Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpB
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php6
|
unknown
|
||
http://185.215.113.37/I
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpiH
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6CE000
|
heap
|
page read and write
|
||
4BD0000
|
direct allocation
|
page read and write
|
||
BF1000
|
unkown
|
page execute and read and write
|
||
400E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
66D000
|
stack
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
CD2000
|
unkown
|
page execute and read and write
|
||
4751000
|
heap
|
page read and write
|
||
1D16E000
|
stack
|
page read and write
|
||
ABF000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
CA1000
|
unkown
|
page execute and read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
727000
|
heap
|
page read and write
|
||
1D02D000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
3ECE000
|
stack
|
page read and write
|
||
72F000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4767000
|
heap
|
page read and write
|
||
6CA000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
2B47000
|
heap
|
page read and write
|
||
7E5000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
4751000
|
heap
|
page read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
1D1FE000
|
stack
|
page read and write
|
||
44CF000
|
stack
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
4750000
|
heap
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
9BE000
|
stack
|
page read and write
|
||
126B000
|
unkown
|
page execute and read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
2B4B000
|
heap
|
page read and write
|
||
2B20000
|
direct allocation
|
page read and write
|
||
1CF2D000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
4D0F000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
10DB000
|
unkown
|
page execute and write copy
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
438F000
|
stack
|
page read and write
|
||
E3A000
|
unkown
|
page execute and read and write
|
||
1CDAF000
|
stack
|
page read and write
|
||
2B20000
|
direct allocation
|
page read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
1CA2E000
|
stack
|
page read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
360E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4770000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
BF0000
|
unkown
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
FC8000
|
unkown
|
page execute and read and write
|
||
4751000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
43CE000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
464E000
|
stack
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
1D06D000
|
stack
|
page read and write
|
||
1CEEF000
|
stack
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
460F000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
395000
|
stack
|
page read and write
|
||
10DA000
|
unkown
|
page execute and write copy
|
||
4751000
|
heap
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
29C000
|
stack
|
page read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
3ACF000
|
stack
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
1CB2F000
|
stack
|
page read and write
|
||
1CB6E000
|
stack
|
page read and write
|
||
126C000
|
unkown
|
page execute and write copy
|
||
BF0000
|
unkown
|
page readonly
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
39F000
|
stack
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
1CC6F000
|
stack
|
page read and write
|
||
741000
|
heap
|
page read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
712000
|
heap
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
1CDEE000
|
stack
|
page read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
1D300000
|
heap
|
page read and write
|
||
10DA000
|
unkown
|
page execute and read and write
|
||
10CD000
|
unkown
|
page execute and read and write
|
||
4751000
|
heap
|
page read and write
|
||
10A0000
|
unkown
|
page execute and read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
10C4000
|
unkown
|
page execute and read and write
|
||
4760000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
1CCAE000
|
stack
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
4751000
|
heap
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
2D4F000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
E4E000
|
unkown
|
page execute and read and write
|
||
2B30000
|
direct allocation
|
page execute and read and write
|
||
4751000
|
heap
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
1D2FF000
|
stack
|
page read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
B3C000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
CAD000
|
unkown
|
page execute and read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
474F000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
BF1000
|
unkown
|
page execute and write copy
|
||
310E000
|
stack
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
There are 195 hidden memdumps, click here to show them.