Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.php6/E
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.php2.Y
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpR.
|
unknown
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/:
|
unknown
|
||
http://185.215.113.206/9
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
12DE000
|
heap
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
8E1000
|
unkown
|
page execute and read and write
|
||
12DA000
|
heap
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
4AE6000
|
heap
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
496F000
|
stack
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
DD2000
|
unkown
|
page execute and write copy
|
||
11D0000
|
heap
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1D03E000
|
stack
|
page read and write
|
||
96E000
|
unkown
|
page execute and read and write
|
||
446F000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
128B000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
F6C000
|
unkown
|
page execute and read and write
|
||
DC2000
|
unkown
|
page execute and read and write
|
||
D92000
|
unkown
|
page execute and read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
106D000
|
stack
|
page read and write
|
||
1CFFF000
|
stack
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
1D3EC000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
50AF000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
DD1000
|
unkown
|
page execute and write copy
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
1349000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AF0000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4FA6000
|
direct allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1CEBF000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1D42D000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
1356000
|
heap
|
page read and write
|
||
F6D000
|
unkown
|
page execute and write copy
|
||
4AE1000
|
heap
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
1324000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
B2A000
|
unkown
|
page write copy
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
B18000
|
unkown
|
page execute and read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
CB3000
|
unkown
|
page execute and read and write
|
||
482F000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1D13F000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
F6C000
|
unkown
|
page execute and write copy
|
||
356F000
|
stack
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
1D2EE000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
15CE000
|
stack
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4FAC000
|
stack
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
436E000
|
stack
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
49AE000
|
stack
|
page read and write
|
||
8E1000
|
unkown
|
page execute and write copy
|
||
44AE000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
1D52E000
|
stack
|
page read and write
|
||
98F000
|
unkown
|
page execute and read and write
|
||
DBB000
|
unkown
|
page execute and read and write
|
||
DD1000
|
unkown
|
page execute and read and write
|
||
1D1AE000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
8E0000
|
unkown
|
page readonly
|
||
46EF000
|
stack
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
1CEFE000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
976000
|
unkown
|
page execute and read and write
|
||
B2A000
|
unkown
|
page write copy
|
||
917000
|
unkown
|
page execute and read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
1D2AF000
|
stack
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
131E000
|
heap
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
1064000
|
stack
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1338000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
117E000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
B2C000
|
unkown
|
page execute and read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
There are 201 hidden memdumps, click here to show them.