Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpL
|
unknown
|
||
http://185.215.113.37o
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpRx
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpP
|
unknown
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/Lxcq
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php8
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpx
|
unknown
|
||
http://185.215.113.37/6122658-3693405117-2476756634-1002e
|
unknown
|
||
http://185.215.113.37/UxZq
|
unknown
|
||
http://185.215.113.37/cx
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.php$
|
unknown
|
There are 5 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
146E000
|
heap
|
page read and write
|
||
51A0000
|
direct allocation
|
page read and write
|
||
681000
|
unkown
|
page execute and read and write
|
||
680000
|
unkown
|
page read and write
|
||
B5E000
|
unkown
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
175E000
|
stack
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1D53D000
|
stack
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
B65000
|
unkown
|
page execute and read and write
|
||
14C8000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
3F9E000
|
stack
|
page read and write
|
||
51DE000
|
stack
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
481F000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
8CA000
|
unkown
|
page execute and read and write
|
||
381E000
|
stack
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
12F5000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
B74000
|
unkown
|
page execute and read and write
|
||
445F000
|
stack
|
page read and write
|
||
37DE000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
D09000
|
unkown
|
page execute and read and write
|
||
1424000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
731000
|
unkown
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
681000
|
unkown
|
page execute and write copy
|
||
4D1F000
|
stack
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
459F000
|
stack
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1D16E000
|
stack
|
page read and write
|
||
5320000
|
direct allocation
|
page execute and read and write
|
||
5300000
|
direct allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1D63D000
|
stack
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
14EB000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
8DE000
|
unkown
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
1D26F000
|
stack
|
page read and write
|
||
762000
|
unkown
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
F2C000
|
stack
|
page read and write
|
||
40DE000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
52F0000
|
direct allocation
|
page execute and read and write
|
||
41DF000
|
stack
|
page read and write
|
||
3E1F000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
3BDE000
|
stack
|
page read and write
|
||
409F000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5320000
|
direct allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
73D000
|
unkown
|
page execute and read and write
|
||
1424000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
5180000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
2F57000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
B74000
|
unkown
|
page execute and write copy
|
||
1424000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
B37000
|
unkown
|
page execute and read and write
|
||
3CDF000
|
stack
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D28000
|
heap
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
||
319F000
|
stack
|
page read and write
|
||
1D12F000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
51A0000
|
direct allocation
|
page read and write
|
||
5350000
|
direct allocation
|
page execute and read and write
|
||
1424000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
D0A000
|
unkown
|
page execute and write copy
|
||
1D77E000
|
stack
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
3A5F000
|
stack
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
B75000
|
unkown
|
page execute and write copy
|
||
2F5B000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
495F000
|
stack
|
page read and write
|
||
1468000
|
heap
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
1D2AE000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
4D30000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1D3AE000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
14E2000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
46DF000
|
stack
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
A5E000
|
unkown
|
page execute and read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
309B000
|
stack
|
page read and write
|
||
1D67E000
|
stack
|
page read and write
|
||
1D3EE000
|
stack
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
165E000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
1D4EF000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
3F5F000
|
stack
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
52DF000
|
stack
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
51A0000
|
direct allocation
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
4D40000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
1D02E000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
There are 220 hidden memdumps, click here to show them.