Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.phpz9jv%
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpn9fv&
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37e
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phptop
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
541000
|
unkown
|
page execute and read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
121E000
|
heap
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
1CFFE000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
1CD7E000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
11D0000
|
heap
|
page read and write
|
||
121A000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
541000
|
unkown
|
page execute and write copy
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
3F2F000
|
stack
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
F75000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
1CE7F000
|
stack
|
page read and write
|
||
1D28D000
|
stack
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
79E000
|
unkown
|
page execute and read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
4A71000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
1D14E000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
38EF000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
11FB000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
502F000
|
stack
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
10A4000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
11F7000
|
heap
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
4A71000
|
heap
|
page read and write
|
||
A32000
|
unkown
|
page execute and read and write
|
||
496E000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
4A71000
|
heap
|
page read and write
|
||
1278000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
BE1000
|
unkown
|
page execute and write copy
|
||
622000
|
unkown
|
page execute and read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
A41000
|
unkown
|
page execute and write copy
|
||
4A87000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
F7F000
|
stack
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
46AF000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
1CEBE000
|
stack
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
2DEC000
|
stack
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
A03000
|
unkown
|
page execute and read and write
|
||
4A90000
|
heap
|
page read and write
|
||
150E000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
5FD000
|
unkown
|
page execute and read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
492F000
|
stack
|
page read and write
|
||
125F000
|
heap
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
482E000
|
stack
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
1CFBF000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
922000
|
unkown
|
page execute and read and write
|
||
356E000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
47EF000
|
stack
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
A42000
|
unkown
|
page execute and write copy
|
||
366F000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
E7C000
|
stack
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
A28000
|
unkown
|
page execute and read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
1D0FE000
|
stack
|
page read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
10A4000
|
heap
|
page read and write
|
||
78A000
|
unkown
|
page execute and read and write
|
||
104E000
|
stack
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
1D4CE000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
1D3CE000
|
stack
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
||
A41000
|
unkown
|
page execute and read and write
|
||
BE0000
|
unkown
|
page execute and read and write
|
||
10A4000
|
heap
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
5F1000
|
unkown
|
page execute and read and write
|
||
4A71000
|
heap
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
41AE000
|
stack
|
page read and write
|
||
1D38C000
|
stack
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
4A6F000
|
stack
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
1264000
|
heap
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
1D24F000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
4A71000
|
heap
|
page read and write
|
There are 221 hidden memdumps, click here to show them.