Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.phpn
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.php9U
|
unknown
|
||
http://185.215.113.37O
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/.9
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/ws
|
unknown
|
||
http://185.215.113.37/G
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php%U
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpG
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.37
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4C20000
|
direct allocation
|
page read and write
|
||
381000
|
unkown
|
page execute and read and write
|
||
E1E000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
311F000
|
stack
|
page read and write
|
||
F30000
|
direct allocation
|
page read and write
|
||
43D000
|
unkown
|
page execute and read and write
|
||
2A80000
|
direct allocation
|
page read and write
|
||
47A0000
|
heap
|
page read and write
|
||
2EDE000
|
stack
|
page read and write
|
||
375F000
|
stack
|
page read and write
|
||
885000
|
unkown
|
page execute and read and write
|
||
47A1000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
441E000
|
stack
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
38DE000
|
stack
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
419E000
|
stack
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
1CB4F000
|
stack
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
3C5F000
|
stack
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
B25000
|
stack
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
47A1000
|
heap
|
page read and write
|
||
401F000
|
stack
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
462000
|
unkown
|
page execute and read and write
|
||
47A1000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
1CDCF000
|
stack
|
page read and write
|
||
1D1BE000
|
stack
|
page read and write
|
||
F30000
|
direct allocation
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
86E000
|
unkown
|
page execute and read and write
|
||
47A1000
|
heap
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
5DE000
|
unkown
|
page execute and read and write
|
||
47A1000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
3D9F000
|
stack
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
F30000
|
direct allocation
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
47A1000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
1D0BD000
|
stack
|
page read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
F10000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
886000
|
unkown
|
page execute and write copy
|
||
47A1000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page execute and read and write
|
||
47A1000
|
heap
|
page read and write
|
||
4D5F000
|
stack
|
page read and write
|
||
2A80000
|
direct allocation
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
47C0000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
339F000
|
stack
|
page read and write
|