Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpt5b
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpf
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.378
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php)
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phph
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php7
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1B1000
|
unkown
|
page execute and read and write
|
||
4B60000
|
direct allocation
|
page read and write
|
||
ECE000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
47D0000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
heap
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
447E000
|
stack
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1CFFC000
|
stack
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
40E000
|
unkown
|
page execute and read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
8EC000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
6A7000
|
unkown
|
page execute and read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
59D000
|
unkown
|
page execute and read and write
|
||
D74000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4B9E000
|
stack
|
page read and write
|
||
28F7000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1D03E000
|
stack
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
6B6000
|
unkown
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1D2A4000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
1CAEF000
|
stack
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
46E5000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
6B7000
|
unkown
|
page execute and write copy
|
||
32FE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
1C9EE000
|
stack
|
page read and write
|
||
F26000
|
heap
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
1CEFE000
|
stack
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
EBF000
|
stack
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1D2A0000
|
heap
|
page read and write
|
||
26D000
|
unkown
|
page execute and read and write
|
||
D74000
|
heap
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
28E0000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
292000
|
unkown
|
page execute and read and write
|
||
9E5000
|
stack
|
page read and write
|
||
1CD6E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4C9F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1CDAE000
|
stack
|
page read and write
|
||
1CEAF000
|
stack
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1CB2E000
|
stack
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
261000
|
unkown
|
page execute and read and write
|
||
69D000
|
unkown
|
page execute and read and write
|
||
2A3B000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
46D0000
|
heap
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4B60000
|
direct allocation
|
page read and write
|
||
F0D000
|
heap
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
1B1000
|
unkown
|
page execute and write copy
|
||
1CC2F000
|
stack
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
393E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1D13E000
|
stack
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
F41000
|
heap
|
page read and write
|
||
1D19E000
|
stack
|
page read and write
|
||
46F0000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1CC6E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
4B60000
|
direct allocation
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
6B6000
|
unkown
|
page execute and write copy
|
||
3FA000
|
unkown
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
ECA000
|
heap
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
859000
|
unkown
|
page execute and read and write
|
||
343E000
|
stack
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1D29F000
|
stack
|
page read and write
|
||
67B000
|
unkown
|
page execute and read and write
|
||
40BE000
|
stack
|
page read and write
|
There are 221 hidden memdumps, click here to show them.