Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.phpn
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php=
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpR
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php)
|
unknown
|
||
http://185.215.113.37/K
|
unknown
|
||
http://185.215.113.37D
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D8E000
|
heap
|
page read and write
|
||
EC1000
|
unkown
|
page execute and read and write
|
||
50D0000
|
direct allocation
|
page read and write
|
||
4B0F000
|
stack
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
13C3000
|
unkown
|
page execute and read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
1D2AF000
|
stack
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
13C3000
|
unkown
|
page execute and write copy
|
||
CB4000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
D88000
|
heap
|
page read and write
|
||
1D43E000
|
stack
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
13AA000
|
unkown
|
page execute and read and write
|
||
374E000
|
stack
|
page read and write
|
||
EC0000
|
unkown
|
page read and write
|
||
1D1AE000
|
stack
|
page read and write
|
||
12A6000
|
unkown
|
page execute and read and write
|
||
CB4000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
464E000
|
stack
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
1D06E000
|
stack
|
page read and write
|
||
1D800000
|
heap
|
page read and write
|
||
460F000
|
stack
|
page read and write
|
||
3ECE000
|
stack
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
1D2EE000
|
stack
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
1D53C000
|
stack
|
page read and write
|
||
488F000
|
stack
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
1D57D000
|
stack
|
page read and write
|
||
1385000
|
unkown
|
page execute and read and write
|
||
340F000
|
stack
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
1D67E000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
2FE0000
|
direct allocation
|
page execute and read and write
|
||
398F000
|
stack
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
4C51000
|
heap
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
3ACF000
|
stack
|
page read and write
|
||
49CF000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
1566000
|
unkown
|
page execute and write copy
|
||
1D7FF000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
44CF000
|
stack
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
13B5000
|
unkown
|
page execute and read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
48CE000
|
stack
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
F7D000
|
unkown
|
page execute and read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
13C4000
|
unkown
|
page execute and write copy
|
||
111E000
|
unkown
|
page execute and read and write
|
||
478E000
|
stack
|
page read and write
|
||
DD3000
|
heap
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
110A000
|
unkown
|
page execute and read and write
|
||
D3E000
|
stack
|
page read and write
|
||
43CE000
|
stack
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
428D000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
5090000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
1565000
|
unkown
|
page execute and read and write
|
||
CB4000
|
heap
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
1D16F000
|
stack
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
E02000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
FA2000
|
unkown
|
page execute and read and write
|
||
AF5000
|
stack
|
page read and write
|
||
4C4F000
|
stack
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
F71000
|
unkown
|
page execute and read and write
|
||
4C51000
|
heap
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
1D3EF000
|
stack
|
page read and write
|
||
1CF2E000
|
stack
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
438E000
|
stack
|
page read and write
|
||
1D6FE000
|
stack
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
300B000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
77C000
|
stack
|
page read and write
|
||
1D02F000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
520F000
|
stack
|
page read and write
|
||
EC1000
|
unkown
|
page execute and write copy
|
||
4C51000
|
heap
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
474F000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
4C62000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
2FF0000
|
direct allocation
|
page execute and read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
1D802000
|
heap
|
page read and write
|
||
2FD0000
|
direct allocation
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
166F000
|
stack
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
EC0000
|
unkown
|
page readonly
|
||
CB4000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
2FD0000
|
direct allocation
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
There are 221 hidden memdumps, click here to show them.