Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/r
|
unknown
|
||
http://185.215.113.206/P
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php-
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpe/
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpu.
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php%.&
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpW
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
111000
|
unkown
|
page execute and read and write
|
||
E1E000
|
heap
|
page read and write
|
||
4B60000
|
direct allocation
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
CA4000
|
heap
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
24D000
|
unkown
|
page execute and read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
2A70000
|
direct allocation
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
1D03D000
|
stack
|
page read and write
|
||
2A2C000
|
stack
|
page read and write
|
||
32CF000
|
stack
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
1CAEF000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
2A70000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1CB2E000
|
stack
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
2A70000
|
direct allocation
|
page read and write
|
||
1CEBF000
|
stack
|
page read and write
|
||
46CF000
|
stack
|
page read and write
|
||
E78000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2A70000
|
direct allocation
|
page read and write
|
||
2A70000
|
direct allocation
|
page read and write
|
||
8EC000
|
stack
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1CFFD000
|
stack
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4B60000
|
direct allocation
|
page read and write
|
||
4B9E000
|
stack
|
page read and write
|
||
859000
|
unkown
|
page execute and read and write
|
||
CA4000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
4C9F000
|
stack
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
46E6000
|
heap
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
1CDBE000
|
stack
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
E96000
|
heap
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
CA4000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
2A70000
|
direct allocation
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
2A70000
|
direct allocation
|
page read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
E1A000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
9E5000
|
stack
|
page read and write
|
||
41CF000
|
stack
|
page read and write
|
||
699000
|
unkown
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2A70000
|
direct allocation
|
page read and write
|
||
6AF000
|
unkown
|
page execute and read and write
|
||
1CD6F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
2A70000
|
direct allocation
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
4B8B000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
672000
|
unkown
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
1D294000
|
heap
|
page read and write
|
||
1D290000
|
heap
|
page read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
259000
|
unkown
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D0000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
3E6000
|
unkown
|
page execute and read and write
|
||
CA4000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
46F0000
|
heap
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
408F000
|
stack
|
page read and write
|
||
2A70000
|
direct allocation
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4B60000
|
direct allocation
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
3FA000
|
unkown
|
page execute and read and write
|
||
85A000
|
unkown
|
page execute and write copy
|
||
380E000
|
stack
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
6AF000
|
unkown
|
page execute and write copy
|
||
46D1000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
110000
|
unkown
|
page readonly
|
||
CA4000
|
heap
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
2A70000
|
direct allocation
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
46E0000
|
heap
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
111000
|
unkown
|
page execute and write copy
|
||
27E000
|
unkown
|
page execute and read and write
|
||
1CC6E000
|
stack
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2A87000
|
heap
|
page read and write
|
||
1D27E000
|
stack
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
1CC2F000
|
stack
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2A70000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
1C9EE000
|
stack
|
page read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
2A70000
|
direct allocation
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
1CEFD000
|
stack
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
6A0000
|
unkown
|
page execute and read and write
|
||
458F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1D17E000
|
stack
|
page read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
420E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
2A70000
|
direct allocation
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
E63000
|
heap
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
||
6B0000
|
unkown
|
page execute and write copy
|
||
1D13E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
13C000
|
unkown
|
page execute and read and write
|
There are 226 hidden memdumps, click here to show them.