Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpl
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpA
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php0
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37s
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4D60000
|
direct allocation
|
page read and write
|
||
3B1000
|
unkown
|
page execute and read and write
|
||
106E000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
46D000
|
unkown
|
page execute and read and write
|
||
4D60000
|
direct allocation
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
1CCDE000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
1D0CE000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
ACC000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
892000
|
unkown
|
page execute and read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48F0000
|
heap
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
1CDDF000
|
stack
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
3EDD000
|
stack
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
1068000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
5FA000
|
unkown
|
page execute and read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
492000
|
unkown
|
page execute and read and write
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
865000
|
unkown
|
page execute and read and write
|
||
361E000
|
stack
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
1CC9F000
|
stack
|
page read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
889000
|
unkown
|
page execute and read and write
|
||
39DE000
|
stack
|
page read and write
|
||
A34000
|
unkown
|
page execute and read and write
|
||
465E000
|
stack
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
1D30C000
|
stack
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
2B97000
|
heap
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
790000
|
unkown
|
page execute and read and write
|
||
1D07F000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
4E9F000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
105C000
|
stack
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
1CE1E000
|
stack
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
10B1000
|
heap
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
1D20D000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
60E000
|
unkown
|
page execute and read and write
|
||
10AC000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
8A2000
|
unkown
|
page execute and write copy
|
||
30DF000
|
stack
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
48D2000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
BC5000
|
stack
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
3B1000
|
unkown
|
page execute and write copy
|
||
48D1000
|
heap
|
page read and write
|
||
1D1CD000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
EF5000
|
heap
|
page read and write
|
||
4D60000
|
direct allocation
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
8A1000
|
unkown
|
page execute and read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
461000
|
unkown
|
page execute and read and write
|
||
48D1000
|
heap
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
1CF7E000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
8A1000
|
unkown
|
page execute and write copy
|
||
3B0000
|
unkown
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48E0000
|
heap
|
page read and write
|
||
A35000
|
unkown
|
page execute and write copy
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
135E000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
2B9B000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
1CF1F000
|
stack
|
page read and write
|
||
3FDE000
|
stack
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
There are 192 hidden memdumps, click here to show them.