Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/t
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php&f&f
|
unknown
|
||
http://185.215.113.37w
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpfeV
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpVe
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4AA0000
|
direct allocation
|
page read and write
|
||
A71000
|
unkown
|
page execute and read and write
|
||
66E000
|
heap
|
page read and write
|
||
110A000
|
unkown
|
page execute and read and write
|
||
595000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
650000
|
direct allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
650000
|
direct allocation
|
page read and write
|
||
4AA0000
|
direct allocation
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
63B000
|
heap
|
page read and write
|
||
F33000
|
unkown
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
1CB5E000
|
stack
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
1D1EE000
|
stack
|
page read and write
|
||
4AA0000
|
direct allocation
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
650000
|
direct allocation
|
page read and write
|
||
637000
|
heap
|
page read and write
|
||
CCE000
|
unkown
|
page execute and read and write
|
||
30AF000
|
stack
|
page read and write
|
||
1D04D000
|
stack
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
1CA1D000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
650000
|
direct allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
F55000
|
unkown
|
page execute and read and write
|
||
1CB1E000
|
stack
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
650000
|
direct allocation
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
E58000
|
unkown
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
6DB000
|
heap
|
page read and write
|
||
4FE000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4A50000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
650000
|
direct allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
650000
|
direct allocation
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
A71000
|
unkown
|
page execute and write copy
|
||
2E2F000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1CDCF000
|
stack
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
1CF0E000
|
stack
|
page read and write
|
||
650000
|
direct allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4610000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1CC5F000
|
stack
|
page read and write
|
||
4630000
|
heap
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
650000
|
direct allocation
|
page read and write
|
||
110B000
|
unkown
|
page execute and write copy
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
650000
|
direct allocation
|
page read and write
|
||
1CCCE000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
B52000
|
unkown
|
page execute and read and write
|
||
2AAF000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
6E4000
|
heap
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
650000
|
direct allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
1CF4E000
|
stack
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
650000
|
direct allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
29AF000
|
stack
|
page read and write
|
||
45F0000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3C2D000
|
stack
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
1D1F2000
|
heap
|
page read and write
|
||
62C000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1D1F0000
|
heap
|
page read and write
|
||
66A000
|
heap
|
page read and write
|
||
1D0EE000
|
stack
|
page read and write
|
||
F6E000
|
unkown
|
page execute and read and write
|
||
B21000
|
unkown
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
6C8000
|
heap
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
6B3000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
1C9DF000
|
stack
|
page read and write
|
||
16C000
|
stack
|
page read and write
|
||
650000
|
direct allocation
|
page read and write
|
||
4F5000
|
stack
|
page read and write
|
||
B2D000
|
unkown
|
page execute and read and write
|
||
F5F000
|
unkown
|
page execute and read and write
|
||
34AE000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
A70000
|
unkown
|
page readonly
|
||
A70000
|
unkown
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1CE0D000
|
stack
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
F6F000
|
unkown
|
page execute and write copy
|
||
650000
|
direct allocation
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
F6E000
|
unkown
|
page execute and write copy
|
||
4611000
|
heap
|
page read and write
|
||
CBA000
|
unkown
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
There are 199 hidden memdumps, click here to show them.