Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.php~
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpB
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpr
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/C
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpo
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpF
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D31000
|
unkown
|
page execute and read and write
|
||
4C10000
|
direct allocation
|
page read and write
|
||
8BE000
|
heap
|
page read and write
|
||
93F000
|
heap
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
1228000
|
unkown
|
page execute and read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
1D1CE000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
BAE000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
1CC9F000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
1D36F000
|
stack
|
page read and write
|
||
13C2000
|
unkown
|
page execute and read and write
|
||
4781000
|
heap
|
page read and write
|
||
DE1000
|
unkown
|
page execute and read and write
|
||
4D4F000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4780000
|
heap
|
page read and write
|
||
2DC000
|
stack
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
3DE000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
84B000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
DED000
|
unkown
|
page execute and read and write
|
||
4781000
|
heap
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
4C10000
|
direct allocation
|
page read and write
|
||
D30000
|
unkown
|
page readonly
|
||
4781000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
CEE000
|
stack
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
F7A000
|
unkown
|
page execute and read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
1228000
|
unkown
|
page execute and write copy
|
||
47A0000
|
heap
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
1CCDE000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
88C000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
1CB5F000
|
stack
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
4DA0000
|
direct allocation
|
page execute and read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
11F0000
|
unkown
|
page execute and read and write
|
||
4790000
|
heap
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
1CB9E000
|
stack
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
3D5000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
D31000
|
unkown
|
page execute and write copy
|
||
336F000
|
stack
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
F8E000
|
unkown
|
page execute and read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
1CF3F000
|
stack
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
1D08C000
|
stack
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
4781000
|
heap
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
1CDDE000
|
stack
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
1D372000
|
heap
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
1D0CD000
|
stack
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
13C3000
|
unkown
|
page execute and write copy
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
1D26E000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
1D370000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
CAF000
|
stack
|
page read and write
|
||
E12000
|
unkown
|
page execute and read and write
|
||
710000
|
heap
|
page read and write
|
||
1218000
|
unkown
|
page execute and read and write
|
||
4781000
|
heap
|
page read and write
|
||
1229000
|
unkown
|
page execute and write copy
|
||
34AF000
|
stack
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
4C10000
|
direct allocation
|
page read and write
|
||
1211000
|
unkown
|
page execute and read and write
|
||
1116000
|
unkown
|
page execute and read and write
|
||
33AE000
|
stack
|
page read and write
|
||
D30000
|
unkown
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
1CE3E000
|
stack
|
page read and write
|
||
8BA000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
1CF8D000
|
stack
|
page read and write
|
There are 196 hidden memdumps, click here to show them.