Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpva=T
|
unknown
|
||
http://185.215.113.37/4D
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phph
|
unknown
|
||
http://185.215.113.37/01
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpBa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
381000
|
unkown
|
page execute and read and write
|
||
4D40000
|
direct allocation
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
107E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
10D7000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
1CF0E000
|
stack
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
1CCCE000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
A18000
|
unkown
|
page execute and read and write
|
||
87B000
|
unkown
|
page execute and read and write
|
||
414E000
|
stack
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
F4D000
|
stack
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
43D000
|
unkown
|
page execute and read and write
|
||
438F000
|
stack
|
page read and write
|
||
BA5000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
87C000
|
unkown
|
page execute and write copy
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
BAF000
|
stack
|
page read and write
|
||
4D40000
|
direct allocation
|
page read and write
|
||
380000
|
unkown
|
page readonly
|
||
2ACE000
|
stack
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page execute and read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
4E7F000
|
stack
|
page read and write
|
||
488F000
|
stack
|
page read and write
|
||
1138000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48C2000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
A19000
|
unkown
|
page execute and write copy
|
||
2BCF000
|
stack
|
page read and write
|
||
11BA000
|
heap
|
page read and write
|
||
1CE0E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
86D000
|
unkown
|
page execute and read and write
|
||
841000
|
unkown
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
35CF000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1D1FD000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
4890000
|
heap
|
page read and write
|
||
5CA000
|
unkown
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
3ECD000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
381000
|
unkown
|
page execute and write copy
|
||
360E000
|
stack
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
11AA000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
1D0BD000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
10BE000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
1D1BD000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
43CE000
|
stack
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
4D40000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
460F000
|
stack
|
page read and write
|
||
1197000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1CF6E000
|
stack
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
767000
|
unkown
|
page execute and read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
1D06F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
1CDCF000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
474F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
2C0B000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
87B000
|
unkown
|
page execute and write copy
|
||
F75000
|
heap
|
page read and write
|
||
462000
|
unkown
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
3ACF000
|
stack
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
5DE000
|
unkown
|
page execute and read and write
|
||
464E000
|
stack
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
111E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
1D2FD000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
865000
|
unkown
|
page execute and read and write
|
||
1CC8F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
AAC000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
44CF000
|
stack
|
page read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
48B0000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
10DB000
|
heap
|
page read and write
|
There are 195 hidden memdumps, click here to show them.