Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpu
|
unknown
|
||
http://185.215.113.206X
|
unknown
|
||
http://185.215.113.206/e
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
145E000
|
heap
|
page read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
6B1000
|
unkown
|
page execute and read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
141F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
C1F000
|
unkown
|
page execute and read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
DD3000
|
unkown
|
page execute and write copy
|
||
2F70000
|
direct allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
14DA000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
1CF6E000
|
stack
|
page read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
5260000
|
direct allocation
|
page execute and read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
6B0000
|
unkown
|
page readonly
|
||
4C61000
|
heap
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
B1C000
|
unkown
|
page execute and read and write
|
||
1D0AE000
|
stack
|
page read and write
|
||
6B1000
|
unkown
|
page execute and write copy
|
||
12A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
14B7000
|
heap
|
page read and write
|
||
510B000
|
direct allocation
|
page read and write
|
||
6DC000
|
unkown
|
page execute and read and write
|
||
34DE000
|
stack
|
page read and write
|
||
4C5F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
986000
|
unkown
|
page execute and read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
35DF000
|
stack
|
page read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
2FDB000
|
stack
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
5260000
|
direct allocation
|
page execute and read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
7F9000
|
unkown
|
page execute and read and write
|
||
C37000
|
unkown
|
page execute and read and write
|
||
7ED000
|
unkown
|
page execute and read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
30DF000
|
stack
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
1D5BD000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
521F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
158E000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1D42F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
1D1EE000
|
stack
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
BFA000
|
unkown
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
1458000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
81E000
|
unkown
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
168E000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
1D06F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
C29000
|
unkown
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1164000
|
stack
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
106C000
|
stack
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
DD2000
|
unkown
|
page execute and read and write
|
||
2F9B000
|
heap
|
page read and write
|
||
1D57D000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
2F97000
|
heap
|
page read and write
|
||
116E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1D2EF000
|
stack
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
99A000
|
unkown
|
page execute and read and write
|
||
429E000
|
stack
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
6B0000
|
unkown
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
5260000
|
direct allocation
|
page execute and read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
12A4000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
1D32E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
C38000
|
unkown
|
page execute and write copy
|
||
C37000
|
unkown
|
page execute and write copy
|
||
12A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1D47D000
|
stack
|
page read and write
|
||
14A3000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
1D1AF000
|
stack
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
1D6BC000
|
stack
|
page read and write
|
There are 221 hidden memdumps, click here to show them.