
|
stack
|
page read and write
|
||
4C6F000
|
stack
|
page read and write
|
||
4DD3000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
1D2EF000
|
stack
|
page read and write
|
||
1D9C0000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
17CF000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
5260000
|
direct allocation
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
1623000
|
heap
|
page read and write
|
||
161F000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
1D1EE000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
There are 200 hidden memdumps, click here to show them.