Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/?
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpR
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpb
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php1
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
126E000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
1D0AF000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
1CF6F000
|
stack
|
page read and write
|
||
2F0B000
|
heap
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
12E3000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
D7C000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B1000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
AA9000
|
unkown
|
page execute and read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
428F000
|
stack
|
page read and write
|
||
388F000
|
stack
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1CE6E000
|
stack
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
490E000
|
stack
|
page read and write
|
||
3ECF000
|
stack
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
3B0F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
39CF000
|
stack
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
907000
|
unkown
|
page execute and read and write
|
||
4B70000
|
heap
|
page read and write
|
||
1D37D000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
126A000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
159F000
|
stack
|
page read and write
|
||
450F000
|
stack
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
43CF000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1D65E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1D75F000
|
stack
|
page read and write
|
||
3C4F000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
1D5BC000
|
stack
|
page read and write
|
||
464F000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B60000
|
heap
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
8F9000
|
unkown
|
page execute and read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
4BD000
|
unkown
|
page execute and read and write
|
||
149E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
418D000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
8F1000
|
unkown
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
65E000
|
unkown
|
page execute and read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1D1EF000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
2EBC000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
12AE000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
64A000
|
unkown
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1D760000
|
heap
|
page read and write
|
||
1D4BD000
|
stack
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
350E000
|
stack
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute and write copy
|
||
38CE000
|
stack
|
page read and write
|
||
48CF000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
11D4000
|
heap
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
907000
|
unkown
|
page execute and write copy
|
||
2F07000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
1D0EE000
|
stack
|
page read and write
|
||
AAA000
|
unkown
|
page execute and write copy
|
||
11D4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
12B3000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
440E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
3C8E000
|
stack
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4E2000
|
unkown
|
page execute and read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
1D47E000
|
stack
|
page read and write
|
||
12B6000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
378E000
|
stack
|
page read and write
|
||
10F5000
|
stack
|
page read and write
|
||
1D32F000
|
stack
|
page read and write
|
||
1D22E000
|
stack
|
page read and write
|
||
12C7000
|
heap
|
page read and write
|
||
512F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
8CC000
|
unkown
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
3D8F000
|
stack
|
page read and write
|
||
478F000
|
stack
|
page read and write
|
||
4A0F000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
122D000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
908000
|
unkown
|
page execute and write copy
|
||
11D4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
7E9000
|
unkown
|
page execute and read and write
|
||
33CE000
|
stack
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1CFAE000
|
stack
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
There are 220 hidden memdumps, click here to show them.