Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.php/=
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206/ctionSettingsLMEM80
|
unknown
|
||
http://185.215.113.206/n
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php.j
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpM
|
unknown
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/tVersion
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/3
|
unknown
|
||
185.215.113.206/c4becf79229cb002.php
|
|||
http://185.215.113.206/c4becf79229cb002.php/r
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4DF0000
|
direct allocation
|
page read and write
|
||
F9E000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
4971000
|
heap
|
page read and write
|
||
1D00E000
|
stack
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
1CC3E000
|
stack
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
2BBB000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
1013000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page execute and read and write
|
||
45EE000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
1CFBF000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
4E26000
|
direct allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
1CEBE000
|
stack
|
page read and write
|
||
1CE7E000
|
stack
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
1D530000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
8E1000
|
unkown
|
page execute and read and write
|
||
10C4000
|
heap
|
page read and write
|
||
8EF000
|
unkown
|
page execute and write copy
|
||
4971000
|
heap
|
page read and write
|
||
2C10000
|
direct allocation
|
page execute and read and write
|
||
4971000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
4F30000
|
direct allocation
|
page execute and read and write
|
||
4970000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
FD7000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
10C4000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
1CD3F000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4F40000
|
direct allocation
|
page execute and read and write
|
||
101C000
|
heap
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
2C2B000
|
heap
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4972000
|
heap
|
page read and write
|
||
129F000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
1CD7E000
|
stack
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4F50000
|
direct allocation
|
page execute and read and write
|
||
4971000
|
heap
|
page read and write
|
||
8B1000
|
unkown
|
page execute and read and write
|
||
4F30000
|
direct allocation
|
page execute and read and write
|
||
10C0000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
2C27000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
64A000
|
unkown
|
page write copy
|
||
A8B000
|
unkown
|
page execute and read and write
|
||
4971000
|
heap
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
1D14D000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
4A70000
|
trusted library allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
10B0000
|
direct allocation
|
page execute and read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
64C000
|
unkown
|
page execute and read and write
|
||
A8C000
|
unkown
|
page execute and write copy
|
||
8D9000
|
unkown
|
page execute and read and write
|
||
4F60000
|
direct allocation
|
page execute and read and write
|
||
4971000
|
heap
|
page read and write
|
||
48E000
|
unkown
|
page execute and read and write
|
||
45AF000
|
stack
|
page read and write
|
||
4F2F000
|
stack
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
8F0000
|
unkown
|
page execute and write copy
|
||
F70000
|
direct allocation
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page execute and read and write
|
||
401000
|
unkown
|
page execute and write copy
|
||
B1C000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
1D24E000
|
stack
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
1D38C000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
638000
|
unkown
|
page execute and read and write
|
||
10C4000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
EF5000
|
stack
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
4AF000
|
unkown
|
page execute and read and write
|
||
4971000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
1D28D000
|
stack
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
64A000
|
unkown
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
4E2E000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
496F000
|
stack
|
page read and write
|
||
1D10F000
|
stack
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
8EF000
|
unkown
|
page execute and read and write
|
||
4971000
|
heap
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
4990000
|
heap
|
page read and write
|
||
1D42E000
|
stack
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
1D52F000
|
stack
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
496000
|
unkown
|
page execute and read and write
|
||
10C4000
|
heap
|
page read and write
|
||
EFD000
|
stack
|
page read and write
|
||
7D7000
|
unkown
|
page execute and read and write
|
||
B90000
|
heap
|
page read and write
|
||
FE3000
|
heap
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
There are 230 hidden memdumps, click here to show them.