Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpl
|
unknown
|
||
http://185.215.113.37/?
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37W
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php3
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phps
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpX
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpg
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5100000
|
direct allocation
|
page read and write
|
||
BA1000
|
unkown
|
page execute and read and write
|
||
13EE000
|
heap
|
page read and write
|
||
DFE000
|
unkown
|
page execute and read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
462F000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
1D5BE000
|
stack
|
page read and write
|
||
BA0000
|
unkown
|
page readonly
|
||
4C71000
|
heap
|
page read and write
|
||
1093000
|
unkown
|
page execute and read and write
|
||
34AF000
|
stack
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
1D1CE000
|
stack
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
10A2000
|
unkown
|
page execute and write copy
|
||
1241000
|
unkown
|
page execute and write copy
|
||
4C71000
|
heap
|
page read and write
|
||
13EA000
|
heap
|
page read and write
|
||
49EF000
|
stack
|
page read and write
|
||
1069000
|
unkown
|
page execute and read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
1D04F000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
B90000
|
direct allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
1D43F000
|
stack
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
C5D000
|
unkown
|
page execute and read and write
|
||
44EF000
|
stack
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
B90000
|
direct allocation
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
B90000
|
direct allocation
|
page read and write
|
||
108B000
|
unkown
|
page execute and read and write
|
||
5100000
|
direct allocation
|
page read and write
|
||
15DF000
|
stack
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
1240000
|
unkown
|
page execute and read and write
|
||
35EF000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
5100000
|
direct allocation
|
page read and write
|
||
B90000
|
direct allocation
|
page read and write
|
||
B90000
|
direct allocation
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
523F000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
B90000
|
direct allocation
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
BA0000
|
unkown
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
B90000
|
direct allocation
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
1D6BE000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C90000
|
heap
|
page read and write
|
||
DEA000
|
unkown
|
page execute and read and write
|
||
452E000
|
stack
|
page read and write
|
||
B90000
|
direct allocation
|
page read and write
|
||
B90000
|
direct allocation
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
B90000
|
direct allocation
|
page read and write
|
||
B90000
|
direct allocation
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
1D33E000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
1459000
|
heap
|
page read and write
|
||
1D47D000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
2F6B000
|
heap
|
page read and write
|
||
1D57C000
|
stack
|
page read and write
|
||
B90000
|
direct allocation
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
1D08E000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
4B2F000
|
stack
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
1D2CF000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
1D18F000
|
stack
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
10A1000
|
unkown
|
page execute and read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
10A1000
|
unkown
|
page execute and write copy
|
||
1438000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C6F000
|
stack
|
page read and write
|
||
B90000
|
direct allocation
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
2F60000
|
heap
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
5260000
|
direct allocation
|
page execute and read and write
|
||
2F67000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
7BC000
|
stack
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
13DE000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
16DE000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
144D000
|
heap
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
BA1000
|
unkown
|
page execute and write copy
|
||
4C71000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
2EBB000
|
stack
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
4C71000
|
heap
|
page read and write
|
||
B90000
|
direct allocation
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
146C000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
C82000
|
unkown
|
page execute and read and write
|
||
34EE000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
AF5000
|
stack
|
page read and write
|
||
C51000
|
unkown
|
page execute and read and write
|
||
4C71000
|
heap
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
F8F000
|
unkown
|
page execute and read and write
|
There are 195 hidden memdumps, click here to show them.