Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php
|
185.215.113.206
|
||
http://185.215.113.206/e2b1563c6670f193.php/
|
unknown
|
||
http://185.215.113.206kz.P6
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php9
|
unknown
|
||
http://185.215.113.206/m
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php%
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.phpE
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.phpa
|
unknown
|
||
http://185.215.113.206/t
|
unknown
|
There are 2 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
15EE000
|
heap
|
page read and write
|
||
53F0000
|
direct allocation
|
page read and write
|
||
A41000
|
unkown
|
page execute and read and write
|
||
4F71000
|
heap
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
4BAF000
|
stack
|
page read and write
|
||
B22000
|
unkown
|
page execute and read and write
|
||
10D1000
|
unkown
|
page execute and read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
116C000
|
stack
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
1D49F000
|
stack
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
1584000
|
heap
|
page read and write
|
||
C8A000
|
unkown
|
page execute and read and write
|
||
1580000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
C9E000
|
unkown
|
page execute and read and write
|
||
1584000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
4A6F000
|
stack
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
4F6F000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
F38000
|
unkown
|
page execute and write copy
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
53D0000
|
heap
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
1D25E000
|
stack
|
page read and write
|
||
31AB000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
542E000
|
stack
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
F21000
|
unkown
|
page execute and read and write
|
||
14F5000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
5550000
|
direct allocation
|
page execute and read and write
|
||
1D35F000
|
stack
|
page read and write
|
||
47EF000
|
stack
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
4E2F000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
4D2E000
|
stack
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
1662000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
552F000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
F29000
|
unkown
|
page execute and read and write
|
||
1584000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
1D4DE000
|
stack
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
1D5DF000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
F37000
|
unkown
|
page execute and read and write
|
||
4F71000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
3F2F000
|
stack
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
1631000
|
heap
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
1D8AD000
|
stack
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
38EF000
|
stack
|
page read and write
|
||
A40000
|
unkown
|
page readonly
|
||
4F71000
|
heap
|
page read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
AFD000
|
unkown
|
page execute and read and write
|
||
4F71000
|
heap
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
15EA000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
1D86C000
|
stack
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
AF1000
|
unkown
|
page execute and read and write
|
||
4F71000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
18AE000
|
stack
|
page read and write
|
||
496E000
|
stack
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
1D39E000
|
stack
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
1647000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
1D76D000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
157E000
|
stack
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
1D71F000
|
stack
|
page read and write
|
||
1D9AE000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
4F71000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
41AF000
|
stack
|
page read and write
|
||
A41000
|
unkown
|
page execute and write copy
|
||
1584000
|
heap
|
page read and write
|
||
19AE000
|
stack
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
F37000
|
unkown
|
page execute and write copy
|
||
15C0000
|
direct allocation
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
EFD000
|
unkown
|
page execute and read and write
|
||
1584000
|
heap
|
page read and write
|
||
5530000
|
direct allocation
|
page execute and read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
5580000
|
direct allocation
|
page execute and read and write
|
||
1584000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
10D2000
|
unkown
|
page execute and write copy
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
E23000
|
unkown
|
page execute and read and write
|
||
A40000
|
unkown
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
492F000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
32EB000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F80000
|
heap
|
page read and write
|
||
4CEF000
|
stack
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
31A7000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
1D61E000
|
stack
|
page read and write
|
||
482E000
|
stack
|
page read and write
|
||
4F71000
|
heap
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
5570000
|
direct allocation
|
page execute and read and write
|
There are 217 hidden memdumps, click here to show them.