Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.php2
|
unknown
|
||
http://185.215.113.37/t
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php/
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php_
|
unknown
|
||
http://185.215.113.37/(
|
unknown
|
||
http://185.215.113.37e
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpS
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
DC1000
|
unkown
|
page execute and read and write
|
||
160E000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
379E000
|
stack
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
12B5000
|
unkown
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
15F0000
|
direct allocation
|
page read and write
|
||
D2B000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
3C5F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
361F000
|
stack
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
1D21E000
|
stack
|
page read and write
|
||
38DE000
|
stack
|
page read and write
|
||
7CF000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
419E000
|
stack
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
D1E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
C8F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1CF9E000
|
stack
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
3EDF000
|
stack
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1D31F000
|
stack
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
6CC000
|
stack
|
page read and write
|
||
15F0000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
4B60000
|
heap
|
page read and write
|
||
EA2000
|
unkown
|
page execute and read and write
|
||
491E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
469E000
|
stack
|
page read and write
|
||
E7D000
|
unkown
|
page execute and read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
465F000
|
stack
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
1CE5E000
|
stack
|
page read and write
|
||
375F000
|
stack
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
511F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
1D4AE000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
D27000
|
heap
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
144D000
|
unkown
|
page execute and write copy
|
||
4B61000
|
heap
|
page read and write
|
||
405E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
415F000
|
stack
|
page read and write
|
||
3B1F000
|
stack
|
page read and write
|
||
1D0DE000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
7C5000
|
stack
|
page read and write
|
||
129F000
|
unkown
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
441E000
|
stack
|
page read and write
|
||
1D46D000
|
stack
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
1CF5F000
|
stack
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
3DDE000
|
stack
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
144C000
|
unkown
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
127B000
|
unkown
|
page execute and read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
1D36D000
|
stack
|
page read and write
|
||
3C9E000
|
stack
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
42DE000
|
stack
|
page read and write
|
||
4B5F000
|
stack
|
page read and write
|
||
12B6000
|
unkown
|
page execute and write copy
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
100A000
|
unkown
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
389F000
|
stack
|
page read and write
|
||
101E000
|
unkown
|
page execute and read and write
|
||
A20000
|
heap
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1608000
|
heap
|
page read and write
|
||
43DF000
|
stack
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
D20000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
365E000
|
stack
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
339F000
|
stack
|
page read and write
|
||
4A1F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
E71000
|
unkown
|
page execute and read and write
|
||
329F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
158E000
|
stack
|
page read and write
|
||
1D09F000
|
stack
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
1678000
|
heap
|
page read and write
|
||
479F000
|
stack
|
page read and write
|
||
DC0000
|
unkown
|
page read and write
|
||
39DF000
|
stack
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
DC1000
|
unkown
|
page execute and write copy
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
401F000
|
stack
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
455E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
1686000
|
heap
|
page read and write
|
||
12B5000
|
unkown
|
page execute and write copy
|
||
4B61000
|
heap
|
page read and write
|
||
34DF000
|
stack
|
page read and write
|
||
3B5E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1D5AC000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
3A1E000
|
stack
|
page read and write
|
||
4B64000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
3F1E000
|
stack
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
451F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
1659000
|
heap
|
page read and write
|
||
48DF000
|
stack
|
page read and write
|
||
1D1DE000
|
stack
|
page read and write
|
||
3D9F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
11A1000
|
unkown
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
15CE000
|
stack
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
1667000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
12A6000
|
unkown
|
page execute and read and write
|
||
CCE000
|
stack
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
B44000
|
heap
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
D6C000
|
stack
|
page read and write
|
||
1699000
|
heap
|
page read and write
|
There are 222 hidden memdumps, click here to show them.