Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/a
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php?
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phph
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpG
|
unknown
|
||
http://185.215.113.37so
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
A7E000
|
heap
|
page read and write
|
||
EB1000
|
unkown
|
page execute and read and write
|
||
4D40000
|
direct allocation
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48C5000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1375000
|
unkown
|
page execute and read and write
|
||
13A2000
|
unkown
|
page execute and read and write
|
||
426F000
|
stack
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
735000
|
stack
|
page read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
8C4000
|
heap
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
13B2000
|
unkown
|
page execute and write copy
|
||
48B1000
|
heap
|
page read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
13B1000
|
unkown
|
page execute and write copy
|
||
EB1000
|
unkown
|
page execute and write copy
|
||
1CE0F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
4D40000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
ADA000
|
heap
|
page read and write
|
||
A7A000
|
heap
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
F6D000
|
unkown
|
page execute and read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
1D09F000
|
stack
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1D1DD000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1D45C000
|
stack
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
322F000
|
stack
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
1CCCF000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
1CE4E000
|
stack
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
8BD000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
EB0000
|
unkown
|
page read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
EAB000
|
stack
|
page read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
AC2000
|
heap
|
page read and write
|
||
10FA000
|
unkown
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
F61000
|
unkown
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B0000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
1550000
|
unkown
|
page execute and read and write
|
||
8C4000
|
heap
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
AE3000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
1D0DD000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
13B1000
|
unkown
|
page execute and read and write
|
||
8C4000
|
heap
|
page read and write
|
||
110E000
|
unkown
|
page execute and read and write
|
||
1D35D000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
1D470000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1CF4E000
|
stack
|
page read and write
|
||
1CF9E000
|
stack
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
1295000
|
unkown
|
page execute and read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
8C4000
|
heap
|
page read and write
|
||
F92000
|
unkown
|
page execute and read and write
|
||
1CBCE000
|
stack
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
4E7F000
|
stack
|
page read and write
|
||
1CD0E000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
1D21D000
|
stack
|
page read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
63C000
|
stack
|
page read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1398000
|
unkown
|
page execute and read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
73F000
|
stack
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
EB0000
|
unkown
|
page readonly
|
||
48B1000
|
heap
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
8C4000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
1D474000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1D31F000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1551000
|
unkown
|
page execute and write copy
|
||
2BE7000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
4D40000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
There are 225 hidden memdumps, click here to show them.