Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpT
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpH
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
15CE000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
9A1000
|
unkown
|
page execute and read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
BFE000
|
unkown
|
page execute and read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
5620000
|
direct allocation
|
page execute and read and write
|
||
55D0000
|
direct allocation
|
page execute and read and write
|
||
1D4FE000
|
stack
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
394F000
|
stack
|
page read and write
|
||
1D3BF000
|
stack
|
page read and write
|
||
3F8F000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
100E000
|
unkown
|
page execute and read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
E6D000
|
unkown
|
page execute and read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
155E000
|
stack
|
page read and write
|
||
3ACE000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
A51000
|
unkown
|
page execute and read and write
|
||
11AE000
|
stack
|
page read and write
|
||
9A1000
|
unkown
|
page execute and write copy
|
||
1D79F000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
45CF000
|
stack
|
page read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
18BE000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
560E000
|
stack
|
page read and write
|
||
9A0000
|
unkown
|
page readonly
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
9A0000
|
unkown
|
page read and write
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
A82000
|
unkown
|
page execute and read and write
|
||
358F000
|
stack
|
page read and write
|
||
1636000
|
heap
|
page read and write
|
||
448F000
|
stack
|
page read and write
|
||
11A5000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
15C8000
|
heap
|
page read and write
|
||
E4A000
|
unkown
|
page execute and read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1643000
|
heap
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
E83000
|
unkown
|
page execute and write copy
|
||
4ECE000
|
stack
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
4C0F000
|
stack
|
page read and write
|
||
1DA2C000
|
stack
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
E73000
|
unkown
|
page execute and read and write
|
||
11E0000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
1D7EE000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1628000
|
heap
|
page read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
18FE000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
55F0000
|
direct allocation
|
page execute and read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
159D000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
474E000
|
stack
|
page read and write
|
||
1D53E000
|
stack
|
page read and write
|
||
334C000
|
stack
|
page read and write
|
||
3E4F000
|
stack
|
page read and write
|
||
1D3FE000
|
stack
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
488E000
|
stack
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
484F000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
E82000
|
unkown
|
page execute and write copy
|
||
4FF1000
|
heap
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
19FE000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
A5D000
|
unkown
|
page execute and read and write
|
||
55BF000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
438E000
|
stack
|
page read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
BEA000
|
unkown
|
page execute and read and write
|
||
1615000
|
heap
|
page read and write
|
||
17BE000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1D63F000
|
stack
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
D7B000
|
unkown
|
page execute and read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
5005000
|
heap
|
page read and write
|
||
1D92D000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
1653000
|
heap
|
page read and write
|
||
3207000
|
heap
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1D8ED000
|
stack
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
50F0000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
100F000
|
unkown
|
page execute and write copy
|
||
10AC000
|
stack
|
page read and write
|
||
320B000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
4D4F000
|
stack
|
page read and write
|
||
1D69E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
470F000
|
stack
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
498F000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
E82000
|
unkown
|
page execute and read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
4E8F000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
4FCF000
|
stack
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
There are 196 hidden memdumps, click here to show them.