Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/405117-2476756634-1003
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php_
|
unknown
|
||
http://185.215.113.206/~gq
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206/$
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5370000
|
direct allocation
|
page read and write
|
||
150E000
|
heap
|
page read and write
|
||
C81000
|
unkown
|
page execute and read and write
|
||
DC9000
|
unkown
|
page execute and read and write
|
||
14A5000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
C81000
|
unkown
|
page execute and write copy
|
||
4EF1000
|
heap
|
page read and write
|
||
14AF000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
120C000
|
unkown
|
page execute and read and write
|
||
183E000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
5350000
|
heap
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
1664000
|
heap
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
1664000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1D6AF000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
1650000
|
direct allocation
|
page read and write
|
||
1578000
|
heap
|
page read and write
|
||
1554000
|
heap
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
14F0000
|
direct allocation
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4EF0000
|
heap
|
page read and write
|
||
14F0000
|
direct allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1D32E000
|
stack
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
1D83D000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
163D000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
CAC000
|
unkown
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
120D000
|
unkown
|
page execute and write copy
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
1D9DE000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1D2EF000
|
stack
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF6000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EEF000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
32A7000
|
heap
|
page read and write
|
||
1595000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
14F0000
|
direct allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
10F7000
|
unkown
|
page execute and read and write
|
||
DEE000
|
unkown
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
426F000
|
stack
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
1DADF000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1D42F000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
1574000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
120C000
|
unkown
|
page execute and write copy
|
||
38AE000
|
stack
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
14F0000
|
direct allocation
|
page read and write
|
||
539B000
|
direct allocation
|
page read and write
|
||
1D5AE000
|
stack
|
page read and write
|
||
1D56F000
|
stack
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
1650000
|
direct allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page read and write
|
||
13AA000
|
unkown
|
page execute and write copy
|
||
1664000
|
heap
|
page read and write
|
||
14F0000
|
direct allocation
|
page read and write
|
||
1DAE0000
|
heap
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
1D7FD000
|
stack
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
F56000
|
unkown
|
page execute and read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
402E000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
193E000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4DAF000
|
stack
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
14F0000
|
direct allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
1664000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4C6F000
|
stack
|
page read and write
|
||
14F0000
|
direct allocation
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
476F000
|
stack
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
1D93C000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
14F0000
|
direct allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
11FE000
|
unkown
|
page execute and read and write
|
||
14F0000
|
direct allocation
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
49EF000
|
stack
|
page read and write
|
||
F6A000
|
unkown
|
page execute and read and write
|
||
1569000
|
heap
|
page read and write
|
||
32AB000
|
heap
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
14F0000
|
direct allocation
|
page read and write
|
||
11D3000
|
unkown
|
page execute and read and write
|
||
1D6FD000
|
stack
|
page read and write
|
||
325C000
|
stack
|
page read and write
|
||
13A9000
|
unkown
|
page execute and read and write
|
||
39AF000
|
stack
|
page read and write
|
||
54AF000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
9BC000
|
stack
|
page read and write
|
||
1582000
|
heap
|
page read and write
|
||
14F0000
|
direct allocation
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
1D1EE000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
53AE000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
4B2F000
|
stack
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
14F0000
|
direct allocation
|
page read and write
|
||
11F6000
|
unkown
|
page execute and read and write
|
||
DBD000
|
unkown
|
page execute and read and write
|
||
1D46E000
|
stack
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
150A000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
14F0000
|
direct allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
14F0000
|
direct allocation
|
page read and write
|
There are 226 hidden memdumps, click here to show them.