Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.phpaoNw
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/L
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpktop
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/ug
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpyo&w
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpmoZw
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/Pg
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
F0E000
|
heap
|
page read and write
|
||
3A1000
|
unkown
|
page execute and read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
5D8000
|
unkown
|
page execute and read and write
|
||
893000
|
unkown
|
page execute and read and write
|
||
4F20000
|
direct allocation
|
page execute and read and write
|
||
4900000
|
direct allocation
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
4900000
|
direct allocation
|
page read and write
|
||
1CCFF000
|
stack
|
page read and write
|
||
311F000
|
stack
|
page read and write
|
||
4900000
|
direct allocation
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
455E000
|
stack
|
page read and write
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
415F000
|
stack
|
page read and write
|
||
BF5000
|
stack
|
page read and write
|
||
375F000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
3B5E000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
3A0000
|
unkown
|
page read and write
|
||
4900000
|
direct allocation
|
page read and write
|
||
5EA000
|
unkown
|
page write copy
|
||
893000
|
unkown
|
page execute and write copy
|
||
4911000
|
heap
|
page read and write
|
||
42E000
|
unkown
|
page execute and read and write
|
||
4911000
|
heap
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
2EDE000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
3A1000
|
unkown
|
page execute and write copy
|
||
465F000
|
stack
|
page read and write
|
||
436000
|
unkown
|
page execute and read and write
|
||
4911000
|
heap
|
page read and write
|
||
39DF000
|
stack
|
page read and write
|
||
4900000
|
direct allocation
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
365E000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4900000
|
direct allocation
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4900000
|
direct allocation
|
page read and write
|
||
34DF000
|
stack
|
page read and write
|
||
4EEF000
|
stack
|
page read and write
|
||
389F000
|
stack
|
page read and write
|
||
4F40000
|
direct allocation
|
page execute and read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
894000
|
unkown
|
page execute and write copy
|
||
4F60000
|
direct allocation
|
page execute and read and write
|
||
4900000
|
direct allocation
|
page read and write
|
||
2FDF000
|
stack
|
page read and write
|
||
3D7000
|
unkown
|
page execute and read and write
|
||
2C5B000
|
stack
|
page read and write
|
||
38DE000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
3F1D000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
1CF7E000
|
stack
|
page read and write
|
||
4900000
|
direct allocation
|
page read and write
|
||
379E000
|
stack
|
page read and write
|
||
87B000
|
unkown
|
page execute and read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4910000
|
heap
|
page read and write
|
||
1D26D000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
301E000
|
stack
|
page read and write
|
||
1D0EF000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
48DF000
|
stack
|
page read and write
|
||
44F000
|
unkown
|
page execute and read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4F30000
|
direct allocation
|
page execute and read and write
|
||
3EDF000
|
stack
|
page read and write
|
||
1CD3E000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
1D36E000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4900000
|
direct allocation
|
page read and write
|
||
A31000
|
unkown
|
page execute and read and write
|
||
AFC000
|
stack
|
page read and write
|
||
43DF000
|
stack
|
page read and write
|
||
4F30000
|
direct allocation
|
page execute and read and write
|
||
4911000
|
heap
|
page read and write
|
||
4900000
|
direct allocation
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
853000
|
unkown
|
page execute and read and write
|
||
4911000
|
heap
|
page read and write
|
||
4930000
|
heap
|
page read and write
|
||
1CE7E000
|
stack
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
774000
|
unkown
|
page execute and read and write
|
||
4911000
|
heap
|
page read and write
|
||
401F000
|
stack
|
page read and write
|
||
F53000
|
heap
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
3B1F000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
1D12D000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4DEC000
|
stack
|
page read and write
|
||
405E000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
3C5F000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
3C9E000
|
stack
|
page read and write
|
||
4900000
|
direct allocation
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
48E0000
|
heap
|
page read and write
|
||
5EC000
|
unkown
|
page execute and read and write
|
||
325F000
|
stack
|
page read and write
|
||
5EA000
|
unkown
|
page read and write
|
||
F6A000
|
heap
|
page read and write
|
||
469E000
|
stack
|
page read and write
|
||
884000
|
unkown
|
page execute and read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
361F000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
3A1E000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
2C1F000
|
stack
|
page read and write
|
||
441E000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
339F000
|
stack
|
page read and write
|
||
3DDE000
|
stack
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
479F000
|
stack
|
page read and write
|
||
1D22D000
|
stack
|
page read and write
|
||
2B17000
|
heap
|
page read and write
|
||
419E000
|
stack
|
page read and write
|
||
42DE000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
E85000
|
heap
|
page read and write
|
||
F85000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
120D000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
315E000
|
stack
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
2B1B000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4900000
|
direct allocation
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4900000
|
direct allocation
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
1CFEE000
|
stack
|
page read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
4911000
|
heap
|
page read and write
|
||
429F000
|
stack
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
3D9F000
|
stack
|
page read and write
|
||
F4F000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
4F50000
|
direct allocation
|
page execute and read and write
|
||
1CE3F000
|
stack
|
page read and write
|
||
4DD6000
|
direct allocation
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
451F000
|
stack
|
page read and write
|
There are 198 hidden memdumps, click here to show them.