Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/0
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.php;
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/G
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpS
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
911000
|
unkown
|
page execute and read and write
|
||
4CC0000
|
direct allocation
|
page read and write
|
||
102E000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
911000
|
unkown
|
page execute and write copy
|
||
2C20000
|
direct allocation
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
DF6000
|
unkown
|
page execute and read and write
|
||
4C80000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
6F5000
|
stack
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
1088000
|
heap
|
page read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4852000
|
heap
|
page read and write
|
||
E00000
|
unkown
|
page execute and read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
8CE000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
2C37000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
1CFDF000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
1CC3E000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
1D26E000
|
stack
|
page read and write
|
||
106C000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
1CBFE000
|
stack
|
page read and write
|
||
2C20000
|
direct allocation
|
page read and write
|
||
1CD7E000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
1CD3F000
|
stack
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
1D02D000
|
stack
|
page read and write
|
||
4860000
|
heap
|
page read and write
|
||
2D3F000
|
stack
|
page read and write
|
||
486A000
|
heap
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
1CE7F000
|
stack
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
1D12D000
|
stack
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
86E000
|
stack
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
FAA000
|
unkown
|
page execute and write copy
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
E0E000
|
unkown
|
page execute and write copy
|
||
3E0000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
B6E000
|
unkown
|
page execute and read and write
|
||
DD4000
|
unkown
|
page execute and read and write
|
||
333E000
|
stack
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
10AC000
|
heap
|
page read and write
|
||
CF6000
|
unkown
|
page execute and read and write
|
||
7E5000
|
heap
|
page read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
37C000
|
stack
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
343F000
|
stack
|
page read and write
|
||
910000
|
unkown
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
90B000
|
stack
|
page read and write
|
||
FA9000
|
unkown
|
page execute and read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
1CEDE000
|
stack
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
1028000
|
heap
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
B5A000
|
unkown
|
page execute and read and write
|
||
10A4000
|
heap
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
121F000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
E0F000
|
unkown
|
page execute and write copy
|
||
393F000
|
stack
|
page read and write
|
||
4840000
|
heap
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
E0E000
|
unkown
|
page execute and read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
9CD000
|
unkown
|
page execute and read and write
|
||
9F2000
|
unkown
|
page execute and read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
4841000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
4841000
|
heap
|
page read and write
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
2C3B000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
1D16D000
|
stack
|
page read and write
|
||
910000
|
unkown
|
page readonly
|
||
4841000
|
heap
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
4DFF000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
1096000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
9C1000
|
unkown
|
page execute and read and write
|
There are 196 hidden memdumps, click here to show them.