Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/2
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpDH
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php=k
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
159E000
|
heap
|
page read and write
|
||
991000
|
unkown
|
page execute and read and write
|
||
50D0000
|
direct allocation
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
990000
|
unkown
|
page readonly
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
A72000
|
unkown
|
page execute and read and write
|
||
34BE000
|
stack
|
page read and write
|
||
1D68E000
|
stack
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4AFF000
|
stack
|
page read and write
|
||
BEE000
|
unkown
|
page execute and read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
3077000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
1D3FF000
|
stack
|
page read and write
|
||
991000
|
unkown
|
page execute and write copy
|
||
4C41000
|
heap
|
page read and write
|
||
11DB000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
104A000
|
unkown
|
page execute and write copy
|
||
1D05E000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
15F7000
|
heap
|
page read and write
|
||
A41000
|
unkown
|
page execute and read and write
|
||
4C41000
|
heap
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
306E000
|
stack
|
page read and write
|
||
1D44D000
|
stack
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
EA0000
|
unkown
|
page execute and read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
4C41000
|
heap
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
E92000
|
unkown
|
page execute and read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
387E000
|
stack
|
page read and write
|
||
1D15F000
|
stack
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
E66000
|
unkown
|
page execute and read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
49BF000
|
stack
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
875000
|
stack
|
page read and write
|
||
1D29E000
|
stack
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
48BE000
|
stack
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
EA1000
|
unkown
|
page execute and write copy
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
8A5000
|
heap
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
BDA000
|
unkown
|
page execute and read and write
|
||
397F000
|
stack
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
1D7CD000
|
stack
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
50D0000
|
direct allocation
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
5260000
|
direct allocation
|
page execute and read and write
|
||
4C41000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
4C41000
|
heap
|
page read and write
|
||
990000
|
unkown
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
1D54E000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
1D2FE000
|
stack
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
1604000
|
heap
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
473F000
|
stack
|
page read and write
|
||
50D0000
|
direct allocation
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
159A000
|
heap
|
page read and write
|
||
E89000
|
unkown
|
page execute and read and write
|
||
487F000
|
stack
|
page read and write
|
||
77C000
|
stack
|
page read and write
|
||
D7F000
|
unkown
|
page execute and read and write
|
||
4C3F000
|
stack
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
EA0000
|
unkown
|
page execute and write copy
|
||
87E000
|
stack
|
page read and write
|
||
1D19E000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
1D58D000
|
stack
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
4C57000
|
heap
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
1D01F000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
15E4000
|
heap
|
page read and write
|
||
4C40000
|
heap
|
page read and write
|
||
1613000
|
heap
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
A4D000
|
unkown
|
page execute and read and write
|
||
4C41000
|
heap
|
page read and write
|
||
157E000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
1D7E4000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
1D6CD000
|
stack
|
page read and write
|
||
427D000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
1049000
|
unkown
|
page execute and read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
45FF000
|
stack
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
520F000
|
stack
|
page read and write
|
||
1D7E0000
|
heap
|
page read and write
|
There are 196 hidden memdumps, click here to show them.