Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.php-
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php/
|
unknown
|
||
http://185.215.113.37/X
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpU
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4AE0000
|
direct allocation
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
561000
|
unkown
|
page execute and read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
E20000
|
heap
|
page read and write
|
||
378E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
7AA000
|
unkown
|
page execute and read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
4AE0000
|
direct allocation
|
page read and write
|
||
1CF9D000
|
stack
|
page read and write
|
||
43CF000
|
stack
|
page read and write
|
||
A2F000
|
unkown
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
A53000
|
unkown
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
1CA2F000
|
stack
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
1CA6E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
1CCAF000
|
stack
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
61D000
|
unkown
|
page execute and read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
611000
|
unkown
|
page execute and read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4650000
|
heap
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
1CF5C000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
4C6E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
111E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
3C4F000
|
stack
|
page read and write
|
||
C0C000
|
unkown
|
page execute and write copy
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4AE0000
|
direct allocation
|
page read and write
|
||
4FE000
|
stack
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
2E8F000
|
stack
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
1CD0E000
|
stack
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
94E000
|
unkown
|
page execute and read and write
|
||
374F000
|
stack
|
page read and write
|
||
3D8F000
|
stack
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
4664000
|
heap
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
338F000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4660000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
4C1F000
|
stack
|
page read and write
|
||
DEC000
|
stack
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
C0B000
|
unkown
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
4F5000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
1D09E000
|
stack
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
EA2000
|
heap
|
page read and write
|
||
A5B000
|
unkown
|
page execute and read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
440E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
3B0F000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
A6A000
|
unkown
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
A6A000
|
unkown
|
page execute and write copy
|
||
3F0E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
1CE0F000
|
stack
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
E75000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
642000
|
unkown
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
39CF000
|
stack
|
page read and write
|
||
2D4F000
|
stack
|
page read and write
|
||
561000
|
unkown
|
page execute and write copy
|
||
CCE000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
3ECF000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
418E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
3C8E000
|
stack
|
page read and write
|
||
560000
|
unkown
|
page readonly
|
||
33CE000
|
stack
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
550000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
428F000
|
stack
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
450F000
|
stack
|
page read and write
|
||
464F000
|
stack
|
page read and write
|
||
1CBAE000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
1CE5E000
|
stack
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
7BE000
|
unkown
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
A6B000
|
unkown
|
page execute and write copy
|
||
4670000
|
heap
|
page read and write
|
||
294B000
|
heap
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
1CB6E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
388F000
|
stack
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
There are 192 hidden memdumps, click here to show them.