Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/ctionSettingsa
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php/
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php&
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/f
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpS
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpi
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpG
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpw
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5F1000
|
unkown
|
page execute and read and write
|
||
4FB0000
|
direct allocation
|
page read and write
|
||
13EE000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
ABE000
|
unkown
|
page execute and read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4FB0000
|
direct allocation
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
6A1000
|
unkown
|
page execute and read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
84E000
|
unkown
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1463000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
1D2EF000
|
stack
|
page read and write
|
||
5F1000
|
unkown
|
page execute and write copy
|
||
1433000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
AFB000
|
unkown
|
page execute and write copy
|
||
1254000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
50EF000
|
stack
|
page read and write
|
||
CA3000
|
unkown
|
page execute and write copy
|
||
2F40000
|
direct allocation
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
141B000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
2F57000
|
heap
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
1D33D000
|
stack
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1D0AE000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
9DB000
|
unkown
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
10F5000
|
stack
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
CA2000
|
unkown
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1D06F000
|
stack
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
AED000
|
unkown
|
page execute and read and write
|
||
1254000
|
heap
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
15DF000
|
stack
|
page read and write
|
||
1D43D000
|
stack
|
page read and write
|
||
D3C000
|
stack
|
page read and write
|
||
135F000
|
stack
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
4FB0000
|
direct allocation
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1D1AF000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
1CF2F000
|
stack
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
AFC000
|
unkown
|
page execute and write copy
|
||
489F000
|
stack
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
1D57C000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
13DB000
|
stack
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
AE4000
|
unkown
|
page execute and read and write
|
||
1446000
|
heap
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
1D720000
|
heap
|
page read and write
|
||
1CF6E000
|
stack
|
page read and write
|
||
AFB000
|
unkown
|
page execute and read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
1D61E000
|
stack
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
1D1EE000
|
stack
|
page read and write
|
||
325F000
|
stack
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
13EA000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
10FE000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1D71E000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
6AD000
|
unkown
|
page execute and read and write
|
||
1D47E000
|
stack
|
page read and write
|
||
6D2000
|
unkown
|
page execute and read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
146D000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1CE2E000
|
stack
|
page read and write
|
||
83A000
|
unkown
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
There are 220 hidden memdumps, click here to show them.