Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpD_
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpX_
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/3O
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php$
|
unknown
|
||
http://185.215.113.37g
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php8_Tv
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
FB1000
|
unkown
|
page execute and read and write
|
||
DE3000
|
heap
|
page read and write
|
||
5340000
|
direct allocation
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
17BE000
|
stack
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
F90000
|
direct allocation
|
page read and write
|
||
49BF000
|
stack
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
D14000
|
heap
|
page read and write
|
||
E43000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
F90000
|
direct allocation
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EBF000
|
stack
|
page read and write
|
||
14C9000
|
unkown
|
page execute and read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4D7F000
|
stack
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
1D67F000
|
stack
|
page read and write
|
||
F90000
|
direct allocation
|
page read and write
|
||
18FE000
|
stack
|
page read and write
|
||
4EE0000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
9EC000
|
stack
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
3137000
|
heap
|
page read and write
|
||
1D3EE000
|
stack
|
page read and write
|
||
F90000
|
direct allocation
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
CFF000
|
stack
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
17FE000
|
stack
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
DCA000
|
heap
|
page read and write
|
||
E16000
|
heap
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
547F000
|
stack
|
page read and write
|
||
4ED4000
|
heap
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
F90000
|
direct allocation
|
page read and write
|
||
1D7FE000
|
stack
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
F90000
|
direct allocation
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
F90000
|
direct allocation
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
1DA3C000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
F90000
|
direct allocation
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
1D57E000
|
stack
|
page read and write
|
||
4ED6000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
5320000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
F90000
|
direct allocation
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
1092000
|
unkown
|
page execute and read and write
|
||
DDF000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
1D6BE000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
1DA54000
|
heap
|
page read and write
|
||
F90000
|
direct allocation
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
1D1AE000
|
stack
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
14B2000
|
unkown
|
page execute and read and write
|
||
F90000
|
direct allocation
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
3120000
|
direct allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
48BE000
|
stack
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
1D42E000
|
stack
|
page read and write
|
||
FB0000
|
unkown
|
page readonly
|
||
14BC000
|
unkown
|
page execute and read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
D50000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
13AC000
|
unkown
|
page execute and read and write
|
||
D14000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
1D52F000
|
stack
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
1D93D000
|
stack
|
page read and write
|
||
4AFF000
|
stack
|
page read and write
|
||
1D2AF000
|
stack
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
1D8FE000
|
stack
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
1676000
|
unkown
|
page execute and read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
14C9000
|
unkown
|
page execute and write copy
|
||
14CA000
|
unkown
|
page execute and write copy
|
||
4EC1000
|
heap
|
page read and write
|
||
4C3F000
|
stack
|
page read and write
|
||
11FA000
|
unkown
|
page execute and read and write
|
||
120E000
|
unkown
|
page execute and read and write
|
||
F90000
|
direct allocation
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
FB1000
|
unkown
|
page execute and write copy
|
||
D14000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
148E000
|
unkown
|
page execute and read and write
|
||
F90000
|
direct allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
311C000
|
stack
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
106D000
|
unkown
|
page execute and read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
487F000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
1D7BD000
|
stack
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
unkown
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
1D2EE000
|
stack
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
3120000
|
direct allocation
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
1DA50000
|
heap
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
16BD000
|
stack
|
page read and write
|
||
CF5000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
F90000
|
direct allocation
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
30DE000
|
stack
|
page read and write
|
||
1061000
|
unkown
|
page execute and read and write
|
||
1677000
|
unkown
|
page execute and write copy
|
||
3D3F000
|
stack
|
page read and write
|
There are 226 hidden memdumps, click here to show them.