Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.php-
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37p
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php?
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpi
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4BD0000
|
direct allocation
|
page read and write
|
||
838000
|
heap
|
page read and write
|
||
DE1000
|
unkown
|
page execute and read and write
|
||
4751000
|
heap
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
12D2000
|
unkown
|
page execute and read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
1CC4F000
|
stack
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
11C1000
|
unkown
|
page execute and read and write
|
||
4770000
|
heap
|
page read and write
|
||
48C000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
4751000
|
heap
|
page read and write
|
||
833000
|
heap
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
B0F000
|
stack
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
A0F000
|
stack
|
page read and write
|
||
8A1000
|
heap
|
page read and write
|
||
4730000
|
heap
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
12E1000
|
unkown
|
page execute and write copy
|
||
884000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
DE0000
|
unkown
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
863000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
1D21E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
DE1000
|
unkown
|
page execute and write copy
|
||
4751000
|
heap
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
4750000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
1D17D000
|
stack
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
12E2000
|
unkown
|
page execute and write copy
|
||
412E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
4751000
|
heap
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
102A000
|
unkown
|
page execute and read and write
|
||
12E1000
|
unkown
|
page execute and read and write
|
||
1D31E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
1CD8E000
|
stack
|
page read and write
|
||
D4B000
|
stack
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
1D07D000
|
stack
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
12A3000
|
unkown
|
page execute and read and write
|
||
D8E000
|
stack
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
4BD0000
|
direct allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
1CDFE000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
585000
|
stack
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4D0F000
|
stack
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
12CA000
|
unkown
|
page execute and read and write
|
||
EC2000
|
unkown
|
page execute and read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
E9D000
|
unkown
|
page execute and read and write
|
||
6D5000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
5E0000
|
heap
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
2C2F000
|
stack
|
page read and write
|
||
1CB4E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
896000
|
heap
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
1CEFF000
|
stack
|
page read and write
|
||
4762000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
DE0000
|
unkown
|
page readonly
|
||
4751000
|
heap
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
1CB0F000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
1CC8E000
|
stack
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
1480000
|
unkown
|
page execute and read and write
|
||
E91000
|
unkown
|
page execute and read and write
|
||
44AF000
|
stack
|
page read and write
|
||
1CF3D000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4850000
|
trusted library allocation
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
4BD0000
|
direct allocation
|
page read and write
|
||
3D6D000
|
stack
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
1D03E000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
103E000
|
unkown
|
page execute and read and write
|
||
1481000
|
unkown
|
page execute and write copy
|
||
4751000
|
heap
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
1D320000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
There are 200 hidden memdumps, click here to show them.