Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/BiQ
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/C84BCA9C91821060E9A79u
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpF
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phphi
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/&
|
unknown
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpJ
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpConnectionSettings
|
unknown
|
||
http://185.215.113.37oZ
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
11DE000
|
heap
|
page read and write
|
||
531000
|
unkown
|
page execute and read and write
|
||
5040000
|
direct allocation
|
page read and write
|
||
1D4CC000
|
stack
|
page read and write
|
||
DBC000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
307E000
|
stack
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
5E1000
|
unkown
|
page execute and read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
1D13E000
|
stack
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
10F5000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
A25000
|
unkown
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
A26000
|
unkown
|
page execute and write copy
|
||
11CE000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
1D3CE000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
5ED000
|
unkown
|
page execute and read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
1D50D000
|
stack
|
page read and write
|
||
1224000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
2DF7000
|
heap
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
2DE0000
|
direct allocation
|
page read and write
|
||
1D60E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
493F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
78E000
|
unkown
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
447E000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
A0E000
|
unkown
|
page execute and read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
BBA000
|
unkown
|
page execute and read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
BBB000
|
unkown
|
page execute and write copy
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
531000
|
unkown
|
page execute and write copy
|
||
3F7E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
530000
|
unkown
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
1CFFE000
|
stack
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
149F000
|
stack
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
914000
|
unkown
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
1D37F000
|
stack
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
9EB000
|
unkown
|
page execute and read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
1CFBF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
612000
|
unkown
|
page execute and read and write
|
||
41BF000
|
stack
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
A17000
|
unkown
|
page execute and read and write
|
||
A25000
|
unkown
|
page execute and write copy
|
||
4BC1000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
1236000
|
heap
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
2DFB000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
1D23F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
1D27E000
|
stack
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
41FD000
|
stack
|
page read and write
|
||
15DF000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
1D0FF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
517F000
|
stack
|
page read and write
|
||
2DE0000
|
direct allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
77A000
|
unkown
|
page execute and read and write
|
||
38FF000
|
stack
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
1CEBE000
|
stack
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
There are 216 hidden memdumps, click here to show them.