Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/405117-2476756634-1003ge
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/
|
unknown
|
||
http://185.215.113.206/d?
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpeC
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpAC
|
unknown
|
||
http://185.215.113.206/$
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
CD1000
|
unkown
|
page execute and read and write
|
||
157E000
|
heap
|
page read and write
|
||
5190000
|
direct allocation
|
page read and write
|
||
1CFCE000
|
stack
|
page read and write
|
||
E19000
|
unkown
|
page execute and read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
14FF000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
13F4000
|
unkown
|
page execute and write copy
|
||
52F0000
|
direct allocation
|
page execute and read and write
|
||
1D8C2000
|
heap
|
page read and write
|
||
46CF000
|
stack
|
page read and write
|
||
1560000
|
direct allocation
|
page execute and read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4D30000
|
heap
|
page read and write
|
||
123F000
|
unkown
|
page execute and read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
FA6000
|
unkown
|
page execute and read and write
|
||
4D11000
|
heap
|
page read and write
|
||
121D000
|
unkown
|
page execute and read and write
|
||
BE4000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
1D34E000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
CD1000
|
unkown
|
page execute and write copy
|
||
3F8E000
|
stack
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
1D8BE000
|
stack
|
page read and write
|
||
3050000
|
direct allocation
|
page execute and read and write
|
||
4D11000
|
heap
|
page read and write
|
||
1D7BE000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
1D20F000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
CFC000
|
unkown
|
page execute and read and write
|
||
3070000
|
direct allocation
|
page execute and read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
3060000
|
direct allocation
|
page execute and read and write
|
||
BE0000
|
heap
|
page read and write
|
||
13F3000
|
unkown
|
page execute and read and write
|
||
4D11000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
CD0000
|
unkown
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4A8F000
|
stack
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
15DF000
|
heap
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
470E000
|
stack
|
page read and write
|
||
4D10000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
51BB000
|
direct allocation
|
page read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
CD0000
|
unkown
|
page readonly
|
||
444F000
|
stack
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
113E000
|
unkown
|
page execute and read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
1D8C0000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
1D38E000
|
stack
|
page read and write
|
||
3087000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
420E000
|
stack
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
304B000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
176F000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
1D48F000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
1D71C000
|
stack
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
1D4DD000
|
stack
|
page read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
32CF000
|
stack
|
page read and write
|
||
1257000
|
unkown
|
page execute and write copy
|
||
340F000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4BCF000
|
stack
|
page read and write
|
||
1249000
|
unkown
|
page execute and read and write
|
||
1257000
|
unkown
|
page execute and read and write
|
||
79C000
|
stack
|
page read and write
|
||
E0D000
|
unkown
|
page execute and read and write
|
||
4D11000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
15BD000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
15D8000
|
heap
|
page read and write
|
||
1D10E000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
408F000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
E3E000
|
unkown
|
page execute and read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4ACE000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
3070000
|
direct allocation
|
page execute and read and write
|
||
BE4000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
494F000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
15C2000
|
heap
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
1258000
|
unkown
|
page execute and write copy
|
||
4D11000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
1D0CF000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
15F3000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
AF5000
|
stack
|
page read and write
|
||
1D5DD000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
480F000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
308B000
|
heap
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
1D24E000
|
stack
|
page read and write
|
||
FBA000
|
unkown
|
page execute and read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
458F000
|
stack
|
page read and write
|
||
157A000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
3070000
|
direct allocation
|
page execute and read and write
|
||
BE4000
|
heap
|
page read and write
|
||
41CF000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
52CF000
|
stack
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
4D0F000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
1D61D000
|
stack
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
There are 226 hidden memdumps, click here to show them.