Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/o
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpB
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpp
|
unknown
|
||
http://185.215.113.37/(
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpC
|
unknown
|
||
http://185.215.113.37n0B
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php7
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5300000
|
direct allocation
|
page read and write
|
||
159E000
|
heap
|
page read and write
|
||
931000
|
unkown
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
1D38F000
|
stack
|
page read and write
|
||
4D6E000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
15DF000
|
heap
|
page read and write
|
||
15F8000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
DFA000
|
unkown
|
page execute and read and write
|
||
1365000
|
stack
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
D1B000
|
unkown
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
5300000
|
direct allocation
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
126C000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
E1E000
|
unkown
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
548E000
|
stack
|
page read and write
|
||
1D24F000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
A12000
|
unkown
|
page execute and read and write
|
||
1D77D000
|
stack
|
page read and write
|
||
B8E000
|
unkown
|
page execute and read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
346E000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
1D4CF000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
E34000
|
unkown
|
page execute and write copy
|
||
332F000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
930000
|
unkown
|
page read and write
|
||
4E6F000
|
stack
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
1D3CE000
|
stack
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3227000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
322B000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
1D62F000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
E34000
|
unkown
|
page execute and read and write
|
||
E35000
|
unkown
|
page execute and write copy
|
||
4E71000
|
heap
|
page read and write
|
||
1D28E000
|
stack
|
page read and write
|
||
B7A000
|
unkown
|
page execute and read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
FD8000
|
unkown
|
page execute and read and write
|
||
FD9000
|
unkown
|
page execute and write copy
|
||
4E71000
|
heap
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
543F000
|
stack
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
4D2F000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
E25000
|
unkown
|
page execute and read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
136E000
|
stack
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
533B000
|
stack
|
page read and write
|
||
1598000
|
heap
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
9ED000
|
unkown
|
page execute and read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
930000
|
unkown
|
page readonly
|
||
4E71000
|
heap
|
page read and write
|
||
1D52E000
|
stack
|
page read and write
|
||
1D67E000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
1D7BE000
|
stack
|
page read and write
|
||
4E90000
|
heap
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
931000
|
unkown
|
page execute and write copy
|
||
4E71000
|
heap
|
page read and write
|
||
4E83000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5300000
|
direct allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
1615000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
9E1000
|
unkown
|
page execute and read and write
|
||
188F000
|
stack
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
496F000
|
stack
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
31AC000
|
stack
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
158E000
|
stack
|
page read and write
|
||
1D8BC000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
There are 192 hidden memdumps, click here to show them.