Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpl
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/9
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpT
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php(
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
791000
|
unkown
|
page execute and read and write
|
||
14AE000
|
heap
|
page read and write
|
||
5160000
|
direct allocation
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
136E000
|
stack
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
2EFB000
|
stack
|
page read and write
|
||
FC5000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
E2F000
|
unkown
|
page execute and read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4B6F000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
4CE0000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
1D48F000
|
stack
|
page read and write
|
||
5160000
|
direct allocation
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
1523000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
872000
|
unkown
|
page execute and read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
C90000
|
unkown
|
page execute and write copy
|
||
2EBE000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
1D61E000
|
stack
|
page read and write
|
||
1D32F000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
4CD6000
|
heap
|
page read and write
|
||
4CAF000
|
stack
|
page read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
C8F000
|
unkown
|
page execute and read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
1D38E000
|
stack
|
page read and write
|
||
E30000
|
unkown
|
page execute and write copy
|
||
791000
|
unkown
|
page execute and write copy
|
||
37AE000
|
stack
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
14F4000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4A6E000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
529F000
|
stack
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
519E000
|
stack
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
ECC000
|
stack
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
1D0AF000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
1D5DC000
|
stack
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
4CB0000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
790000
|
unkown
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
9EE000
|
unkown
|
page execute and read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
1D1EF000
|
stack
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
52F0000
|
direct allocation
|
page execute and read and write
|
||
41AE000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
841000
|
unkown
|
page execute and read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
1D22E000
|
stack
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
C7F000
|
unkown
|
page execute and read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
C8F000
|
unkown
|
page execute and write copy
|
||
2F10000
|
direct allocation
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
1D0EE000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
5300000
|
direct allocation
|
page execute and read and write
|
||
5110000
|
trusted library allocation
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
84D000
|
unkown
|
page execute and read and write
|
||
14A8000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
5160000
|
direct allocation
|
page read and write
|
||
C52000
|
unkown
|
page execute and read and write
|
||
9DA000
|
unkown
|
page execute and read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
2F2B000
|
heap
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
1D4DD000
|
stack
|
page read and write
|
||
1509000
|
heap
|
page read and write
|
||
C78000
|
unkown
|
page execute and read and write
|
||
B6D000
|
unkown
|
page execute and read and write
|
||
32AE000
|
stack
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
790000
|
unkown
|
page readonly
|
||
3F2E000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
1D71E000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
48EF000
|
stack
|
page read and write
|
There are 194 hidden memdumps, click here to show them.