Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpC
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phps
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/
|
unknown
|
||
http://185.215.113.206/:
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php;
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5530000
|
direct allocation
|
page read and write
|
||
E61000
|
unkown
|
page execute and read and write
|
||
171E000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
1AEE000
|
stack
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
3310000
|
direct allocation
|
page execute and read and write
|
||
1814000
|
heap
|
page read and write
|
||
13E0000
|
unkown
|
page execute and read and write
|
||
1814000
|
heap
|
page read and write
|
||
4A6F000
|
stack
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
4CEF000
|
stack
|
page read and write
|
||
1DADE000
|
stack
|
page read and write
|
||
1D48F000
|
stack
|
page read and write
|
||
16F0000
|
direct allocation
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
1D38E000
|
stack
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
114A000
|
unkown
|
page execute and read and write
|
||
50AF000
|
stack
|
page read and write
|
||
19EF000
|
stack
|
page read and write
|
||
496E000
|
stack
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
1DC7F000
|
stack
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
1695000
|
stack
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
E60000
|
unkown
|
page readonly
|
||
1814000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
1710000
|
heap
|
page read and write
|
||
FA9000
|
unkown
|
page execute and read and write
|
||
50B1000
|
heap
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
1D5CF000
|
stack
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
1D99D000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
5680000
|
direct allocation
|
page execute and read and write
|
||
37AF000
|
stack
|
page read and write
|
||
3F2F000
|
stack
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
E60000
|
unkown
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
175E000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
492F000
|
stack
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
482E000
|
stack
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
5680000
|
direct allocation
|
page execute and read and write
|
||
50B1000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
50B0000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
1593000
|
unkown
|
page execute and write copy
|
||
50B1000
|
heap
|
page read and write
|
||
4E2F000
|
stack
|
page read and write
|
||
5680000
|
direct allocation
|
page execute and read and write
|
||
50B1000
|
heap
|
page read and write
|
||
1D84F000
|
stack
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
16DE000
|
stack
|
page read and write
|
||
1D9DE000
|
stack
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
1700000
|
direct allocation
|
page execute and read and write
|
||
1814000
|
heap
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
4D2E000
|
stack
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
1DC80000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
1592000
|
unkown
|
page execute and read and write
|
||
BB0000
|
heap
|
page read and write
|
||
4F6F000
|
stack
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
F9D000
|
unkown
|
page execute and read and write
|
||
330C000
|
stack
|
page read and write
|
||
1DB7E000
|
stack
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
5670000
|
direct allocation
|
page execute and read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
3327000
|
heap
|
page read and write
|
||
1D74E000
|
stack
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
41AF000
|
stack
|
page read and write
|
||
1D70E000
|
stack
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
1D4CE000
|
stack
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
54F0000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
566F000
|
stack
|
page read and write
|
||
555B000
|
direct allocation
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
46AF000
|
stack
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
1792000
|
heap
|
page read and write
|
||
1D60E000
|
stack
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
13B3000
|
unkown
|
page execute and read and write
|
||
1780000
|
heap
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
1D89D000
|
stack
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
1810000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
1136000
|
unkown
|
page execute and read and write
|
||
50B1000
|
heap
|
page read and write
|
||
171A000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
56B0000
|
direct allocation
|
page execute and read and write
|
||
1814000
|
heap
|
page read and write
|
||
5690000
|
direct allocation
|
page execute and read and write
|
||
16F0000
|
direct allocation
|
page read and write
|
||
13D9000
|
unkown
|
page execute and read and write
|
||
1814000
|
heap
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
13EF000
|
unkown
|
page execute and write copy
|
||
37EE000
|
stack
|
page read and write
|
||
56A0000
|
direct allocation
|
page execute and read and write
|
||
332B000
|
heap
|
page read and write
|
||
4BAF000
|
stack
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
1779000
|
heap
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
169E000
|
stack
|
page read and write
|
||
1762000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
B4C000
|
stack
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
E61000
|
unkown
|
page execute and write copy
|
||
12D0000
|
unkown
|
page execute and read and write
|
||
50B1000
|
heap
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
13F0000
|
unkown
|
page execute and write copy
|
||
50B1000
|
heap
|
page read and write
|
||
38EF000
|
stack
|
page read and write
|
||
13EF000
|
unkown
|
page execute and read and write
|
||
50B1000
|
heap
|
page read and write
|
||
1814000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
E8C000
|
unkown
|
page execute and read and write
|
||
FCE000
|
unkown
|
page execute and read and write
|
There are 225 hidden memdumps, click here to show them.