Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.php?
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpft
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/;
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpc
|
unknown
|
||
http://185.215.113.206/X
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpw
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
FF1000
|
unkown
|
page execute and read and write
|
||
5210000
|
direct allocation
|
page read and write
|
||
D6D000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
43CE000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
1228000
|
unkown
|
page execute and read and write
|
||
310C000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
1D30E000
|
stack
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
1D982000
|
heap
|
page read and write
|
||
1672000
|
unkown
|
page execute and write copy
|
||
4D91000
|
heap
|
page read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
1D45E000
|
stack
|
page read and write
|
||
5360000
|
heap
|
page read and write
|
||
4D98000
|
heap
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
1027000
|
unkown
|
page execute and read and write
|
||
438F000
|
stack
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
39CE000
|
stack
|
page read and write
|
||
8EC000
|
stack
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
4D91000
|
heap
|
page read and write
|
||
14D9000
|
unkown
|
page execute and write copy
|
||
C54000
|
heap
|
page read and write
|
||
FE0000
|
direct allocation
|
page read and write
|
||
123A000
|
unkown
|
page write copy
|
||
5246000
|
direct allocation
|
page read and write
|
||
464E000
|
stack
|
page read and write
|
||
FE0000
|
direct allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
149D000
|
unkown
|
page execute and read and write
|
||
C54000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
1D87E000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
3ECE000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
360E000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4B0F000
|
stack
|
page read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
4C4F000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
1D6DE000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
FE0000
|
direct allocation
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
D91000
|
heap
|
page read and write
|
||
14D9000
|
unkown
|
page execute and read and write
|
||
C54000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
FE0000
|
direct allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
48CE000
|
stack
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
FE0000
|
direct allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
DA9000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
FAF000
|
stack
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
534F000
|
stack
|
page read and write
|
||
1D69E000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
FE0000
|
direct allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
14CA000
|
unkown
|
page execute and read and write
|
||
4D91000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
1D2CF000
|
stack
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
1D7DC000
|
stack
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
2F8B000
|
heap
|
page read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
44CF000
|
stack
|
page read and write
|
||
488F000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
2F87000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
FE0000
|
direct allocation
|
page read and write
|
||
123A000
|
unkown
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4D8F000
|
stack
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
1086000
|
unkown
|
page execute and read and write
|
||
474F000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
FE0000
|
direct allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
49CF000
|
stack
|
page read and write
|
||
1D1CE000
|
stack
|
page read and write
|
||
FE0000
|
direct allocation
|
page read and write
|
||
FE0000
|
direct allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
FF0000
|
unkown
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
14C3000
|
unkown
|
page execute and read and write
|
||
4D91000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
1D08E000
|
stack
|
page read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
1D40F000
|
stack
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
FF1000
|
unkown
|
page execute and write copy
|
||
14DA000
|
unkown
|
page execute and write copy
|
||
1D18F000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
1D97E000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
FE0000
|
direct allocation
|
page read and write
|
||
1671000
|
unkown
|
page execute and read and write
|
||
C54000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
460F000
|
stack
|
page read and write
|
||
1D59D000
|
stack
|
page read and write
|
||
5370000
|
direct allocation
|
page execute and read and write
|
||
4D91000
|
heap
|
page read and write
|
||
9E5000
|
stack
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
FE0000
|
direct allocation
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
123C000
|
unkown
|
page execute and read and write
|
||
1D980000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
3ACF000
|
stack
|
page read and write
|
||
107E000
|
unkown
|
page execute and read and write
|
||
4D91000
|
heap
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
109F000
|
unkown
|
page execute and read and write
|
||
4D91000
|
heap
|
page read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
13BD000
|
unkown
|
page execute and read and write
|
||
C54000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
FE0000
|
direct allocation
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
1D55F000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
FE0000
|
direct allocation
|
page read and write
|
||
524C000
|
stack
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
There are 229 hidden memdumps, click here to show them.