Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.php=
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/D
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpr
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/x
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpU
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpe
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/v
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpS
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpX
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5130000
|
direct allocation
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
2E1000
|
unkown
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
2E1000
|
unkown
|
page execute and write copy
|
||
4CA1000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
1352000
|
heap
|
page read and write
|
||
52A000
|
unkown
|
page execute and read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
1382000
|
heap
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
E9C000
|
stack
|
page read and write
|
||
977000
|
unkown
|
page execute and write copy
|
||
4CA1000
|
heap
|
page read and write
|
||
4C7F000
|
stack
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
134D000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
526F000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
976000
|
unkown
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
6CD000
|
unkown
|
page execute and read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
1D49D000
|
stack
|
page read and write
|
||
4B3F000
|
stack
|
page read and write
|
||
50E0000
|
trusted library allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
39D000
|
unkown
|
page execute and read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
7DC000
|
unkown
|
page execute and write copy
|
||
4CA1000
|
heap
|
page read and write
|
||
F95000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
413F000
|
stack
|
page read and write
|
||
4CA2000
|
heap
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
5130000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
2FEC000
|
stack
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
1D6DC000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
7A0000
|
unkown
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
48BF000
|
stack
|
page read and write
|
||
1D34E000
|
stack
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
7CC000
|
unkown
|
page execute and read and write
|
||
1D2EF000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
2FF7000
|
heap
|
page read and write
|
||
2E0000
|
unkown
|
page read and write
|
||
1D1EE000
|
stack
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
4B7E000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
5130000
|
direct allocation
|
page read and write
|
||
49FF000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
2E0000
|
unkown
|
page readonly
|
||
47BE000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
4CB0000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
7C5000
|
unkown
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
516E000
|
stack
|
page read and write
|
||
463F000
|
stack
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
15CE000
|
stack
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
30FF000
|
stack
|
page read and write
|
||
7DB000
|
unkown
|
page execute and read and write
|
||
1D06F000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
2FFB000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
53E000
|
unkown
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
1D59D000
|
stack
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
129D000
|
stack
|
page read and write
|
||
130A000
|
heap
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
1D0AE000
|
stack
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
3C2000
|
unkown
|
page execute and read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
1D1AF000
|
stack
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
39FE000
|
stack
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
1D5DD000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
1D44F000
|
stack
|
page read and write
|
||
391000
|
unkown
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
7DB000
|
unkown
|
page execute and write copy
|
||
43BF000
|
stack
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
There are 192 hidden memdumps, click here to show them.