Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpqM
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php%M
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37G
|
unknown
|
||
http://185.215.113.37/l
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
AF1000
|
unkown
|
page execute and read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
188E000
|
heap
|
page read and write
|
||
5630000
|
direct allocation
|
page execute and read and write
|
||
FE2000
|
unkown
|
page execute and read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
181E000
|
stack
|
page read and write
|
||
185E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
55F0000
|
direct allocation
|
page execute and read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
1D54F000
|
stack
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
16DD000
|
stack
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1D81D000
|
stack
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
4C6E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
55BF000
|
stack
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
33AB000
|
heap
|
page read and write
|
||
486F000
|
stack
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1D30E000
|
stack
|
page read and write
|
||
1535000
|
stack
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
FE3000
|
unkown
|
page execute and write copy
|
||
153E000
|
stack
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
1924000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
BD2000
|
unkown
|
page execute and read and write
|
||
1694000
|
heap
|
page read and write
|
||
1860000
|
heap
|
page read and write
|
||
4EAF000
|
stack
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
1DA5D000
|
stack
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
335B000
|
stack
|
page read and write
|
||
D3A000
|
unkown
|
page execute and read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
1D44E000
|
stack
|
page read and write
|
||
1D95D000
|
stack
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
17DE000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
50F0000
|
trusted library allocation
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
BAD000
|
unkown
|
page execute and read and write
|
||
D4E000
|
unkown
|
page execute and read and write
|
||
EC9000
|
unkown
|
page execute and read and write
|
||
1694000
|
heap
|
page read and write
|
||
18E9000
|
heap
|
page read and write
|
||
4AEF000
|
stack
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
117A000
|
unkown
|
page execute and write copy
|
||
4FF0000
|
heap
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1D58E000
|
stack
|
page read and write
|
||
55D0000
|
direct allocation
|
page execute and read and write
|
||
5620000
|
direct allocation
|
page execute and read and write
|
||
36EF000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
BA1000
|
unkown
|
page execute and read and write
|
||
1690000
|
heap
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
FAA000
|
unkown
|
page execute and read and write
|
||
1694000
|
heap
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
4D6F000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
1D91D000
|
stack
|
page read and write
|
||
1902000
|
heap
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
AF1000
|
unkown
|
page execute and write copy
|
||
1922000
|
heap
|
page read and write
|
||
FD4000
|
unkown
|
page execute and read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
4FEF000
|
stack
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1D68F000
|
stack
|
page read and write
|
||
4DAE000
|
stack
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
1D40F000
|
stack
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
1880000
|
heap
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1D6DE000
|
stack
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
4C2F000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
FE2000
|
unkown
|
page execute and write copy
|
||
4FF1000
|
heap
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
143C000
|
stack
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF4000
|
heap
|
page read and write
|
||
1915000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
FCA000
|
unkown
|
page execute and read and write
|
||
33A7000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
18F4000
|
heap
|
page read and write
|
||
1D7DF000
|
stack
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
18D2000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
5460000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
1A7E000
|
stack
|
page read and write
|
||
AF0000
|
unkown
|
page readonly
|
||
1179000
|
unkown
|
page execute and read and write
|
||
1694000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
188A000
|
heap
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
There are 225 hidden memdumps, click here to show them.