Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php
|
185.215.113.206
|
||
http://185.215.113.206/3
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php-
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php/D
|
unknown
|
||
http://185.215.113.206/M
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.phpl
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php4
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.phpT
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.phpt
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
BB8000
|
heap
|
page read and write
|
||
4FA0000
|
direct allocation
|
page read and write
|
||
E91000
|
unkown
|
page execute and read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1D19F000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4AFF000
|
stack
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
1D46D000
|
stack
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
35BF000
|
stack
|
page read and write
|
||
1D05F000
|
stack
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
1D32D000
|
stack
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
1CF5E000
|
stack
|
page read and write
|
||
487F000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
50DF000
|
stack
|
page read and write
|
||
F41000
|
unkown
|
page execute and read and write
|
||
1388000
|
unkown
|
page execute and write copy
|
||
427E000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
BF8000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
4FDE000
|
stack
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1D56C000
|
stack
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
48BE000
|
stack
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
F4D000
|
unkown
|
page execute and read and write
|
||
2E77000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
1D42E000
|
stack
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
E90000
|
unkown
|
page read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
4B10000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
1378000
|
unkown
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
126F000
|
unkown
|
page execute and read and write
|
||
9E0000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
10EE000
|
unkown
|
page execute and read and write
|
||
4F80000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
985000
|
stack
|
page read and write
|
||
4B18000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
4FA0000
|
direct allocation
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
1387000
|
unkown
|
page execute and write copy
|
||
B4E000
|
stack
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
88C000
|
stack
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
1D09E000
|
stack
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1D1EE000
|
stack
|
page read and write
|
||
1CF1F000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
C15000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
2E1F000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
1520000
|
unkown
|
page execute and read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
E90000
|
unkown
|
page readonly
|
||
1521000
|
unkown
|
page execute and write copy
|
||
AC0000
|
heap
|
page read and write
|
||
F72000
|
unkown
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
134A000
|
unkown
|
page execute and read and write
|
||
45FF000
|
stack
|
page read and write
|
||
BB3000
|
heap
|
page read and write
|
||
10DA000
|
unkown
|
page execute and read and write
|
||
40FF000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
1387000
|
unkown
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
49BF000
|
stack
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
98F000
|
stack
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
1371000
|
unkown
|
page execute and read and write
|
||
30FE000
|
stack
|
page read and write
|
||
473F000
|
stack
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
B04000
|
heap
|
page read and write
|
||
4FA0000
|
direct allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
2E5B000
|
stack
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1CE1E000
|
stack
|
page read and write
|
||
1D2EF000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
E91000
|
unkown
|
page execute and write copy
|
||
4B11000
|
heap
|
page read and write
|
There are 222 hidden memdumps, click here to show them.