Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.php;
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php5
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpu
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpX
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpg
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5000000
|
direct allocation
|
page read and write
|
||
4B1000
|
unkown
|
page execute and read and write
|
||
116E000
|
heap
|
page read and write
|
||
70E000
|
unkown
|
page execute and read and write
|
||
12E4000
|
heap
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
12D0000
|
direct allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2E67000
|
heap
|
page read and write
|
||
D8C000
|
stack
|
page read and write
|
||
9A0000
|
unkown
|
page execute and read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1D24E000
|
stack
|
page read and write
|
||
1CF7F000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
11E1000
|
heap
|
page read and write
|
||
513F000
|
stack
|
page read and write
|
||
2DDB000
|
stack
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
4A6E000
|
stack
|
page read and write
|
||
1D0FE000
|
stack
|
page read and write
|
||
12D0000
|
direct allocation
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
89D000
|
unkown
|
page execute and read and write
|
||
37AE000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
592000
|
unkown
|
page execute and read and write
|
||
362F000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
14BF000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
561000
|
unkown
|
page execute and read and write
|
||
4B71000
|
heap
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
15BE000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4B0000
|
unkown
|
page readonly
|
||
12E4000
|
heap
|
page read and write
|
||
97A000
|
unkown
|
page execute and read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1D0BF000
|
stack
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1D1FF000
|
stack
|
page read and write
|
||
1D38D000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
12D0000
|
direct allocation
|
page read and write
|
||
1D4CE000
|
stack
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
12D0000
|
direct allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
4B71000
|
heap
|
page read and write
|
||
12D0000
|
direct allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1D48D000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
4B1000
|
unkown
|
page execute and write copy
|
||
4B71000
|
heap
|
page read and write
|
||
9B7000
|
unkown
|
page execute and write copy
|
||
DF0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12D0000
|
direct allocation
|
page read and write
|
||
1CE7E000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
11AE000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
12D0000
|
direct allocation
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
11C7000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
6FA000
|
unkown
|
page execute and read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
12D0000
|
direct allocation
|
page read and write
|
||
12D0000
|
direct allocation
|
page read and write
|
||
12D0000
|
direct allocation
|
page read and write
|
||
12D0000
|
direct allocation
|
page read and write
|
||
12D0000
|
direct allocation
|
page read and write
|
||
1CFBE000
|
stack
|
page read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
11AC000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
12D0000
|
direct allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
9B8000
|
unkown
|
page execute and write copy
|
||
11B3000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2E6B000
|
heap
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
B54000
|
unkown
|
page execute and read and write
|
||
12D0000
|
direct allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
116A000
|
heap
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
10F5000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
56D000
|
unkown
|
page execute and read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
48EF000
|
stack
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
1D34F000
|
stack
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
9B7000
|
unkown
|
page execute and read and write
|
||
12E4000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1D5CC000
|
stack
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
9A9000
|
unkown
|
page execute and read and write
|
||
4B6F000
|
stack
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
There are 219 hidden memdumps, click here to show them.