Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.phpJA
|
unknown
|
||
http://185.215.113.206//
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.phpoIHH
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpfA
|
unknown
|
||
http://185.215.113.206/405117-2476756634-1003u
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/_
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php5IfH
|
unknown
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpt
|
unknown
|
||
http://185.215.113.206/I
|
unknown
|
||
http://185.215.113.206/h
|
unknown
|
||
http://185.215.113.206/YIzH
|
unknown
|
There are 5 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3E1000
|
unkown
|
page execute and read and write
|
||
118E000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
3ACF000
|
stack
|
page read and write
|
||
298F000
|
stack
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
FC7000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
62A000
|
unkown
|
page write copy
|
||
4611000
|
heap
|
page read and write
|
||
EFF000
|
stack
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
44CF000
|
stack
|
page read and write
|
||
62A000
|
unkown
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
F8B000
|
stack
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1CB5F000
|
stack
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
1CA5E000
|
stack
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
3A0000
|
heap
|
page read and write
|
||
1C91E000
|
stack
|
page read and write
|
||
1170000
|
direct allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
48F000
|
unkown
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
8D4000
|
unkown
|
page execute and write copy
|
||
FD4000
|
heap
|
page read and write
|
||
8D4000
|
unkown
|
page execute and read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
1D06C000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
11FA000
|
heap
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
4ACE000
|
stack
|
page read and write
|
||
3E0000
|
unkown
|
page readonly
|
||
414E000
|
stack
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
11E9000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
15C000
|
stack
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
A73000
|
unkown
|
page execute and write copy
|
||
43CE000
|
stack
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
618000
|
unkown
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
3ECE000
|
stack
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
1CF2D000
|
stack
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
FCB000
|
heap
|
page read and write
|
||
476000
|
unkown
|
page execute and read and write
|
||
384F000
|
stack
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
4610000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
438F000
|
stack
|
page read and write
|
||
25E000
|
stack
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
1CC9F000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
8C7000
|
unkown
|
page execute and read and write
|
||
11D2000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
1CF6E000
|
stack
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2C0000
|
heap
|
page read and write
|
||
8D5000
|
unkown
|
page execute and write copy
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
255000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1170000
|
direct allocation
|
page read and write
|
||
8BE000
|
unkown
|
page execute and read and write
|
||
1180000
|
heap
|
page read and write
|
||
1CA1F000
|
stack
|
page read and write
|
||
4621000
|
heap
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
A72000
|
unkown
|
page execute and read and write
|
||
FD4000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
1CDEF000
|
stack
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
118A000
|
heap
|
page read and write
|
||
1CB9E000
|
stack
|
page read and write
|
||
11FC000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
7B8000
|
unkown
|
page execute and read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
4AC6000
|
direct allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
1170000
|
direct allocation
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
3E1000
|
unkown
|
page execute and write copy
|
||
4611000
|
heap
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
360E000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
417000
|
unkown
|
page execute and read and write
|
||
4BCF000
|
stack
|
page read and write
|
||
1CE2D000
|
stack
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
895000
|
unkown
|
page execute and read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
4611000
|
heap
|
page read and write
|
||
62C000
|
unkown
|
page execute and read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
FD4000
|
heap
|
page read and write
|
||
460F000
|
stack
|
page read and write
|
||
46E000
|
unkown
|
page execute and read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
1CCEE000
|
stack
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
There are 222 hidden memdumps, click here to show them.