Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37I
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.php8
|
unknown
|
||
http://185.215.113.37/;
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
124E000
|
heap
|
page read and write
|
||
691000
|
unkown
|
page execute and read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
1D37F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1D3CE000
|
stack
|
page read and write
|
||
1D4CD000
|
stack
|
page read and write
|
||
1D0DF000
|
stack
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
690000
|
unkown
|
page readonly
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
A78000
|
unkown
|
page execute and read and write
|
||
1D67E000
|
stack
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
1CF9F000
|
stack
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
741000
|
unkown
|
page execute and read and write
|
||
408E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
518F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
D27000
|
unkown
|
page execute and read and write
|
||
11E0000
|
heap
|
page read and write
|
||
2E07000
|
heap
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
3DCF000
|
stack
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
1D27E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
B8D000
|
unkown
|
page execute and write copy
|
||
4BC1000
|
heap
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
B54000
|
unkown
|
page execute and read and write
|
||
1D11E000
|
stack
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
2DEC000
|
stack
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5200000
|
direct allocation
|
page execute and read and write
|
||
418F000
|
stack
|
page read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
454F000
|
stack
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
468F000
|
stack
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
51DE000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
691000
|
unkown
|
page execute and write copy
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
118E000
|
stack
|
page read and write
|
||
1D780000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
8EE000
|
unkown
|
page execute and read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
2E00000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
B7D000
|
unkown
|
page execute and read and write
|
||
508E000
|
stack
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
12A8000
|
heap
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
378F000
|
stack
|
page read and write
|
||
490F000
|
stack
|
page read and write
|
||
150F000
|
stack
|
page read and write
|
||
38CF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
47CF000
|
stack
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
D28000
|
unkown
|
page execute and write copy
|
||
4BC1000
|
heap
|
page read and write
|
||
1D50E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1D77F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
1D21F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1292000
|
heap
|
page read and write
|
||
8DA000
|
unkown
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
B74000
|
unkown
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
74D000
|
unkown
|
page execute and read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
10F5000
|
stack
|
page read and write
|
||
1CFDE000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
124A000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
B8C000
|
unkown
|
page execute and write copy
|
||
350F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
772000
|
unkown
|
page execute and read and write
|
||
480E000
|
stack
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
B8C000
|
unkown
|
page execute and read and write
|
||
364F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1D60C000
|
stack
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
12C2000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1D784000
|
heap
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BED000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
DBC000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
There are 196 hidden memdumps, click here to show them.