Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206b
|
unknown
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/K
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
185.215.113.206/c4becf79229cb002.php
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4E50000
|
direct allocation
|
page read and write
|
||
BDE000
|
heap
|
page read and write
|
||
D61000
|
unkown
|
page execute and read and write
|
||
346F000
|
stack
|
page read and write
|
||
49B0000
|
direct allocation
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
B37000
|
heap
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
1D2EE000
|
stack
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
49B0000
|
direct allocation
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
F98000
|
unkown
|
page execute and read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
49C1000
|
heap
|
page read and write
|
||
124F000
|
unkown
|
page execute and read and write
|
||
B3B000
|
heap
|
page read and write
|
||
1407000
|
unkown
|
page execute and write copy
|
||
49C1000
|
heap
|
page read and write
|
||
1D19F000
|
stack
|
page read and write
|
||
49B0000
|
direct allocation
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
113C000
|
unkown
|
page execute and read and write
|
||
AD4000
|
heap
|
page read and write
|
||
49B0000
|
direct allocation
|
page read and write
|
||
49B0000
|
direct allocation
|
page read and write
|
||
1D42C000
|
stack
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
AD4000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
51C000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
1CE1E000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49B0000
|
direct allocation
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
49C4000
|
heap
|
page read and write
|
||
1CF5E000
|
stack
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
E0F000
|
unkown
|
page execute and read and write
|
||
AD4000
|
heap
|
page read and write
|
||
1CDDF000
|
stack
|
page read and write
|
||
125F000
|
unkown
|
page execute and write copy
|
||
DEE000
|
unkown
|
page execute and read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49E0000
|
heap
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
FAC000
|
unkown
|
page execute and read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
49B0000
|
direct allocation
|
page read and write
|
||
49B0000
|
direct allocation
|
page read and write
|
||
BD8000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
8F5000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
150E000
|
stack
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
1D05E000
|
stack
|
page read and write
|
||
4E50000
|
direct allocation
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
C53000
|
heap
|
page read and write
|
||
FAA000
|
unkown
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
4E86000
|
direct allocation
|
page read and write
|
||
49B0000
|
direct allocation
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
FAA000
|
unkown
|
page write copy
|
||
30AF000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
BCC000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
C63000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
49B0000
|
direct allocation
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
396F000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49B0000
|
direct allocation
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
C37000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
D60000
|
unkown
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
1D09E000
|
stack
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
4E9C000
|
stack
|
page read and write
|
||
C24000
|
heap
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
D61000
|
unkown
|
page execute and write copy
|
||
125E000
|
unkown
|
page execute and read and write
|
||
49C1000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
1CCDE000
|
stack
|
page read and write
|
||
1406000
|
unkown
|
page execute and read and write
|
||
AD4000
|
heap
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
1247000
|
unkown
|
page execute and read and write
|
||
472F000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
49B0000
|
direct allocation
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
1CF1F000
|
stack
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
1D1EE000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page read and write
|
||
1D32D000
|
stack
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
DF6000
|
unkown
|
page execute and read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49B0000
|
direct allocation
|
page read and write
|
||
49B0000
|
direct allocation
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
49C1000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
486F000
|
stack
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
D97000
|
unkown
|
page execute and read and write
|
||
336E000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
4F9F000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49D0000
|
heap
|
page read and write
|
||
D60000
|
unkown
|
page readonly
|
||
125E000
|
unkown
|
page execute and write copy
|
||
49C1000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
121D000
|
unkown
|
page execute and read and write
|
||
AD4000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
There are 223 hidden memdumps, click here to show them.