Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpTI
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpXI
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpLI
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5E1000
|
unkown
|
page execute and read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
1CF0F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
3D9F000
|
stack
|
page read and write
|
||
441E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
3F1E000
|
stack
|
page read and write
|
||
9C2000
|
unkown
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
361F000
|
stack
|
page read and write
|
||
4B5F000
|
stack
|
page read and write
|
||
3B1F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
465F000
|
stack
|
page read and write
|
||
D1C000
|
stack
|
page read and write
|
||
43DF000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
39DF000
|
stack
|
page read and write
|
||
401F000
|
stack
|
page read and write
|
||
143F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
6C2000
|
unkown
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
491E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1D18E000
|
stack
|
page read and write
|
||
1D1CE000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
419D000
|
stack
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
2D57000
|
heap
|
page read and write
|
||
69D000
|
unkown
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1D31D000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
325F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
DC4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
AA4000
|
unkown
|
page execute and read and write
|
||
375F000
|
stack
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
329E000
|
stack
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
11B2000
|
heap
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
429F000
|
stack
|
page read and write
|
||
1D04F000
|
stack
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
AE2000
|
unkown
|
page execute and write copy
|
||
469E000
|
stack
|
page read and write
|
||
311F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1D41D000
|
stack
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
1D55C000
|
stack
|
page read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
2FDF000
|
stack
|
page read and write
|
||
405E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
11A7000
|
heap
|
page read and write
|
||
339F000
|
stack
|
page read and write
|
||
AC7000
|
unkown
|
page execute and read and write
|
||
455E000
|
stack
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
1110000
|
direct allocation
|
page read and write
|
||
5E0000
|
unkown
|
page read and write
|
||
82A000
|
unkown
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
365E000
|
stack
|
page read and write
|
||
10F5000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
2D30000
|
direct allocation
|
page execute and read and write
|
||
DC4000
|
heap
|
page read and write
|
||
315E000
|
stack
|
page read and write
|
||
1138000
|
heap
|
page read and write
|
||
691000
|
unkown
|
page execute and read and write
|
||
48DF000
|
stack
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
1196000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
157F000
|
stack
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
301E000
|
stack
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
AD3000
|
unkown
|
page execute and read and write
|
||
5E1000
|
unkown
|
page execute and write copy
|
||
2D5B000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
1D08E000
|
stack
|
page read and write
|
||
2D40000
|
direct allocation
|
page execute and read and write
|
||
C83000
|
unkown
|
page execute and read and write
|
||
DC4000
|
heap
|
page read and write
|
||
1D2CF000
|
stack
|
page read and write
|
||
4B60000
|
heap
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
4A1F000
|
stack
|
page read and write
|
||
42DE000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
3DDE000
|
stack
|
page read and write
|
||
1CF4E000
|
stack
|
page read and write
|
||
2EDC000
|
stack
|
page read and write
|
||
511F000
|
stack
|
page read and write
|
||
3C9E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
389F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
1110000
|
direct allocation
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
3C5F000
|
stack
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
451F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
AE1000
|
unkown
|
page execute and write copy
|
||
4B61000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page execute and read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
3A1E000
|
stack
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
83E000
|
unkown
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
3EDF000
|
stack
|
page read and write
|
||
2D20000
|
direct allocation
|
page execute and read and write
|
||
DC4000
|
heap
|
page read and write
|
||
C84000
|
unkown
|
page execute and write copy
|
||
33DE000
|
stack
|
page read and write
|
||
117E000
|
heap
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1D45D000
|
stack
|
page read and write
|
||
1CE0E000
|
stack
|
page read and write
|
||
479F000
|
stack
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
415F000
|
stack
|
page read and write
|
||
3B5E000
|
stack
|
page read and write
|
||
2D40000
|
direct allocation
|
page execute and read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
AE1000
|
unkown
|
page execute and read and write
|
||
DC4000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
38DE000
|
stack
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
34DF000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
379E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
There are 220 hidden memdumps, click here to show them.