Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php
|
185.215.113.206
|
||
http://185.215.113.206/e2b1563c6670f193.php-
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php/
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php9
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.phpY
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php/4
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php:
|
unknown
|
||
http://185.215.113.206Y
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4B50000
|
direct allocation
|
page read and write
|
||
521000
|
unkown
|
page execute and read and write
|
||
EFE000
|
heap
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
5D1000
|
unkown
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
A0C000
|
unkown
|
page execute and read and write
|
||
46CF000
|
stack
|
page read and write
|
||
5DD000
|
unkown
|
page execute and read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
F7F000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
9E8000
|
unkown
|
page execute and read and write
|
||
46D0000
|
heap
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
76A000
|
unkown
|
page execute and read and write
|
||
4F5000
|
stack
|
page read and write
|
||
32CF000
|
stack
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
A15000
|
unkown
|
page execute and read and write
|
||
420E000
|
stack
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
A23000
|
unkown
|
page execute and write copy
|
||
46D1000
|
heap
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
520000
|
unkown
|
page readonly
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
77E000
|
unkown
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1D0EC000
|
stack
|
page read and write
|
||
602000
|
unkown
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
1CFEE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2930000
|
direct allocation
|
page read and write
|
||
4FE000
|
stack
|
page read and write
|
||
1CABE000
|
stack
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
2930000
|
direct allocation
|
page read and write
|
||
BC6000
|
unkown
|
page execute and write copy
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
F3F000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4C8F000
|
stack
|
page read and write
|
||
1CEAE000
|
stack
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
290B000
|
stack
|
page read and write
|
||
10EE000
|
stack
|
page read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1CFAE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
EF8000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
294B000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
F56000
|
heap
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
F82000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
408F000
|
stack
|
page read and write
|
||
1CE5F000
|
stack
|
page read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
46F0000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
904000
|
unkown
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1CBFE000
|
stack
|
page read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
1CCFF000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
F45000
|
heap
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
41CF000
|
stack
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
BC5000
|
unkown
|
page execute and read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
448E000
|
stack
|
page read and write
|
||
1CBBF000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
A23000
|
unkown
|
page execute and read and write
|
||
CE0000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1FC000
|
stack
|
page read and write
|
||
F72000
|
heap
|
page read and write
|
||
521000
|
unkown
|
page execute and write copy
|
||
1CA7F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
1CD5E000
|
stack
|
page read and write
|
||
A24000
|
unkown
|
page execute and write copy
|
||
46E0000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
458F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
D85000
|
heap
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
There are 193 hidden memdumps, click here to show them.