Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpa-
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
21000
|
unkown
|
page execute and read and write
|
||
FBE000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
399E000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
5B1000
|
unkown
|
page execute and write copy
|
||
49A1000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
49B7000
|
heap
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
5B0000
|
unkown
|
page execute and write copy
|
||
449F000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
5A0000
|
unkown
|
page execute and read and write
|
||
49A1000
|
heap
|
page read and write
|
||
40DF000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
30A000
|
unkown
|
page execute and read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
128F000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
3F9F000
|
stack
|
page read and write
|
||
36DF000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
1004000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
BBC000
|
stack
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
1D560000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
1D54E000
|
stack
|
page read and write
|
||
489E000
|
stack
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
2D57000
|
heap
|
page read and write
|
||
485F000
|
stack
|
page read and write
|
||
3C1E000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
4E5B000
|
direct allocation
|
page read and write
|
||
13CF000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
5B0000
|
unkown
|
page execute and read and write
|
||
1CCBE000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
1D1CD000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
4C000
|
unkown
|
page execute and read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
169000
|
unkown
|
page execute and read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
49A1000
|
heap
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
1D03F000
|
stack
|
page read and write
|
||
425E000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
45DF000
|
stack
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
1001000
|
heap
|
page read and write
|
||
359F000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
381F000
|
stack
|
page read and write
|
||
FB8000
|
heap
|
page read and write
|
||
1D40E000
|
stack
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
2F6000
|
unkown
|
page execute and read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
18E000
|
unkown
|
page execute and read and write
|
||
49A1000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
345F000
|
stack
|
page read and write
|
||
1016000
|
heap
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
411E000
|
stack
|
page read and write
|
||
15D000
|
unkown
|
page execute and read and write
|
||
1CF3E000
|
stack
|
page read and write
|
||
2CEC000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
3E5F000
|
stack
|
page read and write
|
||
1D564000
|
heap
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
49A1000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
1D07E000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
3D5E000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
1CDBF000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
1CDFE000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
49A1000
|
heap
|
page read and write
|
||
1D17F000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
3D1F000
|
stack
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
471F000
|
stack
|
page read and write
|
||
3FDD000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
598000
|
unkown
|
page execute and read and write
|
||
49A1000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
21000
|
unkown
|
page execute and write copy
|
||
49A1000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
385E000
|
stack
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
1032000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
FF7000
|
heap
|
page read and write
|
||
4F6F000
|
stack
|
page read and write
|
||
3ADE000
|
stack
|
page read and write
|
||
1D44D000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
10B4000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
4E10000
|
heap
|
page read and write
|
||
492000
|
unkown
|
page execute and read and write
|
||
1CEFF000
|
stack
|
page read and write
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
||
435F000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
3A9F000
|
stack
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
421F000
|
stack
|
page read and write
|
||
1D30D000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
49A1000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
3BDF000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
751000
|
unkown
|
page execute and read and write
|
||
49A1000
|
heap
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
752000
|
unkown
|
page execute and write copy
|
||
49A1000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
49B0000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
395F000
|
stack
|
page read and write
|
||
1D2CD000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
EF4000
|
stack
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
3E9E000
|
stack
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
575000
|
unkown
|
page execute and read and write
|
||
461E000
|
stack
|
page read and write
|
||
499F000
|
stack
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
349E000
|
stack
|
page read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
21000
|
unkown
|
page execute and write copy
|
||
2D40000
|
direct allocation
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
49A0000
|
heap
|
page read and write
|
There are 226 hidden memdumps, click here to show them.