Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.phpK
|
unknown
|
||
http://185.215.113.206/B
|
unknown
|
||
http://185.215.113.206~
|
unknown
|
||
http://185.215.113.206/p
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php#
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
391000
|
unkown
|
page execute and read and write
|
||
4D50000
|
direct allocation
|
page read and write
|
||
F78000
|
heap
|
page read and write
|
||
882000
|
unkown
|
page execute and read and write
|
||
F00000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
4D40000
|
direct allocation
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
44D0000
|
heap
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
A1F000
|
unkown
|
page execute and read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
ABC000
|
stack
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
5C8000
|
unkown
|
page execute and read and write
|
||
374E000
|
stack
|
page read and write
|
||
FD6000
|
heap
|
page read and write
|
||
1D32E000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
5DA000
|
unkown
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
1CE5E000
|
stack
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
391000
|
unkown
|
page execute and write copy
|
||
1CD1E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
1CBDE000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
390000
|
unkown
|
page readonly
|
||
48C0000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
4D40000
|
direct allocation
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
2B07000
|
heap
|
page read and write
|
||
2B0B000
|
heap
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
1D22E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
426000
|
unkown
|
page execute and read and write
|
||
883000
|
unkown
|
page execute and write copy
|
||
3ACF000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
840000
|
unkown
|
page execute and read and write
|
||
3C7000
|
unkown
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
F5E000
|
heap
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
F04000
|
heap
|
page read and write
|
||
1D0ED000
|
stack
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
75C000
|
unkown
|
page execute and read and write
|
||
1CF5F000
|
stack
|
page read and write
|
||
118E000
|
stack
|
page read and write
|
||
FB8000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
86A000
|
unkown
|
page execute and read and write
|
||
F73000
|
heap
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
35CF000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
43CE000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
41E000
|
unkown
|
page execute and read and write
|
||
1D1EC000
|
stack
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
A20000
|
unkown
|
page execute and write copy
|
||
1D0AF000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
360E000
|
stack
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
48B0000
|
heap
|
page read and write
|
||
2AFB000
|
stack
|
page read and write
|
||
BB5000
|
stack
|
page read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
49B0000
|
trusted library allocation
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
4EA0000
|
heap
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
1CCDF000
|
stack
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
5DA000
|
unkown
|
page write copy
|
||
FC2000
|
heap
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
4D86000
|
direct allocation
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
1CE1F000
|
stack
|
page read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
882000
|
unkown
|
page execute and write copy
|
||
F04000
|
heap
|
page read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
F5A000
|
heap
|
page read and write
|
||
3ECE000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
5DC000
|
unkown
|
page execute and read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
438F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
4E8F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
4D40000
|
direct allocation
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
4D8B000
|
stack
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
44CF000
|
stack
|
page read and write
|
||
872000
|
unkown
|
page execute and read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
1CFAE000
|
stack
|
page read and write
|
There are 227 hidden memdumps, click here to show them.