Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/-zx3
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37o
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpWCG3
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php;Cc3
|
unknown
|
||
http://185.215.113.37/z%
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
138E000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
681000
|
unkown
|
page execute and read and write
|
||
13F5000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
D9C000
|
stack
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
1D78E000
|
stack
|
page read and write
|
||
D0A000
|
unkown
|
page execute and read and write
|
||
1CE9E000
|
stack
|
page read and write
|
||
B34000
|
unkown
|
page execute and read and write
|
||
2EA0000
|
direct allocation
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
2EA0000
|
direct allocation
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
680000
|
unkown
|
page read and write
|
||
2EA0000
|
direct allocation
|
page read and write
|
||
2EA0000
|
direct allocation
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
2EA0000
|
direct allocation
|
page read and write
|
||
1CF9F000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
417F000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B88000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
2EBB000
|
heap
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
2EA0000
|
direct allocation
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
2EA0000
|
direct allocation
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
4A3F000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
1D790000
|
heap
|
page read and write
|
||
2EA0000
|
direct allocation
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
11D4000
|
heap
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
4B80000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
2EA0000
|
direct allocation
|
page read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
B5B000
|
unkown
|
page execute and read and write
|
||
762000
|
unkown
|
page execute and read and write
|
||
317E000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
B75000
|
unkown
|
page execute and write copy
|
||
46BE000
|
stack
|
page read and write
|
||
453F000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
2EA0000
|
direct allocation
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
1D25E000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
514F000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
A58000
|
unkown
|
page execute and read and write
|
||
504E000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
1D4ED000
|
stack
|
page read and write
|
||
13E8000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
48FF000
|
stack
|
page read and write
|
||
B74000
|
unkown
|
page execute and read and write
|
||
3DBF000
|
stack
|
page read and write
|
||
731000
|
unkown
|
page execute and read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
2EA0000
|
direct allocation
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
2EFB000
|
stack
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
1D35F000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
1D4AC000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
2EB7000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
2EA0000
|
direct allocation
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
||
4B7F000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
14BE000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
2EA0000
|
direct allocation
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
1D0DF000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
681000
|
unkown
|
page execute and write copy
|
||
313F000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
8CA000
|
unkown
|
page execute and read and write
|
||
42FE000
|
stack
|
page read and write
|
||
1D21F000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
1D3AD000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
11D4000
|
heap
|
page read and write
|
||
2EA0000
|
direct allocation
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
1D68E000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
73D000
|
unkown
|
page execute and read and write
|
||
493E000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
47BF000
|
stack
|
page read and write
|
||
1403000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
B74000
|
unkown
|
page execute and write copy
|
||
13CE000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
11D0000
|
heap
|
page read and write
|
||
8DE000
|
unkown
|
page execute and read and write
|
||
47FE000
|
stack
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
13D2000
|
heap
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
B65000
|
unkown
|
page execute and read and write
|
||
4B81000
|
heap
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
1CFDE000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
1D11E000
|
stack
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
D0B000
|
unkown
|
page execute and write copy
|
||
15BF000
|
stack
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
1D5EE000
|
stack
|
page read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
10F5000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
There are 222 hidden memdumps, click here to show them.