Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.phpN
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37o
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpB
|
unknown
|
||
http://185.215.113.37/e
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpv
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37(
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpZ
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B71000
|
unkown
|
page execute and read and write
|
||
91E000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
90D000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
C21000
|
unkown
|
page execute and read and write
|
||
4F20000
|
direct allocation
|
page execute and read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
C52000
|
unkown
|
page execute and read and write
|
||
4901000
|
heap
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
48CF000
|
stack
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
4F30000
|
direct allocation
|
page execute and read and write
|
||
4901000
|
heap
|
page read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
1074000
|
unkown
|
page execute and write copy
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4900000
|
heap
|
page read and write
|
||
1217000
|
unkown
|
page execute and read and write
|
||
2D3F000
|
stack
|
page read and write
|
||
2C3C000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
961000
|
heap
|
page read and write
|
||
B70000
|
unkown
|
page read and write
|
||
C2D000
|
unkown
|
page execute and read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
DBA000
|
unkown
|
page execute and read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
1CD0E000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
B4D000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
1CCCF000
|
stack
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
478F000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
1D0BF000
|
stack
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
755000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
B67000
|
heap
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
1CFBE000
|
stack
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
F52000
|
unkown
|
page execute and read and write
|
||
1075000
|
unkown
|
page execute and write copy
|
||
363E000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
97A000
|
heap
|
page read and write
|
||
43C0000
|
heap
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
1D0FD000
|
stack
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
1CE0F000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
1066000
|
unkown
|
page execute and read and write
|
||
4901000
|
heap
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
450F000
|
stack
|
page read and write
|
||
7F5000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
1D33E000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
1D1FC000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
440E000
|
stack
|
page read and write
|
||
39FE000
|
stack
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
4901000
|
heap
|
page read and write
|
||
B0F000
|
stack
|
page read and write
|
||
1D23E000
|
stack
|
page read and write
|
||
75E000
|
stack
|
page read and write
|
||
105D000
|
unkown
|
page execute and read and write
|
||
413F000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
B70000
|
unkown
|
page readonly
|
||
48F0000
|
direct allocation
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
1CF4F000
|
stack
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
464F000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
1218000
|
unkown
|
page execute and write copy
|
||
48F0000
|
direct allocation
|
page read and write
|
||
DCE000
|
unkown
|
page execute and read and write
|
||
4910000
|
heap
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
1CE4E000
|
stack
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
B6B000
|
heap
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
1074000
|
unkown
|
page execute and read and write
|
||
1039000
|
unkown
|
page execute and read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
95F000
|
heap
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
4903000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
B71000
|
unkown
|
page execute and write copy
|
||
4901000
|
heap
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
65C000
|
stack
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
91A000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
There are 194 hidden memdumps, click here to show them.