Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.php?M9
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpRL
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php-
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/rosoft
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37e
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpy
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1C1000
|
unkown
|
page execute and read and write
|
||
148E000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1D57C000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
464E000
|
stack
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
1D47D000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
49CF000
|
stack
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
6B9000
|
unkown
|
page execute and write copy
|
||
3C4E000
|
stack
|
page read and write
|
||
48CE000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1D6BE000
|
stack
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
488F000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
360E000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
4C50000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
107C000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
41E000
|
unkown
|
page execute and read and write
|
||
14E7000
|
heap
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
1D06F000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page read and write
|
||
4C4F000
|
stack
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
84F000
|
unkown
|
page execute and read and write
|
||
1D0AE000
|
stack
|
page read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
4C50000
|
direct allocation
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
522F000
|
stack
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
167F000
|
stack
|
page read and write
|
||
6B9000
|
unkown
|
page execute and read and write
|
||
1334000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
300B000
|
heap
|
page read and write
|
||
1CF6E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
474F000
|
stack
|
page read and write
|
||
512E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
1D1EE000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
143F000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
1D5BD000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
3ECE000
|
stack
|
page read and write
|
||
4C50000
|
direct allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
6BA000
|
unkown
|
page execute and write copy
|
||
4B4E000
|
stack
|
page read and write
|
||
1D2EF000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
1503000
|
heap
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
1D32E000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
2FAB000
|
stack
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
4B0F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page read and write
|
||
1C1000
|
unkown
|
page execute and write copy
|
||
4C50000
|
direct allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
2A2000
|
unkown
|
page execute and read and write
|
||
1334000
|
heap
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
4C50000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
460F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1D42F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
450E000
|
stack
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
1175000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1C0000
|
unkown
|
page read and write
|
||
44CF000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1D1AE000
|
stack
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
271000
|
unkown
|
page execute and read and write
|
||
1334000
|
heap
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
6AB000
|
unkown
|
page execute and read and write
|
||
147E000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page execute and read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
428D000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
1334000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
5260000
|
direct allocation
|
page execute and read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
850000
|
unkown
|
page execute and write copy
|
||
4C61000
|
heap
|
page read and write
|
||
5A8000
|
unkown
|
page execute and read and write
|
||
67E000
|
unkown
|
page execute and read and write
|
||
6A0000
|
unkown
|
page execute and read and write
|
||
27D000
|
unkown
|
page execute and read and write
|
||
43CE000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
438F000
|
stack
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
3ACF000
|
stack
|
page read and write
|
||
1488000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
117F000
|
stack
|
page read and write
|
||
150D000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C65000
|
heap
|
page read and write
|
There are 218 hidden memdumps, click here to show them.