Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/n
|
unknown
|
||
http://185.215.113.37/I~
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php2
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpd
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpo?
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpW
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
52E0000
|
direct allocation
|
page read and write
|
||
15CE000
|
heap
|
page read and write
|
||
941000
|
unkown
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
445F000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
A22000
|
unkown
|
page execute and read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1D95E000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
52E0000
|
direct allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
E2C000
|
unkown
|
page execute and read and write
|
||
1454000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
15BE000
|
stack
|
page read and write
|
||
1D16E000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
B9E000
|
unkown
|
page execute and read and write
|
||
449E000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
FD3000
|
unkown
|
page execute and read and write
|
||
30DE000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E5F000
|
stack
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1612000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
4D1F000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
1D67D000
|
stack
|
page read and write
|
||
41DF000
|
stack
|
page read and write
|
||
1628000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
940000
|
unkown
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1D3EE000
|
stack
|
page read and write
|
||
941000
|
unkown
|
page execute and write copy
|
||
4E61000
|
heap
|
page read and write
|
||
1DA60000
|
heap
|
page read and write
|
||
46DF000
|
stack
|
page read and write
|
||
459E000
|
stack
|
page read and write
|
||
3CDF000
|
stack
|
page read and write
|
||
3BDE000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1D52E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
1DA5E000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
481F000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
940000
|
unkown
|
page readonly
|
||
30F0000
|
direct allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
409F000
|
stack
|
page read and write
|
||
E3A000
|
unkown
|
page execute and read and write
|
||
1454000
|
heap
|
page read and write
|
||
1D8BE000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1D2AE000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
9FD000
|
unkown
|
page execute and read and write
|
||
18BE000
|
stack
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
E01000
|
unkown
|
page execute and read and write
|
||
D20000
|
unkown
|
page execute and read and write
|
||
1450000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
126C000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1D77C000
|
stack
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1D4EF000
|
stack
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
143E000
|
stack
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
3F5F000
|
stack
|
page read and write
|
||
1365000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
3A5F000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
531E000
|
stack
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
17BE000
|
stack
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
1D7BD000
|
stack
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
311B000
|
heap
|
page read and write
|
||
15CA000
|
heap
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
3E1F000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
495F000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
40DE000
|
stack
|
page read and write
|
||
1615000
|
heap
|
page read and write
|
||
37DF000
|
stack
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
1454000
|
heap
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
136E000
|
stack
|
page read and write
|
||
1D26F000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
B8A000
|
unkown
|
page execute and read and write
|
||
435E000
|
stack
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
541F000
|
stack
|
page read and write
|
||
FD4000
|
unkown
|
page execute and write copy
|
||
1454000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
E3A000
|
unkown
|
page execute and write copy
|
||
421E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1D62F000
|
stack
|
page read and write
|
||
E3B000
|
unkown
|
page execute and write copy
|
||
4E61000
|
heap
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
E23000
|
unkown
|
page execute and read and write
|
||
1D3AF000
|
stack
|
page read and write
|
||
9F1000
|
unkown
|
page execute and read and write
|
||
1454000
|
heap
|
page read and write
|
||
3F9E000
|
stack
|
page read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
45DE000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
3117000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
There are 221 hidden memdumps, click here to show them.