Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpLMEM
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpO
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/rn
|
unknown
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpS
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpkn
|
unknown
|
||
http://185.215.113.372
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpg
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4BB0000
|
direct allocation
|
page read and write
|
||
EEE000
|
heap
|
page read and write
|
||
121000
|
unkown
|
page execute and read and write
|
||
DE4000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
120000
|
unkown
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
1D1EE000
|
stack
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
202000
|
unkown
|
page execute and read and write
|
||
DE4000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
EC0000
|
direct allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
1CB3E000
|
stack
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
4750000
|
heap
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
1D04D000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
629000
|
unkown
|
page execute and write copy
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
F4A000
|
heap
|
page read and write
|
||
1CDCE000
|
stack
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
4730000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
37E000
|
unkown
|
page execute and read and write
|
||
396F000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
1D2EE000
|
stack
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
62A000
|
unkown
|
page execute and write copy
|
||
2AA0000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
EC0000
|
direct allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
1CF0D000
|
stack
|
page read and write
|
||
1CC7E000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
DE4000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
1D2F0000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
4CEF000
|
stack
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
462E000
|
stack
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
D9D000
|
stack
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
4740000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
1DD000
|
unkown
|
page execute and read and write
|
||
2A90000
|
direct allocation
|
page execute and read and write
|
||
1C9FE000
|
stack
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
F68000
|
heap
|
page read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
2A80000
|
direct allocation
|
page execute and read and write
|
||
7D1000
|
unkown
|
page execute and write copy
|
||
3FEE000
|
stack
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
1D14D000
|
stack
|
page read and write
|
||
4734000
|
heap
|
page read and write
|
||
F74000
|
heap
|
page read and write
|
||
2AA7000
|
heap
|
page read and write
|
||
F2E000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
121000
|
unkown
|
page execute and write copy
|
||
61A000
|
unkown
|
page execute and read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
DE4000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
7D0000
|
unkown
|
page execute and read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
1CECF000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
1D00E000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
613000
|
unkown
|
page execute and read and write
|
||
F33000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
1CAFF000
|
stack
|
page read and write
|
||
E2E000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
ED0000
|
direct allocation
|
page execute and read and write
|
||
4731000
|
heap
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
1CD7F000
|
stack
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
36A000
|
unkown
|
page execute and read and write
|
||
4731000
|
heap
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
1D1000
|
unkown
|
page execute and read and write
|
||
507000
|
unkown
|
page execute and read and write
|
||
9F5000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
1CC3F000
|
stack
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5EB000
|
unkown
|
page execute and read and write
|
||
4731000
|
heap
|
page read and write
|
||
629000
|
unkown
|
page execute and read and write
|
||
4731000
|
heap
|
page read and write
|
||
EAB000
|
stack
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
EEA000
|
heap
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
There are 227 hidden memdumps, click here to show them.