Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.php1
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpQ
|
unknown
|
||
http://185.215.113.37Tz
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/H
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpe
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpc
|
unknown
|
||
http://185.215.113.37/t1
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpy
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php8
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
FE1000
|
unkown
|
page execute and read and write
|
||
17EE000
|
heap
|
page read and write
|
||
5340000
|
direct allocation
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
1831000
|
heap
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
1D40F000
|
stack
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
1D54F000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
FE1000
|
unkown
|
page execute and write copy
|
||
387E000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4C3F000
|
stack
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
1DAC0000
|
heap
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
17CF000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
D35000
|
stack
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
10C2000
|
unkown
|
page execute and read and write
|
||
D3F000
|
stack
|
page read and write
|
||
4D7F000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
1D6DE000
|
stack
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
45FE000
|
stack
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
487F000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
427E000
|
stack
|
page read and write
|
||
14CE000
|
unkown
|
page execute and read and write
|
||
D84000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
1091000
|
unkown
|
page execute and read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
14A1000
|
unkown
|
page execute and read and write
|
||
413E000
|
stack
|
page read and write
|
||
49BF000
|
stack
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
4EBF000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
14DD000
|
unkown
|
page execute and read and write
|
||
30BE000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
1D2CF000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
167A000
|
unkown
|
page execute and read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
1DABE000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
1DAC2000
|
heap
|
page read and write
|
||
1847000
|
heap
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
48BE000
|
stack
|
page read and write
|
||
167B000
|
unkown
|
page execute and write copy
|
||
1D81E000
|
stack
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
FE0000
|
unkown
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
1862000
|
heap
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
17E0000
|
heap
|
page read and write
|
||
4EC8000
|
heap
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
1D30E000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
31FC000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
4AFF000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
123E000
|
unkown
|
page execute and read and write
|
||
49FE000
|
stack
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
1D91C000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
537E000
|
stack
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
5320000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
1D44E000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
122A000
|
unkown
|
page execute and read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
13CE000
|
unkown
|
page execute and read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
327B000
|
heap
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
1D68F000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
109D000
|
unkown
|
page execute and read and write
|
||
1D7DD000
|
stack
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
14DE000
|
unkown
|
page execute and write copy
|
||
4EC1000
|
heap
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
17EA000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
5340000
|
direct allocation
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
5340000
|
direct allocation
|
page read and write
|
||
FDF000
|
stack
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
1D9BE000
|
stack
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
1D1CE000
|
stack
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
14DD000
|
unkown
|
page execute and write copy
|
||
4EE0000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
3277000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
FE0000
|
unkown
|
page readonly
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
14C7000
|
unkown
|
page execute and read and write
|
||
1D58E000
|
stack
|
page read and write
|
||
547F000
|
stack
|
page read and write
|
||
473F000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
There are 222 hidden memdumps, click here to show them.