Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.phpp7
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpz
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpy~C4
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.2065
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpez
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php47
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
591000
|
unkown
|
page execute and read and write
|
||
15EE000
|
heap
|
page read and write
|
||
52F0000
|
direct allocation
|
page read and write
|
||
A76000
|
unkown
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
A76000
|
unkown
|
page execute and write copy
|
||
31E7000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
31C0000
|
direct allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
597F000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
5C0E000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
C0E000
|
unkown
|
page execute and write copy
|
||
59CE000
|
stack
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
52B0000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
61E000
|
unkown
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
5B0D000
|
stack
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
31C0000
|
direct allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
31EB000
|
heap
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
162E000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
1651000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
18DF000
|
stack
|
page read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
1646000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
A60000
|
unkown
|
page execute and read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
542F000
|
stack
|
page read and write
|
||
7C8000
|
unkown
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
A77000
|
unkown
|
page execute and write copy
|
||
4E71000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
590000
|
unkown
|
page readonly
|
||
14B4000
|
heap
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
56DF000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
4D6E000
|
stack
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
559F000
|
stack
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
15E8000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
31C0000
|
direct allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5ACD000
|
stack
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
15AE000
|
stack
|
page read and write
|
||
C0D000
|
unkown
|
page execute and read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
150D000
|
stack
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
496F000
|
stack
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
532C000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
125C000
|
stack
|
page read and write
|
||
571E000
|
stack
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E81000
|
heap
|
page read and write
|
||
31BC000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
581F000
|
stack
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
4E6F000
|
stack
|
page read and write
|
||
A37000
|
unkown
|
page execute and read and write
|
||
45EE000
|
stack
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
7DA000
|
unkown
|
page write copy
|
||
4E90000
|
heap
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
17DE000
|
stack
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
1355000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
A68000
|
unkown
|
page execute and read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
63F000
|
unkown
|
page execute and read and write
|
||
472E000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
7DC000
|
unkown
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
166C000
|
heap
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
626000
|
unkown
|
page execute and read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
7DA000
|
unkown
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
4D2F000
|
stack
|
page read and write
|
||
962000
|
unkown
|
page execute and read and write
|
||
4E71000
|
heap
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
591000
|
unkown
|
page execute and write copy
|
||
14B4000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
There are 223 hidden memdumps, click here to show them.