Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.phpj
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206/uP
|
unknown
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/:
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/P
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpr
|
unknown
|
||
185.215.113.206/c4becf79229cb002.php
|
|||
http://185.215.113.206/c4becf79229cb002.phpV
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4E40000
|
direct allocation
|
page read and write
|
||
A7E000
|
heap
|
page read and write
|
||
F61000
|
unkown
|
page execute and read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
1D3EC000
|
stack
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
473F000
|
stack
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
100F000
|
unkown
|
page execute and read and write
|
||
2DFB000
|
heap
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
1CEBF000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
11AA000
|
unkown
|
page read and write
|
||
1456000
|
unkown
|
page execute and write copy
|
||
4E7E000
|
stack
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
49E0000
|
heap
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
915000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
11AA000
|
unkown
|
page write copy
|
||
2FFF000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
2DD0000
|
direct allocation
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
5D5000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
11AC000
|
unkown
|
page execute and read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
1D15F000
|
stack
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
1D2AD000
|
stack
|
page read and write
|
||
1CEFE000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
1448000
|
unkown
|
page execute and read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
AC2000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
2DF7000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
1335000
|
unkown
|
page execute and read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
1414000
|
unkown
|
page execute and read and write
|
||
910000
|
heap
|
page read and write
|
||
1D05E000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
F60000
|
unkown
|
page readonly
|
||
49BF000
|
stack
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
143E000
|
unkown
|
page execute and read and write
|
||
347F000
|
stack
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
2DD0000
|
direct allocation
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
4F7F000
|
stack
|
page read and write
|
||
487F000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
1455000
|
unkown
|
page execute and read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49D4000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
F61000
|
unkown
|
page execute and write copy
|
||
49C1000
|
heap
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
B00000
|
heap
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
1CFFF000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
1455000
|
unkown
|
page execute and write copy
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
4DC000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
1CDBE000
|
stack
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
F60000
|
unkown
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
4E76000
|
direct allocation
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
1D2ED000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
15F6000
|
unkown
|
page execute and read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
5DD000
|
stack
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
AD7000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
1D1AD000
|
stack
|
page read and write
|
||
FF6000
|
unkown
|
page execute and read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49D0000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
||
45FF000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
1198000
|
unkown
|
page execute and read and write
|
||
15F7000
|
unkown
|
page execute and write copy
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
C6F000
|
stack
|
page read and write
|
||
A78000
|
heap
|
page read and write
|
||
AE6000
|
heap
|
page read and write
|
||
48BE000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
FEE000
|
unkown
|
page execute and read and write
|
||
49C1000
|
heap
|
page read and write
|
||
2DD0000
|
direct allocation
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
F3C000
|
stack
|
page read and write
|
||
F97000
|
unkown
|
page execute and read and write
|
||
477E000
|
stack
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
1CD7F000
|
stack
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
There are 200 hidden memdumps, click here to show them.