Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.phpn
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpb
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/r
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpV
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/G
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpm:
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
DBE000
|
heap
|
page read and write
|
||
4B10000
|
direct allocation
|
page read and write
|
||
141000
|
unkown
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
B75000
|
stack
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4B10000
|
direct allocation
|
page read and write
|
||
2C2F000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
466F000
|
stack
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
1CA5F000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
1CE8E000
|
stack
|
page read and write
|
||
609000
|
unkown
|
page execute and read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
46B0000
|
heap
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
CF5000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
52E000
|
unkown
|
page execute and read and write
|
||
E40000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4696000
|
heap
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
1CF8D000
|
stack
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
1CA9E000
|
stack
|
page read and write
|
||
DBA000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
28EB000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
28CC000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
644000
|
unkown
|
page execute and write copy
|
||
37AE000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
28E7000
|
heap
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
1CE3F000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
222000
|
unkown
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
4670000
|
heap
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4690000
|
heap
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
1FD000
|
unkown
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
38A000
|
unkown
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
1CD3E000
|
stack
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
1CCDE000
|
stack
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
D90000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
635000
|
unkown
|
page execute and read and write
|
||
7E3000
|
unkown
|
page execute and write copy
|
||
B7E000
|
stack
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
46A0000
|
heap
|
page read and write
|
||
FAF000
|
stack
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
41AE000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
A7C000
|
stack
|
page read and write
|
||
643000
|
unkown
|
page execute and write copy
|
||
2FEF000
|
stack
|
page read and write
|
||
1F1000
|
unkown
|
page execute and read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
284E000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4C4F000
|
stack
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
1CBDE000
|
stack
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
39E000
|
unkown
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
643000
|
unkown
|
page execute and read and write
|
||
4B10000
|
direct allocation
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
1CFCD000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
141000
|
unkown
|
page execute and write copy
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
1CB9F000
|
stack
|
page read and write
|
||
1D0CC000
|
stack
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
62B000
|
unkown
|
page execute and read and write
|
||
E01000
|
heap
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
7E2000
|
unkown
|
page execute and read and write
|
There are 194 hidden memdumps, click here to show them.