Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.phpn
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/H
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpV
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
11DE000
|
heap
|
page read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
B01000
|
unkown
|
page execute and read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
1D00F000
|
stack
|
page read and write
|
||
399E000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
395F000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
3FDE000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
11D0000
|
heap
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
1D53E000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
499F000
|
stack
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
1223000
|
heap
|
page read and write
|
||
11B1000
|
unkown
|
page execute and read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
EF1000
|
unkown
|
page execute and read and write
|
||
100D000
|
unkown
|
page execute and read and write
|
||
385E000
|
stack
|
page read and write
|
||
381F000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
BBD000
|
unkown
|
page execute and read and write
|
||
1D71E000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
4C31000
|
heap
|
page read and write
|
||
461E000
|
stack
|
page read and write
|
||
485F000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
349E000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
1D81F000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
3D1F000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
45DF000
|
stack
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
1D822000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
100D000
|
unkown
|
page execute and write copy
|
||
4C31000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
BB1000
|
unkown
|
page execute and read and write
|
||
1D67C000
|
stack
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
125E000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
1D14F000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
3A9F000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
1D3EF000
|
stack
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
D4A000
|
unkown
|
page execute and read and write
|
||
1238000
|
heap
|
page read and write
|
||
3F9F000
|
stack
|
page read and write
|
||
4C30000
|
heap
|
page read and write
|
||
162E000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
1D18E000
|
stack
|
page read and write
|
||
489E000
|
stack
|
page read and write
|
||
76C000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
4ADF000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
435F000
|
stack
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
36DF000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
471F000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
FCF000
|
unkown
|
page execute and read and write
|
||
331F000
|
stack
|
page read and write
|
||
4C40000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
5260000
|
direct allocation
|
page execute and read and write
|
||
4C1F000
|
stack
|
page read and write
|
||
3D5E000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
1249000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
FFF000
|
unkown
|
page execute and read and write
|
||
4C31000
|
heap
|
page read and write
|
||
40DF000
|
stack
|
page read and write
|
||
421F000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
FF3000
|
unkown
|
page execute and read and write
|
||
309F000
|
stack
|
page read and write
|
||
11B2000
|
unkown
|
page execute and write copy
|
||
4C31000
|
heap
|
page read and write
|
||
2F57000
|
heap
|
page read and write
|
||
1355000
|
heap
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
152F000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
1D57D000
|
stack
|
page read and write
|
||
D5E000
|
unkown
|
page execute and read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
51FF000
|
stack
|
page read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
1350000
|
heap
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
1D28F000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
AF5000
|
stack
|
page read and write
|
||
1D820000
|
heap
|
page read and write
|
||
3BDF000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
4C47000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
411E000
|
stack
|
page read and write
|
||
359F000
|
stack
|
page read and write
|
||
BE2000
|
unkown
|
page execute and read and write
|
||
4C31000
|
heap
|
page read and write
|
||
2F1F000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
425E000
|
stack
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
345F000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
2F9C000
|
stack
|
page read and write
|
||
3E5F000
|
stack
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
3ADE000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
3E9E000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
449F000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
B01000
|
unkown
|
page execute and write copy
|
||
4C31000
|
heap
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
134E000
|
stack
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
1D2EE000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
3C1E000
|
stack
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
1D43D000
|
stack
|
page read and write
|
||
1D04E000
|
stack
|
page read and write
|
||
100E000
|
unkown
|
page execute and write copy
|
||
4C31000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
There are 199 hidden memdumps, click here to show them.