Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/c
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpS
|
unknown
|
||
http://185.215.113.206/_
|
unknown
|
||
http://185.215.113.206/Z
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpk
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php6
|
unknown
|
||
http://185.215.113.206j
|
unknown
|
||
http://185.215.113.206/4
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
11AE000
|
heap
|
page read and write
|
||
181000
|
unkown
|
page execute and read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
1CFAF000
|
stack
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
46A000
|
unkown
|
page execute and read and write
|
||
4A91000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
33FF000
|
stack
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
4A90000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
5EB000
|
unkown
|
page execute and read and write
|
||
4A91000
|
heap
|
page read and write
|
||
456000
|
unkown
|
page execute and read and write
|
||
10D0000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
6FD000
|
unkown
|
page execute and read and write
|
||
1D29E000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
1CEAE000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
4A91000
|
heap
|
page read and write
|
||
1D39E000
|
stack
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
1CE6F000
|
stack
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
505F000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4AA3000
|
heap
|
page read and write
|
||
1D24F000
|
stack
|
page read and write
|
||
6CD000
|
unkown
|
page execute and read and write
|
||
2C9000
|
unkown
|
page execute and read and write
|
||
407F000
|
stack
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
2BD000
|
unkown
|
page execute and read and write
|
||
457F000
|
stack
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
E8C000
|
stack
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
4A91000
|
heap
|
page read and write
|
||
70C000
|
unkown
|
page execute and write copy
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
1CFEE000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
2D77000
|
heap
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4F4B000
|
direct allocation
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
70B000
|
unkown
|
page execute and read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
4AA0000
|
heap
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
180000
|
unkown
|
page readonly
|
||
181000
|
unkown
|
page execute and write copy
|
||
6F3000
|
unkown
|
page execute and read and write
|
||
1D14E000
|
stack
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
70B000
|
unkown
|
page execute and write copy
|
||
1223000
|
heap
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
11F3000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
447E000
|
stack
|
page read and write
|
||
1D4DC000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
1D3DD000
|
stack
|
page read and write
|
||
1AC000
|
unkown
|
page execute and read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
F85000
|
stack
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
8AA000
|
unkown
|
page execute and write copy
|
||
1D0EE000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
2CBC000
|
stack
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
122C000
|
heap
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
8A9000
|
unkown
|
page execute and read and write
|
||
117E000
|
stack
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
2D7B000
|
heap
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
FF5000
|
heap
|
page read and write
|
||
2EE000
|
unkown
|
page execute and read and write
|
||
493F000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
4A91000
|
heap
|
page read and write
|
There are 197 hidden memdumps, click here to show them.