Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpWindows
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php2
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpB
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php&
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpD
|
unknown
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpj
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
19DE000
|
heap
|
page read and write
|
||
C31000
|
unkown
|
page execute and read and write
|
||
55E0000
|
direct allocation
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
16F5000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
1D81E000
|
stack
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
33AC000
|
stack
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
4DDE000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
361F000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
1825000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
5730000
|
direct allocation
|
page execute and read and write
|
||
5161000
|
heap
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
4C5F000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
196E000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
192E000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
1D7AF000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
1DA5E000
|
stack
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
3417000
|
heap
|
page read and write
|
||
55E0000
|
direct allocation
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5750000
|
direct allocation
|
page execute and read and write
|
||
5161000
|
heap
|
page read and write
|
||
12BB000
|
unkown
|
page execute and read and write
|
||
5161000
|
heap
|
page read and write
|
||
1127000
|
unkown
|
page execute and write copy
|
||
5161000
|
heap
|
page read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
1110000
|
unkown
|
page execute and read and write
|
||
5161000
|
heap
|
page read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
1126000
|
unkown
|
page execute and write copy
|
||
33F0000
|
direct allocation
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
E8E000
|
unkown
|
page execute and read and write
|
||
5161000
|
heap
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
475F000
|
stack
|
page read and write
|
||
351F000
|
stack
|
page read and write
|
||
D12000
|
unkown
|
page execute and read and write
|
||
401E000
|
stack
|
page read and write
|
||
19B0000
|
heap
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5740000
|
direct allocation
|
page execute and read and write
|
||
576E000
|
stack
|
page read and write
|
||
19AE000
|
stack
|
page read and write
|
||
5180000
|
heap
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
1D91F000
|
stack
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
1D56E000
|
stack
|
page read and write
|
||
4D9F000
|
stack
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
19D0000
|
heap
|
page read and write
|
||
1A55000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
CED000
|
unkown
|
page execute and read and write
|
||
1D6AE000
|
stack
|
page read and write
|
||
1126000
|
unkown
|
page execute and read and write
|
||
33EE000
|
stack
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
134C000
|
stack
|
page read and write
|
||
1DB9D000
|
stack
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
5174000
|
heap
|
page read and write
|
||
CE1000
|
unkown
|
page execute and read and write
|
||
5161000
|
heap
|
page read and write
|
||
1BCF000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
19DA000
|
heap
|
page read and write
|
||
5790000
|
direct allocation
|
page execute and read and write
|
||
1820000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
1D66F000
|
stack
|
page read and write
|
||
10EE000
|
unkown
|
page execute and read and write
|
||
5161000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
571F000
|
stack
|
page read and write
|
||
1DA9E000
|
stack
|
page read and write
|
||
1014000
|
unkown
|
page execute and read and write
|
||
C31000
|
unkown
|
page execute and write copy
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
1D52F000
|
stack
|
page read and write
|
||
180E000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
5780000
|
direct allocation
|
page execute and read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5770000
|
direct allocation
|
page execute and read and write
|
||
399F000
|
stack
|
page read and write
|
||
5760000
|
direct allocation
|
page execute and read and write
|
||
E7A000
|
unkown
|
page execute and read and write
|
||
1810000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
55E0000
|
direct allocation
|
page read and write
|
||
4EDF000
|
stack
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
5170000
|
heap
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
341B000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
505E000
|
stack
|
page read and write
|
||
C30000
|
unkown
|
page read and write
|
||
501F000
|
stack
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
561E000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
1A25000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
16FE000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
1A38000
|
heap
|
page read and write
|
||
1117000
|
unkown
|
page execute and read and write
|
||
5161000
|
heap
|
page read and write
|
||
1D95E000
|
stack
|
page read and write
|
||
5760000
|
direct allocation
|
page execute and read and write
|
||
515F000
|
stack
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
There are 193 hidden memdumps, click here to show them.