Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.php;
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpK
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpXN
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php/
|
unknown
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpw
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5610000
|
direct allocation
|
page read and write
|
||
C31000
|
unkown
|
page execute and read and write
|
||
19BE000
|
heap
|
page read and write
|
||
CE1000
|
unkown
|
page execute and read and write
|
||
17B4000
|
heap
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
E8E000
|
unkown
|
page execute and read and write
|
||
418E000
|
stack
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
1990000
|
direct allocation
|
page read and write
|
||
1D92F000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
1A29000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
1BAF000
|
stack
|
page read and write
|
||
19FF000
|
heap
|
page read and write
|
||
1DABD000
|
stack
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
C30000
|
unkown
|
page read and write
|
||
1DD62000
|
heap
|
page read and write
|
||
43CF000
|
stack
|
page read and write
|
||
55D0000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
10F7000
|
unkown
|
page execute and read and write
|
||
404E000
|
stack
|
page read and write
|
||
518F000
|
stack
|
page read and write
|
||
5770000
|
direct allocation
|
page execute and read and write
|
||
450F000
|
stack
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
464F000
|
stack
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
1A02000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
12D3000
|
unkown
|
page execute and read and write
|
||
51B0000
|
heap
|
page read and write
|
||
3487000
|
heap
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
39CF000
|
stack
|
page read and write
|
||
1990000
|
direct allocation
|
page read and write
|
||
1DA7C000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
4C8F000
|
stack
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
3460000
|
direct allocation
|
page execute and read and write
|
||
1A34000
|
heap
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
3D8F000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
3470000
|
direct allocation
|
page execute and read and write
|
||
1D56F000
|
stack
|
page read and write
|
||
5198000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
48CF000
|
stack
|
page read and write
|
||
388F000
|
stack
|
page read and write
|
||
1990000
|
direct allocation
|
page read and write
|
||
1990000
|
direct allocation
|
page read and write
|
||
1D97D000
|
stack
|
page read and write
|
||
173E000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
1990000
|
direct allocation
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
16F5000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
12D4000
|
unkown
|
page execute and write copy
|
||
5191000
|
heap
|
page read and write
|
||
D12000
|
unkown
|
page execute and read and write
|
||
17B4000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5760000
|
direct allocation
|
page execute and read and write
|
||
358F000
|
stack
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
5760000
|
direct allocation
|
page execute and read and write
|
||
440E000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
1DC5E000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5750000
|
direct allocation
|
page execute and read and write
|
||
574F000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
19BA000
|
heap
|
page read and write
|
||
4A0F000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5190000
|
heap
|
page read and write
|
||
16FF000
|
stack
|
page read and write
|
||
3C4F000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
1990000
|
direct allocation
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
4F0F000
|
stack
|
page read and write
|
||
136C000
|
stack
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
1DBBE000
|
stack
|
page read and write
|
||
5790000
|
direct allocation
|
page execute and read and write
|
||
1D6AF000
|
stack
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
C31000
|
unkown
|
page execute and write copy
|
||
3ECF000
|
stack
|
page read and write
|
||
177E000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
1133000
|
unkown
|
page execute and write copy
|
||
17B4000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
1990000
|
direct allocation
|
page read and write
|
||
1D82E000
|
stack
|
page read and write
|
||
1134000
|
unkown
|
page execute and write copy
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
1133000
|
unkown
|
page execute and read and write
|
||
340E000
|
stack
|
page read and write
|
||
47CD000
|
stack
|
page read and write
|
||
19B0000
|
heap
|
page read and write
|
||
478F000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
1D6EE000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
1D7EF000
|
stack
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
1D46E000
|
stack
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
17B0000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
1990000
|
direct allocation
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
3C8E000
|
stack
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
3450000
|
direct allocation
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
1990000
|
direct allocation
|
page read and write
|
||
1DD5F000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
1990000
|
direct allocation
|
page read and write
|
||
1DD60000
|
heap
|
page read and write
|
||
1A44000
|
heap
|
page read and write
|
||
33CC000
|
stack
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
1990000
|
direct allocation
|
page read and write
|
||
1990000
|
direct allocation
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
428F000
|
stack
|
page read and write
|
||
1D5AE000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
198F000
|
stack
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
1125000
|
unkown
|
page execute and read and write
|
||
5191000
|
heap
|
page read and write
|
||
101E000
|
unkown
|
page execute and read and write
|
||
378F000
|
stack
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
1990000
|
direct allocation
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
1990000
|
direct allocation
|
page read and write
|
||
504F000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
1A19000
|
heap
|
page read and write
|
||
CED000
|
unkown
|
page execute and read and write
|
||
3450000
|
direct allocation
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
111A000
|
unkown
|
page execute and read and write
|
||
5191000
|
heap
|
page read and write
|
||
1A26000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
E7A000
|
unkown
|
page execute and read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5780000
|
direct allocation
|
page execute and read and write
|
||
490E000
|
stack
|
page read and write
|
||
4DCF000
|
stack
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
348B000
|
heap
|
page read and write
|
||
17B4000
|
heap
|
page read and write
|
||
3B0F000
|
stack
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
There are 225 hidden memdumps, click here to show them.