Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/0
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpN
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.php/
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpz
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpfh
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0015.t-0009.t-msedge.net
|
13.107.246.43
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
681000
|
unkown
|
page execute and read and write
|
||
5020000
|
direct allocation
|
page read and write
|
||
140E000
|
heap
|
page read and write
|
||
4B9F000
|
stack
|
page read and write
|
||
504B000
|
direct allocation
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
351F000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
47DF000
|
stack
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
3F5E000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
2E97000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
BC6000
|
unkown
|
page execute and read and write
|
||
431E000
|
stack
|
page read and write
|
||
469F000
|
stack
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
33DF000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
3F1F000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
1482000
|
heap
|
page read and write
|
||
1D1EE000
|
stack
|
page read and write
|
||
365F000
|
stack
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
1D0AF000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
BF6000
|
unkown
|
page execute and read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
DA3000
|
unkown
|
page execute and write copy
|
||
455F000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
2E80000
|
direct allocation
|
page execute and read and write
|
||
10F5000
|
stack
|
page read and write
|
||
2E60000
|
direct allocation
|
page execute and read and write
|
||
12E4000
|
heap
|
page read and write
|
||
419F000
|
stack
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
3CDE000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
495E000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
459E000
|
stack
|
page read and write
|
||
1D32F000
|
stack
|
page read and write
|
||
1D47D000
|
stack
|
page read and write
|
||
1D762000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
491F000
|
stack
|
page read and write
|
||
680000
|
unkown
|
page read and write
|
||
441F000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
1D37D000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
1452000
|
heap
|
page read and write
|
||
7C9000
|
unkown
|
page execute and read and write
|
||
4A5F000
|
stack
|
page read and write
|
||
15FE000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
12AE000
|
stack
|
page read and write
|
||
1D4BE000
|
stack
|
page read and write
|
||
956000
|
unkown
|
page execute and read and write
|
||
46DE000
|
stack
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
7BD000
|
unkown
|
page execute and read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
1CFAE000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
96A000
|
unkown
|
page execute and read and write
|
||
515F000
|
stack
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
329F000
|
stack
|
page read and write
|
||
1D0ED000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
6AC000
|
unkown
|
page execute and read and write
|
||
12E4000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
1CE6E000
|
stack
|
page read and write
|
||
DA2000
|
unkown
|
page execute and read and write
|
||
C06000
|
unkown
|
page execute and read and write
|
||
140A000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
2E70000
|
direct allocation
|
page execute and read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1D22E000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
369E000
|
stack
|
page read and write
|
||
1CF6F000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1D5BE000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
1D75E000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
C07000
|
unkown
|
page execute and write copy
|
||
505E000
|
stack
|
page read and write
|
||
37DE000
|
stack
|
page read and write
|
||
3C9F000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
42DF000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
4A9E000
|
stack
|
page read and write
|
||
7EE000
|
unkown
|
page execute and read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
41DD000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
409E000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
3DDF000
|
stack
|
page read and write
|
||
3E1E000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
405F000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
481E000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
BEE000
|
unkown
|
page execute and read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
3A1F000
|
stack
|
page read and write
|
||
63C000
|
stack
|
page read and write
|
||
3B9E000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
C06000
|
unkown
|
page execute and write copy
|
||
12C0000
|
direct allocation
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
||
13F0000
|
direct allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
391E000
|
stack
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
38DF000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
1D760000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
681000
|
unkown
|
page execute and write copy
|
||
4BA1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
1469000
|
heap
|
page read and write
|
||
379F000
|
stack
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
445E000
|
stack
|
page read and write
|
||
13F0000
|
direct allocation
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
3A5E000
|
stack
|
page read and write
|
||
3B5F000
|
stack
|
page read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1D65E000
|
stack
|
page read and write
|
||
AF1000
|
unkown
|
page execute and read and write
|
||
12B0000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
2DDC000
|
stack
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
2E9B000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
There are 223 hidden memdumps, click here to show them.