Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/s
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/
|
unknown
|
||
http://185.215.113.206/J
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpEs
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php%
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
F1E000
|
heap
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
361000
|
unkown
|
page execute and read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
49D000
|
unkown
|
page execute and read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
492F000
|
stack
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4940000
|
heap
|
page read and write
|
||
2BD0000
|
direct allocation
|
page execute and read and write
|
||
10C4000
|
heap
|
page read and write
|
||
F1A000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
10B0000
|
direct allocation
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
2BEB000
|
heap
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
F9F000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
47EF000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
10C4000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
1CD0F000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
3F2F000
|
stack
|
page read and write
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
A7A000
|
unkown
|
page execute and read and write
|
||
316F000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
8E3000
|
unkown
|
page execute and write copy
|
||
10C4000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
7CE000
|
unkown
|
page execute and read and write
|
||
10C4000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
108E000
|
stack
|
page read and write
|
||
64A000
|
unkown
|
page execute and read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4CE000
|
unkown
|
page execute and read and write
|
||
1D21C000
|
stack
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
8CA000
|
unkown
|
page execute and read and write
|
||
4931000
|
heap
|
page read and write
|
||
360000
|
unkown
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
1CE8E000
|
stack
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
1D11D000
|
stack
|
page read and write
|
||
2BC0000
|
direct allocation
|
page execute and read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
F5E000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
38EF000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
1CC0E000
|
stack
|
page read and write
|
||
2BE7000
|
heap
|
page read and write
|
||
636000
|
unkown
|
page execute and read and write
|
||
F93000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
46AF000
|
stack
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
361000
|
unkown
|
page execute and write copy
|
||
4931000
|
heap
|
page read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
1D25E000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
4EEF000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
8E4000
|
unkown
|
page execute and write copy
|
||
4931000
|
heap
|
page read and write
|
||
1D35F000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
8A5000
|
unkown
|
page execute and read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4DDB000
|
direct allocation
|
page read and write
|
||
10B0000
|
direct allocation
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
F64000
|
heap
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4F20000
|
direct allocation
|
page execute and read and write
|
||
1CD4E000
|
stack
|
page read and write
|
||
F79000
|
heap
|
page read and write
|
||
38C000
|
unkown
|
page execute and read and write
|
||
10C4000
|
heap
|
page read and write
|
||
2B7B000
|
stack
|
page read and write
|
||
41AF000
|
stack
|
page read and write
|
||
4F30000
|
direct allocation
|
page execute and read and write
|
||
10C4000
|
heap
|
page read and write
|
||
482E000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
EF4000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
B0C000
|
stack
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
8D5000
|
unkown
|
page execute and read and write
|
||
4A9000
|
unkown
|
page execute and read and write
|
||
1CE4F000
|
stack
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4930000
|
heap
|
page read and write
|
||
8E3000
|
unkown
|
page execute and read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
1CF8E000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
1CFCE000
|
stack
|
page read and write
|
||
1D0CF000
|
stack
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
There are 221 hidden memdumps, click here to show them.