Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.phpN
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/#
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpc%
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpy
|
unknown
|
||
http://185.215.113.37/:
|
unknown
|
||
http://185.215.113.37S
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
931000
|
unkown
|
page execute and read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
10DE000
|
heap
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
2D20000
|
direct allocation
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
B7A000
|
unkown
|
page execute and read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
1D3DE000
|
stack
|
page read and write
|
||
49BF000
|
stack
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
1D2DE000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
D12000
|
unkown
|
page execute and read and write
|
||
44BF000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4AFF000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
FC4000
|
unkown
|
page execute and read and write
|
||
A12000
|
unkown
|
page execute and read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
930000
|
unkown
|
page read and write
|
||
2D3B000
|
heap
|
page read and write
|
||
1CEEE000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
115B000
|
heap
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
E29000
|
unkown
|
page execute and write copy
|
||
1D41D000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
473F000
|
stack
|
page read and write
|
||
E1A000
|
unkown
|
page execute and read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
2D37000
|
heap
|
page read and write
|
||
1CFEF000
|
stack
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
1D28F000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
9ED000
|
unkown
|
page execute and read and write
|
||
4B10000
|
heap
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
13DF000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
1D51C000
|
stack
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
1154000
|
heap
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
2D20000
|
direct allocation
|
page read and write
|
||
B8E000
|
unkown
|
page execute and read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
FC5000
|
unkown
|
page execute and write copy
|
||
E13000
|
unkown
|
page execute and read and write
|
||
10DA000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
905000
|
heap
|
page read and write
|
||
931000
|
unkown
|
page execute and write copy
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
930000
|
unkown
|
page readonly
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
50BF000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
4B01000
|
heap
|
page read and write
|
||
413D000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
2E7B000
|
stack
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
48BE000
|
stack
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
1D02E000
|
stack
|
page read and write
|
||
10C5000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
1CEAF000
|
stack
|
page read and write
|
||
1D12E000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
151F000
|
stack
|
page read and write
|
||
E2A000
|
unkown
|
page execute and write copy
|
||
4B01000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
1122000
|
heap
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
1138000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
1D18E000
|
stack
|
page read and write
|
||
DF1000
|
unkown
|
page execute and read and write
|
||
4B01000
|
heap
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B15000
|
heap
|
page read and write
|
||
E29000
|
unkown
|
page execute and read and write
|
||
900000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
487F000
|
stack
|
page read and write
|
||
9E1000
|
unkown
|
page execute and read and write
|
||
35FE000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
141D000
|
stack
|
page read and write
|
There are 193 hidden memdumps, click here to show them.