Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.php6Y3
|
unknown
|
||
http://185.215.113.37DW
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpOF
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
8A1000
|
unkown
|
page execute and read and write
|
||
5280000
|
direct allocation
|
page read and write
|
||
140E000
|
heap
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
13B5000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page read and write
|
||
1D33E000
|
stack
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4A6E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4CAF000
|
stack
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
D92000
|
unkown
|
page execute and read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
F4E000
|
unkown
|
page execute and write copy
|
||
4DF1000
|
heap
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
180E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
95D000
|
unkown
|
page execute and read and write
|
||
1D82C000
|
stack
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
AEA000
|
unkown
|
page execute and read and write
|
||
16CE000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
D9C000
|
unkown
|
page execute and read and write
|
||
12FE000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1D98E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
F4D000
|
unkown
|
page execute and read and write
|
||
37AE000
|
stack
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
DAA000
|
unkown
|
page execute and write copy
|
||
4DF1000
|
heap
|
page read and write
|
||
1451000
|
heap
|
page read and write
|
||
951000
|
unkown
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1D990000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
1D88E000
|
stack
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
DAA000
|
unkown
|
page execute and read and write
|
||
FEC000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
144F000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1D6ED000
|
stack
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1D59F000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
48EF000
|
stack
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4E03000
|
heap
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4B6F000
|
stack
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
1D1FE000
|
stack
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
8A0000
|
unkown
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
540E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
D6D000
|
unkown
|
page execute and read and write
|
||
1D2FF000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
140A000
|
heap
|
page read and write
|
||
1D49E000
|
stack
|
page read and write
|
||
1D43F000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
30E7000
|
heap
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
30AE000
|
stack
|
page read and write
|
||
1D72D000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
4E10000
|
heap
|
page read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
1D5EE000
|
stack
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
C8A000
|
unkown
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
8A1000
|
unkown
|
page execute and write copy
|
||
30D0000
|
direct allocation
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
982000
|
unkown
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1483000
|
heap
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
4DEF000
|
stack
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
12F5000
|
stack
|
page read and write
|
||
5410000
|
direct allocation
|
page execute and read and write
|
||
302E000
|
stack
|
page read and write
|
||
1469000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
53BF000
|
stack
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
AFE000
|
unkown
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1D994000
|
heap
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
1D1BF000
|
stack
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
170E000
|
stack
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
DAB000
|
unkown
|
page execute and write copy
|
||
4DF1000
|
heap
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
There are 195 hidden memdumps, click here to show them.