Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpS
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpc
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpF
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
||
ax-0001.ax-msedge.net
|
150.171.27.10
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
tse1.mm.bing.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
998000
|
heap
|
page read and write
|
||
E11000
|
unkown
|
page execute and read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
E00000
|
direct allocation
|
page read and write
|
||
49FF000
|
stack
|
page read and write
|
||
9D7000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
1CCFE000
|
stack
|
page read and write
|
||
D7C000
|
stack
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
E00000
|
direct allocation
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
48BF000
|
stack
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A10000
|
heap
|
page read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
1CDFF000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
403D000
|
stack
|
page read and write
|
||
8AD000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4FBF000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
E00000
|
direct allocation
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
1522000
|
unkown
|
page execute and read and write
|
||
8C4000
|
heap
|
page read and write
|
||
4A00000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
97A000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
E3C000
|
unkown
|
page execute and read and write
|
||
4DC000
|
stack
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
34FE000
|
stack
|
page read and write
|
||
4EAB000
|
direct allocation
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
2DE0000
|
direct allocation
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
1380000
|
unkown
|
page execute and read and write
|
||
10FA000
|
unkown
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
E00000
|
direct allocation
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
E00000
|
direct allocation
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
138F000
|
unkown
|
page execute and write copy
|
||
327E000
|
stack
|
page read and write
|
||
E00000
|
direct allocation
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
1390000
|
unkown
|
page execute and write copy
|
||
4A01000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
1523000
|
unkown
|
page execute and write copy
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
E00000
|
direct allocation
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
1281000
|
unkown
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
138F000
|
unkown
|
page execute and read and write
|
||
8C4000
|
heap
|
page read and write
|
||
2DFB000
|
heap
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
1D30C000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
10E6000
|
unkown
|
page execute and read and write
|
||
2DF7000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
1CE3E000
|
stack
|
page read and write
|
||
1D44F000
|
stack
|
page read and write
|
||
1D20D000
|
stack
|
page read and write
|
||
E10000
|
unkown
|
page read and write
|
||
39FE000
|
stack
|
page read and write
|
||
1351000
|
unkown
|
page execute and read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
8C4000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
1CF7E000
|
stack
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
F59000
|
unkown
|
page execute and read and write
|
||
44FF000
|
stack
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
97E000
|
heap
|
page read and write
|
||
9F9000
|
heap
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
E00000
|
direct allocation
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
9F1000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
1CF3E000
|
stack
|
page read and write
|
||
5D4000
|
stack
|
page read and write
|
||
F4D000
|
unkown
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
E00000
|
direct allocation
|
page read and write
|
||
E00000
|
direct allocation
|
page read and write
|
||
9C4000
|
heap
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
1D07F000
|
stack
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
E11000
|
unkown
|
page execute and write copy
|
||
1D1BF000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
1D34E000
|
stack
|
page read and write
|
||
E00000
|
direct allocation
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
993000
|
heap
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
1D0BE000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
8C4000
|
heap
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
1379000
|
unkown
|
page execute and read and write
|
||
8C4000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
463F000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
F7E000
|
unkown
|
page execute and read and write
|
||
E00000
|
direct allocation
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
4B00000
|
trusted library allocation
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
E00000
|
direct allocation
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
E00000
|
direct allocation
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
2DE0000
|
direct allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
There are 222 hidden memdumps, click here to show them.