Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.phpl
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/;
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpT
|
unknown
|
||
http://185.215.113.206/)
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpv
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
E4E000
|
heap
|
page read and write
|
||
A1000
|
unkown
|
page execute and read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
3D1F000
|
stack
|
page read and write
|
||
A0000
|
unkown
|
page readonly
|
||
D7000
|
unkown
|
page execute and read and write
|
||
A0000
|
unkown
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
742000
|
unkown
|
page execute and write copy
|
||
45E1000
|
heap
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E8000
|
heap
|
page read and write
|
||
AF5000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
2EA000
|
unkown
|
page read and write
|
||
3ADE000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
285E000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
29DF000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
2EA000
|
unkown
|
page write copy
|
||
4AAB000
|
stack
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
3FDE000
|
stack
|
page read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
46E0000
|
trusted library allocation
|
page read and write
|
||
59E000
|
unkown
|
page execute and read and write
|
||
1D0EE000
|
stack
|
page read and write
|
||
1CDBF000
|
stack
|
page read and write
|
||
3D5E000
|
stack
|
page read and write
|
||
28DB000
|
heap
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
2ADF000
|
stack
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
1CE0D000
|
stack
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
28D7000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
399E000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
1CB7E000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
7DC000
|
stack
|
page read and write
|
||
1CB3F000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
1C9FF000
|
stack
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
59F000
|
unkown
|
page execute and write copy
|
||
1CCBE000
|
stack
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
381F000
|
stack
|
page read and write
|
||
12E000
|
unkown
|
page execute and read and write
|
||
C44000
|
heap
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
2EC000
|
unkown
|
page execute and read and write
|
||
45E1000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
2BDF000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
36DF000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
1CC7F000
|
stack
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
1C8FE000
|
stack
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
E4A000
|
heap
|
page read and write
|
||
395F000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
1D1EE000
|
stack
|
page read and write
|
||
A1000
|
unkown
|
page execute and write copy
|
||
C44000
|
heap
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
4A96000
|
direct allocation
|
page read and write
|
||
411E000
|
stack
|
page read and write
|
||
741000
|
unkown
|
page execute and read and write
|
||
45E1000
|
heap
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
4BAF000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
421F000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
3C1E000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
588000
|
unkown
|
page execute and read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
58F000
|
unkown
|
page execute and read and write
|
||
435F000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
3E9E000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
1D1F0000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
289E000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
3F9F000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
55E000
|
unkown
|
page execute and read and write
|
||
371E000
|
stack
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
359F000
|
stack
|
page read and write
|
||
2CDF000
|
stack
|
page read and write
|
||
45DF000
|
stack
|
page read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
40DF000
|
stack
|
page read and write
|
||
345F000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
425E000
|
stack
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
281C000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
2D8000
|
unkown
|
page execute and read and write
|
||
385E000
|
stack
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
1CF4D000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
2E1F000
|
stack
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
45F0000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
3BDF000
|
stack
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
349E000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
1CF0D000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
1D04C000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
136000
|
unkown
|
page execute and read and write
|
||
45E1000
|
heap
|
page read and write
|
||
449F000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
3A9F000
|
stack
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
1CA3E000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
59E000
|
unkown
|
page execute and write copy
|
||
EC3000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
14F000
|
unkown
|
page execute and read and write
|
||
E92000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
476000
|
unkown
|
page execute and read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
45E1000
|
heap
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E0000
|
heap
|
page read and write
|
There are 225 hidden memdumps, click here to show them.