Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.phpn
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpt~
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phph~
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37a
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
54B0000
|
direct allocation
|
page read and write
|
||
AE1000
|
unkown
|
page execute and read and write
|
||
177E000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
4ADF000
|
stack
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
461E000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
1535000
|
stack
|
page read and write
|
||
1D3FF000
|
stack
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
5640000
|
direct allocation
|
page execute and read and write
|
||
5021000
|
heap
|
page read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
1D82D000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
B9D000
|
unkown
|
page execute and read and write
|
||
5021000
|
heap
|
page read and write
|
||
4C6E000
|
stack
|
page read and write
|
||
1D96D000
|
stack
|
page read and write
|
||
1A6F000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
395F000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
17D9000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
3A9F000
|
stack
|
page read and write
|
||
5660000
|
direct allocation
|
page execute and read and write
|
||
1DC10000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
349E000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
3BDF000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
FE6000
|
unkown
|
page execute and read and write
|
||
54B0000
|
direct allocation
|
page read and write
|
||
D2A000
|
unkown
|
page execute and read and write
|
||
3E9E000
|
stack
|
page read and write
|
||
1D57E000
|
stack
|
page read and write
|
||
176E000
|
stack
|
page read and write
|
||
425E000
|
stack
|
page read and write
|
||
FCF000
|
unkown
|
page execute and read and write
|
||
1D92E000
|
stack
|
page read and write
|
||
B91000
|
unkown
|
page execute and read and write
|
||
5021000
|
heap
|
page read and write
|
||
345F000
|
stack
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
54B0000
|
direct allocation
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
1D67F000
|
stack
|
page read and write
|
||
4FEF000
|
stack
|
page read and write
|
||
421F000
|
stack
|
page read and write
|
||
3317000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
17C1000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
4D6F000
|
stack
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
15B5000
|
heap
|
page read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
3C1E000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
EC7000
|
unkown
|
page execute and read and write
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
17F7000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
563E000
|
stack
|
page read and write
|
||
FE7000
|
unkown
|
page execute and write copy
|
||
330F000
|
stack
|
page read and write
|
||
196E000
|
stack
|
page read and write
|
||
170E000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
1D43E000
|
stack
|
page read and write
|
||
499F000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
40DF000
|
stack
|
page read and write
|
||
55EF000
|
stack
|
page read and write
|
||
411E000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
FE6000
|
unkown
|
page execute and write copy
|
||
5021000
|
heap
|
page read and write
|
||
4DAE000
|
stack
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
D3E000
|
unkown
|
page execute and read and write
|
||
5021000
|
heap
|
page read and write
|
||
AE0000
|
unkown
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
4EAF000
|
stack
|
page read and write
|
||
489E000
|
stack
|
page read and write
|
||
1D7EF000
|
stack
|
page read and write
|
||
1DB0E000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
1770000
|
heap
|
page read and write
|
||
1D53F000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
1DA6C000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
177A000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
AE1000
|
unkown
|
page execute and write copy
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5630000
|
direct allocation
|
page execute and read and write
|
||
1580000
|
heap
|
page read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
399E000
|
stack
|
page read and write
|
||
471F000
|
stack
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
449F000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
359F000
|
stack
|
page read and write
|
||
FD7000
|
unkown
|
page execute and read and write
|
||
381F000
|
stack
|
page read and write
|
||
3D5E000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5620000
|
direct allocation
|
page execute and read and write
|
||
5021000
|
heap
|
page read and write
|
||
143C000
|
stack
|
page read and write
|
||
3ADE000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
45DF000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
5023000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
4C1F000
|
stack
|
page read and write
|
||
BC2000
|
unkown
|
page execute and read and write
|
||
5021000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
3F9F000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
17BF000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
385E000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
118A000
|
unkown
|
page execute and write copy
|
||
5021000
|
heap
|
page read and write
|
||
3FDE000
|
stack
|
page read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5650000
|
direct allocation
|
page execute and read and write
|
||
5021000
|
heap
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
335C000
|
stack
|
page read and write
|
||
1189000
|
unkown
|
page execute and read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
4C20000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
36DF000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
1D6EE000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
331B000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
FAB000
|
unkown
|
page execute and read and write
|
||
5021000
|
heap
|
page read and write
|
||
5630000
|
direct allocation
|
page execute and read and write
|
||
435F000
|
stack
|
page read and write
|
||
3E5F000
|
stack
|
page read and write
|
||
1DC0E000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
There are 198 hidden memdumps, click here to show them.