Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.phpN
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpm
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpr
|
unknown
|
||
http://185.215.113.37/curity=Impersonation
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpa
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpf
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37$
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4F1000
|
unkown
|
page execute and read and write
|
||
12BE000
|
heap
|
page read and write
|
||
4EC0000
|
direct allocation
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
12A0000
|
direct allocation
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
1127000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
1302000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
F35000
|
stack
|
page read and write
|
||
1D08F000
|
stack
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
39CF000
|
stack
|
page read and write
|
||
E3C000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A0F000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
12A0000
|
direct allocation
|
page read and write
|
||
1CE0F000
|
stack
|
page read and write
|
||
43CF000
|
stack
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
4A31000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
4EFC000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
3D8F000
|
stack
|
page read and write
|
||
1135000
|
heap
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
464F000
|
stack
|
page read and write
|
||
3B0F000
|
stack
|
page read and write
|
||
4FFF000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
9D7000
|
unkown
|
page execute and read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
12A0000
|
direct allocation
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
4A31000
|
heap
|
page read and write
|
||
12FF000
|
heap
|
page read and write
|
||
48CF000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
B8D000
|
unkown
|
page execute and read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
314E000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
12A0000
|
direct allocation
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
12A0000
|
direct allocation
|
page read and write
|
||
3ECF000
|
stack
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
B8E000
|
unkown
|
page execute and write copy
|
||
4F0000
|
unkown
|
page read and write
|
||
1CF4F000
|
stack
|
page read and write
|
||
1D23E000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A10000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
5AD000
|
unkown
|
page execute and read and write
|
||
4A30000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
12A0000
|
direct allocation
|
page read and write
|
||
9F0000
|
unkown
|
page execute and write copy
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
4A31000
|
heap
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
3C8E000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
9E1000
|
unkown
|
page execute and read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
73A000
|
unkown
|
page execute and read and write
|
||
9EF000
|
unkown
|
page execute and write copy
|
||
1D1EF000
|
stack
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
5A1000
|
unkown
|
page execute and read and write
|
||
4A31000
|
heap
|
page read and write
|
||
1D47E000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
2E8F000
|
stack
|
page read and write
|
||
9B2000
|
unkown
|
page execute and read and write
|
||
4A31000
|
heap
|
page read and write
|
||
12A0000
|
direct allocation
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
12A0000
|
direct allocation
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
9EF000
|
unkown
|
page execute and read and write
|
||
1D33D000
|
stack
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4EC0000
|
direct allocation
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
2D4F000
|
stack
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
8CC000
|
unkown
|
page execute and read and write
|
||
42CE000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
1336000
|
heap
|
page read and write
|
||
132A000
|
heap
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
428F000
|
stack
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
5D2000
|
unkown
|
page execute and read and write
|
||
4A31000
|
heap
|
page read and write
|
||
1344000
|
heap
|
page read and write
|
||
4F1000
|
unkown
|
page execute and write copy
|
||
4A31000
|
heap
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
4A40000
|
heap
|
page read and write
|
||
3C4F000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
1D0EE000
|
stack
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
12A0000
|
direct allocation
|
page read and write
|
||
14AF000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
364E000
|
stack
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
478F000
|
stack
|
page read and write
|
||
12A0000
|
direct allocation
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A32000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
4EC0000
|
direct allocation
|
page read and write
|
||
1CF8E000
|
stack
|
page read and write
|
||
12A0000
|
direct allocation
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
450F000
|
stack
|
page read and write
|
||
1317000
|
heap
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
12A0000
|
direct allocation
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
12A0000
|
direct allocation
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
74E000
|
unkown
|
page execute and read and write
|
||
418E000
|
stack
|
page read and write
|
||
2D8B000
|
stack
|
page read and write
|
||
490E000
|
stack
|
page read and write
|
||
1D37D000
|
stack
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
388F000
|
stack
|
page read and write
|
||
12BA000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
378E000
|
stack
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
4A31000
|
heap
|
page read and write
|
||
4A50000
|
heap
|
page read and write
|
||
440E000
|
stack
|
page read and write
|
||
1CE4E000
|
stack
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
12A0000
|
direct allocation
|
page read and write
|
||
4A31000
|
heap
|
page read and write
|
There are 196 hidden memdumps, click here to show them.