Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpO
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37t
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5000000
|
direct allocation
|
page read and write
|
||
142E000
|
heap
|
page read and write
|
||
631000
|
unkown
|
page execute and read and write
|
||
712000
|
unkown
|
page execute and read and write
|
||
14A5000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
AEC000
|
unkown
|
page execute and read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
33FE000
|
stack
|
page read and write
|
||
87A000
|
unkown
|
page execute and read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
48FF000
|
stack
|
page read and write
|
||
1D0AE000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
1D1AF000
|
stack
|
page read and write
|
||
D5C000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
B2D000
|
unkown
|
page execute and write copy
|
||
457E000
|
stack
|
page read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
1473000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
2FB7000
|
heap
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
631000
|
unkown
|
page execute and write copy
|
||
4B81000
|
heap
|
page read and write
|
||
1D06F000
|
stack
|
page read and write
|
||
47BF000
|
stack
|
page read and write
|
||
6ED000
|
unkown
|
page execute and read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
46BE000
|
stack
|
page read and write
|
||
B2C000
|
unkown
|
page execute and write copy
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
88E000
|
unkown
|
page execute and read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
120D000
|
stack
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
4B81000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
A17000
|
unkown
|
page execute and read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
630000
|
unkown
|
page readonly
|
||
124E000
|
stack
|
page read and write
|
||
417F000
|
stack
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
1CF6E000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
B14000
|
unkown
|
page execute and read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
1D59D000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
161E000
|
stack
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
B1E000
|
unkown
|
page execute and read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
||
1488000
|
heap
|
page read and write
|
||
1CF2F000
|
stack
|
page read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
CCA000
|
unkown
|
page execute and write copy
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
6E1000
|
unkown
|
page execute and read and write
|
||
4B81000
|
heap
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
B2C000
|
unkown
|
page execute and read and write
|
||
1D49E000
|
stack
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
1D45D000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
47FE000
|
stack
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
1D35D000
|
stack
|
page read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
CC9000
|
unkown
|
page execute and read and write
|
||
467F000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
453F000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
4A3F000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
1D20E000
|
stack
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
3DBF000
|
stack
|
page read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
1D30F000
|
stack
|
page read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
4B7F000
|
stack
|
page read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
10F5000
|
stack
|
page read and write
|
||
513F000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
630000
|
unkown
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
There are 190 hidden memdumps, click here to show them.