Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpuL
|
unknown
|
||
http://185.215.113.37L
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
198.187.3.20.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5C1000
|
unkown
|
page execute and read and write
|
||
52F0000
|
direct allocation
|
page read and write
|
||
148E000
|
heap
|
page read and write
|
||
A87000
|
unkown
|
page execute and read and write
|
||
13B0000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
67D000
|
unkown
|
page execute and read and write
|
||
1355000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1DA50000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
125C000
|
stack
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
1D8AD000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
30AB000
|
stack
|
page read and write
|
||
1512000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
671000
|
unkown
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
1D23F000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
493F000
|
stack
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
148A000
|
heap
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5C1000
|
unkown
|
page execute and write copy
|
||
497E000
|
stack
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
AA9000
|
unkown
|
page execute and read and write
|
||
1D62F000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1D27E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
C60000
|
unkown
|
page execute and read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1D76D000
|
stack
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
6A2000
|
unkown
|
page execute and read and write
|
||
144E000
|
stack
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
30F7000
|
heap
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
1D4BE000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
52F0000
|
direct allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
447D000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
9A6000
|
unkown
|
page execute and read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
1D3BE000
|
stack
|
page read and write
|
||
1DA4E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1D66D000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
483E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
174F000
|
stack
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
AC1000
|
unkown
|
page execute and write copy
|
||
4E70000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
80A000
|
unkown
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
532E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
542F000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5C0000
|
unkown
|
page readonly
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
14FC000
|
heap
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
81E000
|
unkown
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1405000
|
heap
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
14E9000
|
heap
|
page read and write
|
||
1505000
|
heap
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
188E000
|
stack
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1D7AE000
|
stack
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
AC2000
|
unkown
|
page execute and write copy
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
52F0000
|
direct allocation
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
AB3000
|
unkown
|
page execute and read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
30FB000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
4CFF000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1D52E000
|
stack
|
page read and write
|
||
AC1000
|
unkown
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
1D94E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
1D37F000
|
stack
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
4E3F000
|
stack
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
There are 197 hidden memdumps, click here to show them.