Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.php/y
|
unknown
|
||
http://185.215.113.206/1
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php_
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/L
|
unknown
|
||
http://185.215.113.206/k
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpt
|
unknown
|
||
http://185.215.113.206/w
|
unknown
|
||
185.215.113.206/c4becf79229cb002.php
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4A00000
|
direct allocation
|
page read and write
|
||
536000
|
heap
|
page read and write
|
||
8C1000
|
unkown
|
page execute and read and write
|
||
4B90000
|
direct allocation
|
page execute and read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
454F000
|
stack
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
49B0000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
4B4000
|
heap
|
page read and write
|
||
49F0000
|
direct allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
1C5000
|
stack
|
page read and write
|
||
576000
|
heap
|
page read and write
|
||
49F0000
|
direct allocation
|
page read and write
|
||
4550000
|
direct allocation
|
page read and write
|
||
B0A000
|
unkown
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
DA3000
|
unkown
|
page execute and read and write
|
||
4550000
|
direct allocation
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
F50000
|
unkown
|
page execute and read and write
|
||
4B4000
|
heap
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
4550000
|
direct allocation
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
294B000
|
heap
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
86C000
|
stack
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
AF8000
|
unkown
|
page execute and read and write
|
||
4550000
|
direct allocation
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
49F0000
|
direct allocation
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
CC000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4B3F000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4E2E000
|
stack
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
4574000
|
heap
|
page read and write
|
||
94E000
|
unkown
|
page execute and read and write
|
||
4561000
|
heap
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
508F000
|
stack
|
page read and write
|
||
4550000
|
direct allocation
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
3C8E000
|
stack
|
page read and write
|
||
518000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
105F000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
4560000
|
heap
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
4550000
|
direct allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
51DD000
|
stack
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
28FF000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4F2F000
|
stack
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
DB3000
|
unkown
|
page execute and write copy
|
||
4550000
|
direct allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
531E000
|
stack
|
page read and write
|
||
4550000
|
direct allocation
|
page read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
4550000
|
direct allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
5A1000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4550000
|
direct allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
561000
|
heap
|
page read and write
|
||
8C1000
|
unkown
|
page execute and write copy
|
||
38CF000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
50DD000
|
stack
|
page read and write
|
||
3DCF000
|
stack
|
page read and write
|
||
4580000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
593000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
956000
|
unkown
|
page execute and read and write
|
||
4561000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4550000
|
direct allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
DB2000
|
unkown
|
page execute and read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
8AE000
|
stack
|
page read and write
|
||
4550000
|
direct allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
C91000
|
unkown
|
page execute and read and write
|
||
4B60000
|
direct allocation
|
page execute and read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4550000
|
direct allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
4CAF000
|
stack
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4FE000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
B0A000
|
unkown
|
page write copy
|
||
4561000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
96F000
|
unkown
|
page execute and read and write
|
||
430E000
|
stack
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
49A0000
|
trusted library allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
3F4E000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
D70000
|
unkown
|
page execute and read and write
|
||
4561000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
B0C000
|
unkown
|
page execute and read and write
|
||
7DE000
|
stack
|
page read and write
|
||
4570000
|
heap
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
4550000
|
direct allocation
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
1CE000
|
stack
|
page read and write
|
||
D9C000
|
unkown
|
page execute and read and write
|
||
8C0000
|
unkown
|
page read and write
|
||
4DEF000
|
stack
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4AD000
|
stack
|
page read and write
|
||
DB2000
|
unkown
|
page execute and write copy
|
There are 222 hidden memdumps, click here to show them.