Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.php~
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php&
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpj
|
unknown
|
||
http://185.215.113.37/l
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
871000
|
unkown
|
page execute and read and write
|
||
5230000
|
direct allocation
|
page read and write
|
||
15BE000
|
heap
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
411E000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
870000
|
unkown
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
1D44E000
|
stack
|
page read and write
|
||
349E000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
3FDE000
|
stack
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
2FDB000
|
heap
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
1D16F000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
1D6DD000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5230000
|
direct allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
1602000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
3E9E000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5230000
|
direct allocation
|
page read and write
|
||
D5E000
|
unkown
|
page execute and read and write
|
||
475E000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
D30000
|
unkown
|
page execute and read and write
|
||
30DF000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
92D000
|
unkown
|
page execute and read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
ABA000
|
unkown
|
page execute and read and write
|
||
536F000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
1D980000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
2FCC000
|
stack
|
page read and write
|
||
4C2F000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
3BDF000
|
stack
|
page read and write
|
||
ACE000
|
unkown
|
page execute and read and write
|
||
3D1F000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
3ADE000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
499F000
|
stack
|
page read and write
|
||
13D5000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
399E000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
345F000
|
stack
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
435F000
|
stack
|
page read and write
|
||
1D97F000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
12F5000
|
stack
|
page read and write
|
||
158E000
|
stack
|
page read and write
|
||
1632000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
F0A000
|
unkown
|
page execute and write copy
|
||
4DA1000
|
heap
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
2FD7000
|
heap
|
page read and write
|
||
485F000
|
stack
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
D6C000
|
unkown
|
page execute and write copy
|
||
489E000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4D6F000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
921000
|
unkown
|
page execute and read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
3F9F000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
36DF000
|
stack
|
page read and write
|
||
359F000
|
stack
|
page read and write
|
||
395F000
|
stack
|
page read and write
|
||
1D87E000
|
stack
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
381F000
|
stack
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
471F000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
1D1AE000
|
stack
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
385E000
|
stack
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
45DF000
|
stack
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
D55000
|
unkown
|
page execute and read and write
|
||
1D54F000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
C51000
|
unkown
|
page execute and read and write
|
||
461E000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
3A9F000
|
stack
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
1D7DE000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
1617000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
952000
|
unkown
|
page execute and read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
1D3EE000
|
stack
|
page read and write
|
||
4DA4000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
15BA000
|
heap
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
425E000
|
stack
|
page read and write
|
||
3C1E000
|
stack
|
page read and write
|
||
F9C000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
1D2AF000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
40DF000
|
stack
|
page read and write
|
||
4AEF000
|
stack
|
page read and write
|
||
D6C000
|
unkown
|
page execute and read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
3D5E000
|
stack
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
421F000
|
stack
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
4C6E000
|
stack
|
page read and write
|
||
1D69C000
|
stack
|
page read and write
|
||
1D2EE000
|
stack
|
page read and write
|
||
17AF000
|
stack
|
page read and write
|
||
1D59D000
|
stack
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
D6D000
|
unkown
|
page execute and write copy
|
||
4DA1000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
871000
|
unkown
|
page execute and write copy
|
||
4DA1000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
3E5F000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
F09000
|
unkown
|
page execute and read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
49A0000
|
heap
|
page read and write
|
There are 194 hidden memdumps, click here to show them.