Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php5
|
unknown
|
||
http://185.215.113.3793
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phps
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpYG
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpW
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
851000
|
unkown
|
page execute and read and write
|
||
15AE000
|
heap
|
page read and write
|
||
5200000
|
direct allocation
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
D18000
|
unkown
|
page execute and read and write
|
||
4D81000
|
heap
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
1D18F000
|
stack
|
page read and write
|
||
F8C000
|
stack
|
page read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
1D6DE000
|
stack
|
page read and write
|
||
C3B000
|
unkown
|
page execute and read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
D3C000
|
unkown
|
page execute and read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
1D1CE000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
4C3F000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
1D97F000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
1D08E000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
D58000
|
unkown
|
page execute and write copy
|
||
143E000
|
stack
|
page read and write
|
||
5200000
|
direct allocation
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
A9A000
|
unkown
|
page execute and read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
1D40E000
|
stack
|
page read and write
|
||
15F7000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
49BF000
|
stack
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
1D87E000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
D49000
|
unkown
|
page execute and read and write
|
||
13E4000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
4D81000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
4D7F000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
D57000
|
unkown
|
page execute and write copy
|
||
13E4000
|
heap
|
page read and write
|
||
D57000
|
unkown
|
page execute and read and write
|
||
13E4000
|
heap
|
page read and write
|
||
487F000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
473F000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
533F000
|
stack
|
page read and write
|
||
850000
|
unkown
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
4D80000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
30B7000
|
heap
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
EFC000
|
unkown
|
page execute and write copy
|
||
1609000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
157D000
|
stack
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
30FC000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
5370000
|
direct allocation
|
page execute and read and write
|
||
423F000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
5350000
|
direct allocation
|
page execute and read and write
|
||
1D980000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
15F1000
|
heap
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
4AFF000
|
stack
|
page read and write
|
||
1D45E000
|
stack
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
901000
|
unkown
|
page execute and read and write
|
||
4D81000
|
heap
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
179F000
|
stack
|
page read and write
|
||
850000
|
unkown
|
page readonly
|
||
4D81000
|
heap
|
page read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
12F5000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
851000
|
unkown
|
page execute and write copy
|
||
932000
|
unkown
|
page execute and read and write
|
||
13E4000
|
heap
|
page read and write
|
||
1D69D000
|
stack
|
page read and write
|
||
1D55F000
|
stack
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
AAE000
|
unkown
|
page execute and read and write
|
||
523C000
|
stack
|
page read and write
|
||
5200000
|
direct allocation
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
1D7DC000
|
stack
|
page read and write
|
||
90D000
|
unkown
|
page execute and read and write
|
||
48BE000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
44BF000
|
stack
|
page read and write
|
||
EFB000
|
unkown
|
page execute and read and write
|
||
13E4000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
1625000
|
heap
|
page read and write
|
||
1D59D000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
15AA000
|
heap
|
page read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
30BB000
|
heap
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
1D30E000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
1D2CF000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
4D81000
|
heap
|
page read and write
|
There are 223 hidden memdumps, click here to show them.