Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php
|
185.215.113.206
|
||
http://185.215.113.206/e2b1563c6670f193.php/
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.phpX
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php2
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.phpD
|
unknown
|
||
http://185.215.113.206/w9
|
unknown
|
||
http://185.215.113.206gw0
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
16DE000
|
heap
|
page read and write
|
||
F61000
|
unkown
|
page execute and read and write
|
||
5380000
|
direct allocation
|
page read and write
|
||
F60000
|
unkown
|
page readonly
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
11BE000
|
unkown
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
1468000
|
unkown
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
5380000
|
direct allocation
|
page read and write
|
||
5520000
|
direct allocation
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
16DA000
|
heap
|
page read and write
|
||
1D7ED000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
1D43E000
|
stack
|
page read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
160B000
|
unkown
|
page execute and read and write
|
||
1D82D000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1042000
|
unkown
|
page execute and read and write
|
||
134B000
|
unkown
|
page execute and read and write
|
||
164E000
|
stack
|
page read and write
|
||
1011000
|
unkown
|
page execute and read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
168C000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
101D000
|
unkown
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
49EF000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
160C000
|
unkown
|
page execute and write copy
|
||
16D0000
|
heap
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
1459000
|
unkown
|
page execute and read and write
|
||
33AF000
|
stack
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
1469000
|
unkown
|
page execute and write copy
|
||
3FEF000
|
stack
|
page read and write
|
||
5380000
|
direct allocation
|
page read and write
|
||
18CE000
|
stack
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
D3F000
|
stack
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
171C000
|
heap
|
page read and write
|
||
1D5AE000
|
stack
|
page read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1D53F000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1D2FE000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
142F000
|
unkown
|
page execute and read and write
|
||
1D6AF000
|
stack
|
page read and write
|
||
4EEF000
|
stack
|
page read and write
|
||
1D3FF000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
1451000
|
unkown
|
page execute and read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
F61000
|
unkown
|
page execute and write copy
|
||
F60000
|
unkown
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
1D6ED000
|
stack
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
1D2BF000
|
stack
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
4B2F000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
4EF0000
|
heap
|
page read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
4DAF000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1738000
|
heap
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
39AF000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
32A7000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
D35000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1723000
|
heap
|
page read and write
|
||
32AB000
|
heap
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
11AA000
|
unkown
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
4F06000
|
heap
|
page read and write
|
||
54BF000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
1D92C000
|
stack
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
19CE000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4C6F000
|
stack
|
page read and write
|
||
1468000
|
unkown
|
page execute and write copy
|
||
4F04000
|
heap
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
There are 195 hidden memdumps, click here to show them.