Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.php2
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php0
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php/
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.php$
|
unknown
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37a
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php(
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
471000
|
unkown
|
page execute and read and write
|
||
121E000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
961000
|
unkown
|
page execute and read and write
|
||
1094000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
552000
|
unkown
|
page execute and read and write
|
||
1094000
|
heap
|
page read and write
|
||
106B000
|
heap
|
page read and write
|
||
2D2B000
|
stack
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
1CDEE000
|
stack
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
970000
|
unkown
|
page execute and write copy
|
||
49B1000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
4E10000
|
heap
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
1218000
|
heap
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
6CE000
|
unkown
|
page execute and read and write
|
||
49B1000
|
heap
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
52D000
|
unkown
|
page execute and read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1D02F000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
49B0000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
4F6F000
|
stack
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
125C000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
||
1296000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
486F000
|
stack
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
1CEEF000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1D2BD000
|
stack
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
1CCAE000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
96F000
|
unkown
|
page execute and write copy
|
||
436F000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
4F70000
|
direct allocation
|
page execute and read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
B10000
|
unkown
|
page execute and write copy
|
||
1200000
|
direct allocation
|
page read and write
|
||
1262000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
1CDAF000
|
stack
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
B0F000
|
unkown
|
page execute and read and write
|
||
49B1000
|
heap
|
page read and write
|
||
937000
|
unkown
|
page execute and read and write
|
||
45EF000
|
stack
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
957000
|
unkown
|
page execute and read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
6BA000
|
unkown
|
page execute and read and write
|
||
FE0000
|
heap
|
page read and write
|
||
1D2FD000
|
stack
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
1277000
|
heap
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
859000
|
unkown
|
page execute and read and write
|
||
426E000
|
stack
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
1CF2E000
|
stack
|
page read and write
|
||
BAC000
|
stack
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
EF5000
|
stack
|
page read and write
|
||
471000
|
unkown
|
page execute and write copy
|
||
11E0000
|
direct allocation
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1D3FE000
|
stack
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
1D1BD000
|
stack
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
521000
|
unkown
|
page execute and read and write
|
||
422F000
|
stack
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
104D000
|
stack
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
1D06E000
|
stack
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
||
49B1000
|
heap
|
page read and write
|
||
96F000
|
unkown
|
page execute and read and write
|
||
11DE000
|
stack
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
1D16F000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
There are 216 hidden memdumps, click here to show them.