Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php
|
185.215.113.206
|
||
http://185.215.113.206/e2b1563c6670f193.php~
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php/
|
unknown
|
||
http://185.215.113.206/lC
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.phpP
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.phpZ
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.phpF
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206/DCBF360B3297E19BA487R
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4AF0000
|
direct allocation
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
911000
|
unkown
|
page execute and read and write
|
||
911000
|
unkown
|
page execute and write copy
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
1CABE000
|
stack
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
910000
|
unkown
|
page readonly
|
||
1CD3E000
|
stack
|
page read and write
|
||
FC3000
|
unkown
|
page execute and write copy
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
DDB000
|
unkown
|
page execute and read and write
|
||
88E000
|
stack
|
page read and write
|
||
8F0000
|
direct allocation
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
1BC000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
8F0000
|
direct allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
4690000
|
heap
|
page read and write
|
||
E03000
|
unkown
|
page execute and read and write
|
||
687000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
9C1000
|
unkown
|
page execute and read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
FC2000
|
unkown
|
page execute and read and write
|
||
29AF000
|
stack
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
8F0000
|
direct allocation
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4770000
|
trusted library allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
8F0000
|
direct allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
8F0000
|
direct allocation
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
1CA7F000
|
stack
|
page read and write
|
||
8F0000
|
direct allocation
|
page read and write
|
||
698000
|
heap
|
page read and write
|
||
1CE3F000
|
stack
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
E1A000
|
unkown
|
page execute and write copy
|
||
2DAE000
|
stack
|
page read and write
|
||
E0A000
|
unkown
|
page execute and read and write
|
||
68B000
|
heap
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
1CCFF000
|
stack
|
page read and write
|
||
4F5000
|
stack
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
8F0000
|
direct allocation
|
page read and write
|
||
E19000
|
unkown
|
page execute and write copy
|
||
8E0000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
29EB000
|
stack
|
page read and write
|
||
B6E000
|
unkown
|
page execute and read and write
|
||
910000
|
unkown
|
page read and write
|
||
8CD000
|
stack
|
page read and write
|
||
CFB000
|
unkown
|
page execute and read and write
|
||
4671000
|
heap
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
8F0000
|
direct allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
8F0000
|
direct allocation
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
1CFCE000
|
stack
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
614000
|
heap
|
page read and write
|
||
9F2000
|
unkown
|
page execute and read and write
|
||
B5A000
|
unkown
|
page execute and read and write
|
||
4C2F000
|
stack
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
6E2000
|
heap
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
712000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4670000
|
heap
|
page read and write
|
||
1CBBF000
|
stack
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
8F0000
|
direct allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
E19000
|
unkown
|
page execute and read and write
|
||
456E000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
4671000
|
heap
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
8F0000
|
direct allocation
|
page read and write
|
||
1CBFE000
|
stack
|
page read and write
|
||
8F0000
|
direct allocation
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
4FE000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
4687000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
1D0CC000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
614000
|
heap
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
6E6000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
1C97E000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
9CD000
|
unkown
|
page execute and read and write
|
||
4671000
|
heap
|
page read and write
|
||
2C2F000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
1CF8D000
|
stack
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
4671000
|
heap
|
page read and write
|
||
8F0000
|
direct allocation
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
1CE8D000
|
stack
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
4671000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
8F0000
|
direct allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
There are 218 hidden memdumps, click here to show them.