Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.php8a
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpR
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php%:
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpu:
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/law
|
unknown
|
||
http://185.215.113.37W$
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
107E000
|
heap
|
page read and write
|
||
321000
|
unkown
|
page execute and read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
2D50000
|
direct allocation
|
page read and write
|
||
1078000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
321000
|
unkown
|
page execute and write copy
|
||
4A01000
|
heap
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
1D0CE000
|
stack
|
page read and write
|
||
2D50000
|
direct allocation
|
page read and write
|
||
1D08F000
|
stack
|
page read and write
|
||
1CF4F000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A20000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
2D50000
|
direct allocation
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
2D50000
|
direct allocation
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
9A6000
|
unkown
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
811000
|
unkown
|
page execute and write copy
|
||
1CF8E000
|
stack
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
4FBF000
|
stack
|
page read and write
|
||
320000
|
unkown
|
page readonly
|
||
35FF000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
7FB000
|
unkown
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
802000
|
unkown
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
10D8000
|
heap
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
4A17000
|
heap
|
page read and write
|
||
812000
|
unkown
|
page execute and write copy
|
||
4A01000
|
heap
|
page read and write
|
||
49FF000
|
stack
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
2D50000
|
direct allocation
|
page read and write
|
||
2D50000
|
direct allocation
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
F84000
|
heap
|
page read and write
|
||
3D1000
|
unkown
|
page execute and read and write
|
||
2D50000
|
direct allocation
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
10E6000
|
heap
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
4A00000
|
heap
|
page read and write
|
||
1D45E000
|
stack
|
page read and write
|
||
F35000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
2D77000
|
heap
|
page read and write
|
||
2D7B000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
2D50000
|
direct allocation
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
F84000
|
heap
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
4A10000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
10F9000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
7D8000
|
unkown
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
1D1CF000
|
stack
|
page read and write
|
||
463F000
|
stack
|
page read and write
|
||
1CD0E000
|
stack
|
page read and write
|
||
4A14000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
320000
|
unkown
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
1CE0F000
|
stack
|
page read and write
|
||
57E000
|
unkown
|
page execute and read and write
|
||
F84000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
2D50000
|
direct allocation
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
1CE4E000
|
stack
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
3DD000
|
unkown
|
page execute and read and write
|
||
F84000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
48BF000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
10C6000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
39FE000
|
stack
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
6FE000
|
unkown
|
page execute and read and write
|
||
F84000
|
heap
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
12BF000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
2D50000
|
direct allocation
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
811000
|
unkown
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
1D31C000
|
stack
|
page read and write
|
||
2D50000
|
direct allocation
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
4B00000
|
trusted library allocation
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
2D50000
|
direct allocation
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
1D35E000
|
stack
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
34BF000
|
stack
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
1D21D000
|
stack
|
page read and write
|
||
56A000
|
unkown
|
page execute and read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
2D50000
|
direct allocation
|
page read and write
|
||
9A7000
|
unkown
|
page execute and write copy
|
||
F84000
|
heap
|
page read and write
|
||
2D50000
|
direct allocation
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
453E000
|
stack
|
page read and write
|
||
E3C000
|
stack
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
44FF000
|
stack
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
10F2000
|
heap
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
There are 221 hidden memdumps, click here to show them.