Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpl
|
unknown
|
||
http://185.215.113.37//
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php;
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/(
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.php#
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpC
|
unknown
|
||
http://185.215.113.37R
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpg
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5060000
|
direct allocation
|
page read and write
|
||
BC1000
|
unkown
|
page execute and read and write
|
||
13AE000
|
heap
|
page read and write
|
||
1D3DE000
|
stack
|
page read and write
|
||
BC0000
|
unkown
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
F97000
|
unkown
|
page execute and read and write
|
||
134E000
|
stack
|
page read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
106B000
|
unkown
|
page execute and read and write
|
||
447E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
1D4DE000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
4ABE000
|
stack
|
page read and write
|
||
169F000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
141A000
|
heap
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
1235000
|
unkown
|
page execute and write copy
|
||
4BE1000
|
heap
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
5060000
|
direct allocation
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
1D0EF000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
109A000
|
unkown
|
page execute and read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
5060000
|
direct allocation
|
page read and write
|
||
C71000
|
unkown
|
page execute and read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
E0A000
|
unkown
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4C00000
|
heap
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
1D22E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
493F000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
138C000
|
stack
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
1D12D000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
AF5000
|
stack
|
page read and write
|
||
10A7000
|
unkown
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
B8B000
|
heap
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
1D38F000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
1CFEE000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
CA2000
|
unkown
|
page execute and read and write
|
||
1090000
|
unkown
|
page execute and read and write
|
||
1D61C000
|
stack
|
page read and write
|
||
74C000
|
stack
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
10A8000
|
unkown
|
page execute and write copy
|
||
3F7E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
1D51E000
|
stack
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
10A7000
|
unkown
|
page execute and write copy
|
||
B7E000
|
stack
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BF5000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
1234000
|
unkown
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
E1E000
|
unkown
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
519F000
|
stack
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
C7D000
|
unkown
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
1407000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
BC1000
|
unkown
|
page execute and write copy
|
||
BB0000
|
direct allocation
|
page read and write
|
||
13F1000
|
heap
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
37FE000
|
stack
|
page read and write
|
||
1CFAF000
|
stack
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
5200000
|
direct allocation
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
B87000
|
heap
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
1D28E000
|
stack
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
13A8000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
There are 193 hidden memdumps, click here to show them.