Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php=DMJ
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/O
|
unknown
|
||
http://185.215.113.206/$
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4EF0000
|
direct allocation
|
page read and write
|
||
128E000
|
heap
|
page read and write
|
||
4C1000
|
unkown
|
page execute and read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
1D28D000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
BEC000
|
unkown
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
BED000
|
unkown
|
page execute and write copy
|
||
4A50000
|
direct allocation
|
page read and write
|
||
417F000
|
stack
|
page read and write
|
||
42BF000
|
stack
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
453F000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
12F9000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
F74000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
62E000
|
unkown
|
page execute and read and write
|
||
46CE000
|
stack
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
2DAB000
|
stack
|
page read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
A4D000
|
unkown
|
page execute and read and write
|
||
4F1B000
|
direct allocation
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
480E000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
1CFBF000
|
stack
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
1D0FF000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
1D23F000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
130B000
|
heap
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4C1000
|
unkown
|
page execute and write copy
|
||
F7E000
|
stack
|
page read and write
|
||
4EC000
|
unkown
|
page execute and read and write
|
||
A4E000
|
unkown
|
page execute and write copy
|
||
10A4000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
930000
|
unkown
|
page execute and read and write
|
||
10A4000
|
heap
|
page read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
1D38C000
|
stack
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
468F000
|
stack
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
A35000
|
unkown
|
page execute and read and write
|
||
108E000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
1D4CE000
|
stack
|
page read and write
|
||
A3E000
|
unkown
|
page execute and read and write
|
||
2DF7000
|
heap
|
page read and write
|
||
1CEBE000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
796000
|
unkown
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
A4D000
|
unkown
|
page execute and write copy
|
||
10A4000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
10A4000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A62000
|
heap
|
page read and write
|
||
490F000
|
stack
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
12E7000
|
heap
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
1CFFE000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
1D3CE000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A60000
|
heap
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
104D000
|
stack
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
1CE7F000
|
stack
|
page read and write
|
||
2DFB000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
1CD7E000
|
stack
|
page read and write
|
||
E7C000
|
stack
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
4540000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
A11000
|
unkown
|
page execute and read and write
|
||
5FD000
|
unkown
|
page execute and read and write
|
||
313F000
|
stack
|
page read and write
|
||
7AA000
|
unkown
|
page execute and read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
1288000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
609000
|
unkown
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3DBF000
|
stack
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
502F000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
47CF000
|
stack
|
page read and write
|
||
1D13E000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
10A4000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
There are 222 hidden memdumps, click here to show them.