Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206k
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpz
|
unknown
|
||
http://185.215.113.206/j
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php6
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpv
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
F31000
|
unkown
|
page execute and read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
96E000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
1D16D000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
B5F000
|
stack
|
page read and write
|
||
1079000
|
unkown
|
page execute and read and write
|
||
4851000
|
heap
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
4870000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
470F000
|
stack
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
9C8000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
4850000
|
heap
|
page read and write
|
||
1D1AD000
|
stack
|
page read and write
|
||
109E000
|
unkown
|
page execute and read and write
|
||
370000
|
heap
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
3E4F000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
14BE000
|
unkown
|
page execute and read and write
|
||
4851000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
F31000
|
unkown
|
page execute and write copy
|
||
3F8E000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
106D000
|
unkown
|
page execute and read and write
|
||
4851000
|
heap
|
page read and write
|
||
4CB0000
|
heap
|
page read and write
|
||
1D2AC000
|
stack
|
page read and write
|
||
9F5000
|
heap
|
page read and write
|
||
3EE000
|
stack
|
page read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
4E0F000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
1CDDE000
|
stack
|
page read and write
|
||
14AF000
|
unkown
|
page execute and read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
484F000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
9B3000
|
heap
|
page read and write
|
||
14A8000
|
unkown
|
page execute and read and write
|
||
4851000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
1660000
|
unkown
|
page execute and write copy
|
||
950000
|
direct allocation
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
6F5000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
121A000
|
unkown
|
page execute and read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
1CD9F000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
9FA000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
8AC000
|
stack
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
864000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
448F000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
4CFB000
|
direct allocation
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
1CC9E000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
94B000
|
heap
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
8EE000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
1D01F000
|
stack
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
9D8000
|
heap
|
page read and write
|
||
474E000
|
stack
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
3ACE000
|
stack
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
165F000
|
unkown
|
page execute and read and write
|
||
4851000
|
heap
|
page read and write
|
||
394F000
|
stack
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
4950000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
4851000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
45CF000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
F30000
|
unkown
|
page readonly
|
||
1483000
|
unkown
|
page execute and read and write
|
||
930000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
1CF1E000
|
stack
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
9D5000
|
heap
|
page read and write
|
||
1206000
|
unkown
|
page execute and read and write
|
||
4851000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
14BE000
|
unkown
|
page execute and write copy
|
||
4851000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
F5C000
|
unkown
|
page execute and read and write
|
||
E9E000
|
stack
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
F30000
|
unkown
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
4851000
|
heap
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
1CC5F000
|
stack
|
page read and write
|
||
1CEDE000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
1CB5E000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
9AF000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
947000
|
heap
|
page read and write
|
||
438E000
|
stack
|
page read and write
|
||
4858000
|
heap
|
page read and write
|
||
9FC000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
14BF000
|
unkown
|
page execute and write copy
|
||
31C000
|
stack
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
1D06D000
|
stack
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4860000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
4851000
|
heap
|
page read and write
|
||
13A8000
|
unkown
|
page execute and read and write
|
||
4851000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
There are 227 hidden memdumps, click here to show them.