Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpL
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpE
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpC
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phps
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php7
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0017.t-0009.fb-t-msedge.net
|
13.107.253.45
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4FC0000
|
direct allocation
|
page read and write
|
||
12FE000
|
heap
|
page read and write
|
||
621000
|
unkown
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
D4C000
|
stack
|
page read and write
|
||
460F000
|
stack
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
360E000
|
stack
|
page read and write
|
||
621000
|
unkown
|
page execute and write copy
|
||
1D20E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
6DD000
|
unkown
|
page execute and read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
1D35D000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
6D1000
|
unkown
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
ADE000
|
unkown
|
page execute and read and write
|
||
1214000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
12AB000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
87E000
|
unkown
|
page execute and read and write
|
||
14EE000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page read and write
|
||
1D0CE000
|
stack
|
page read and write
|
||
3ECE000
|
stack
|
page read and write
|
||
B1A000
|
unkown
|
page execute and read and write
|
||
1214000
|
heap
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
43CE000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
10F5000
|
stack
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
1CF4F000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
A02000
|
unkown
|
page execute and read and write
|
||
489F000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
438F000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
50FF000
|
stack
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
1358000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1CE4E000
|
stack
|
page read and write
|
||
1D30F000
|
stack
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
414D000
|
stack
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
134A000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4750000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
1D49D000
|
stack
|
page read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
86A000
|
unkown
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
1D59D000
|
stack
|
page read and write
|
||
464E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
702000
|
unkown
|
page execute and read and write
|
||
48DE000
|
stack
|
page read and write
|
||
CB4000
|
unkown
|
page execute and write copy
|
||
1214000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
2E8F000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
B1A000
|
unkown
|
page execute and write copy
|
||
1214000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
12A7000
|
heap
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
3ACF000
|
stack
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
1D45D000
|
stack
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
125D000
|
stack
|
page read and write
|
||
CB3000
|
unkown
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1D1CF000
|
stack
|
page read and write
|
||
1345000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
474F000
|
stack
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
1214000
|
heap
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
12EB000
|
stack
|
page read and write
|
||
1D08F000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
1343000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
B0C000
|
unkown
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
B01000
|
unkown
|
page execute and read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
1CF8E000
|
stack
|
page read and write
|
||
44CF000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
B1B000
|
unkown
|
page execute and write copy
|
||
3D8E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
4B31000
|
heap
|
page read and write
|
||
1376000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
There are 219 hidden memdumps, click here to show them.