Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phphS)
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpi
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
50F0000
|
direct allocation
|
page read and write
|
||
13CE000
|
heap
|
page read and write
|
||
731000
|
unkown
|
page execute and read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
730000
|
unkown
|
page readonly
|
||
C2B000
|
unkown
|
page execute and read and write
|
||
731000
|
unkown
|
page execute and write copy
|
||
C1C000
|
unkown
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
2E9C000
|
stack
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
812000
|
unkown
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
429D000
|
stack
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
1D06E000
|
stack
|
page read and write
|
||
98E000
|
unkown
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1D55D000
|
stack
|
page read and write
|
||
1D30E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
C2C000
|
unkown
|
page execute and write copy
|
||
3B1E000
|
stack
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
132D000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1D02F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
7ED000
|
unkown
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
12E5000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
1D840000
|
heap
|
page read and write
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1155000
|
stack
|
page read and write
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
2ED7000
|
heap
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
4C5F000
|
stack
|
page read and write
|
||
1D45D000
|
stack
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
4C64000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
7E1000
|
unkown
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
1D16F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
1D1AE000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
1D40F000
|
stack
|
page read and write
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
BF1000
|
unkown
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
C2B000
|
unkown
|
page execute and write copy
|
||
5260000
|
direct allocation
|
page execute and read and write
|
||
349F000
|
stack
|
page read and write
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1D69C000
|
stack
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1D73E000
|
stack
|
page read and write
|
||
DCB000
|
unkown
|
page execute and write copy
|
||
97A000
|
unkown
|
page execute and read and write
|
||
2FDF000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
512B000
|
stack
|
page read and write
|
||
13CA000
|
heap
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
4C80000
|
heap
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
2EDB000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
16BF000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
15BF000
|
stack
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
B15000
|
unkown
|
page execute and read and write
|
||
465E000
|
stack
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1D2AF000
|
stack
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
105C000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
1426000
|
heap
|
page read and write
|
||
136E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
DCA000
|
unkown
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
522F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1D83E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
C15000
|
unkown
|
page execute and read and write
|
||
527E000
|
stack
|
page read and write
|
||
1D59E000
|
stack
|
page read and write
|
There are 194 hidden memdumps, click here to show them.