Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpTW
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpxv
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
F01000
|
unkown
|
page execute and read and write
|
||
88E000
|
heap
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
6F4000
|
heap
|
page read and write
|
||
157A000
|
unkown
|
page execute and write copy
|
||
6F4000
|
heap
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
1CCDF000
|
stack
|
page read and write
|
||
2AA7000
|
heap
|
page read and write
|
||
12DB000
|
unkown
|
page execute and read and write
|
||
6F4000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
1DC000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
13EA000
|
unkown
|
page execute and write copy
|
||
ED0000
|
direct allocation
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1D14E000
|
stack
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
88A000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4670000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
4FE000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
2A90000
|
direct allocation
|
page execute and read and write
|
||
6F4000
|
heap
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
1D250000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
4F5000
|
stack
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
1CB9F000
|
stack
|
page read and write
|
||
13E9000
|
unkown
|
page execute and write copy
|
||
1C95E000
|
stack
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
13D3000
|
unkown
|
page execute and read and write
|
||
4671000
|
heap
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
114A000
|
unkown
|
page execute and read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
1D0AC000
|
stack
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
42EE000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
FB1000
|
unkown
|
page execute and read and write
|
||
6F4000
|
heap
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4C2F000
|
stack
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
1D24E000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
A7F000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
87B000
|
stack
|
page read and write
|
||
1CF6E000
|
stack
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
6BE000
|
stack
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
FE2000
|
unkown
|
page execute and read and write
|
||
6F4000
|
heap
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
ECE000
|
stack
|
page read and write
|
||
FBD000
|
unkown
|
page execute and read and write
|
||
302E000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
13E9000
|
unkown
|
page execute and read and write
|
||
4671000
|
heap
|
page read and write
|
||
1CE1F000
|
stack
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
13DA000
|
unkown
|
page execute and read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
115E000
|
unkown
|
page execute and read and write
|
||
1CBDE000
|
stack
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
1CD1E000
|
stack
|
page read and write
|
||
1CE6D000
|
stack
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
F00000
|
unkown
|
page read and write
|
||
1CA5F000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
1579000
|
unkown
|
page execute and read and write
|
||
1CFAD000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
13B1000
|
unkown
|
page execute and read and write
|
||
903000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
4690000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
4671000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
90F000
|
heap
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
4680000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
4675000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
67D000
|
stack
|
page read and write
|
||
F01000
|
unkown
|
page execute and write copy
|
||
83E000
|
stack
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
880000
|
heap
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
1CA9E000
|
stack
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
There are 218 hidden memdumps, click here to show them.