Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.phpbZ
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206/~
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php7S
|
unknown
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/J
|
unknown
|
||
http://185.215.113.206/9
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpJZ
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php%
|
unknown
|
||
185.215.113.206/c4becf79229cb002.php
|
There are 2 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
341000
|
unkown
|
page execute and read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
FAC000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
341000
|
unkown
|
page execute and write copy
|
||
295E000
|
stack
|
page read and write
|
||
FD3000
|
heap
|
page read and write
|
||
830000
|
unkown
|
page execute and write copy
|
||
2A20000
|
direct allocation
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
830000
|
unkown
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
100C000
|
heap
|
page read and write
|
||
3D6000
|
unkown
|
page execute and read and write
|
||
817000
|
unkown
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
377000
|
unkown
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
299C000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
831000
|
unkown
|
page execute and write copy
|
||
4761000
|
heap
|
page read and write
|
||
2A20000
|
direct allocation
|
page read and write
|
||
2A3B000
|
heap
|
page read and write
|
||
2A20000
|
direct allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
2A20000
|
direct allocation
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
718000
|
unkown
|
page execute and read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
CFD000
|
stack
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4D4F000
|
stack
|
page read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
578000
|
unkown
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
473F000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
4DA0000
|
direct allocation
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
2CC000
|
stack
|
page read and write
|
||
1CB9E000
|
stack
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
58A000
|
unkown
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
2A20000
|
direct allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
1CCDE000
|
stack
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
1008000
|
heap
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
117E000
|
stack
|
page read and write
|
||
4740000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
1CDDF000
|
stack
|
page read and write
|
||
1CC9F000
|
stack
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
1D1CE000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
F8E000
|
heap
|
page read and write
|
||
4860000
|
trusted library allocation
|
page read and write
|
||
1CB5F000
|
stack
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
1CE4E000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
330000
|
heap
|
page read and write
|
||
2A20000
|
direct allocation
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
3D7D000
|
stack
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
E1D000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
2D3F000
|
stack
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
2A20000
|
direct allocation
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4C36000
|
direct allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
2A20000
|
direct allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
2A20000
|
direct allocation
|
page read and write
|
||
1D0CD000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
2A20000
|
direct allocation
|
page read and write
|
||
1CF4F000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
4C4C000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
FF8000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
CF5000
|
stack
|
page read and write
|
||
4777000
|
heap
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
1D08C000
|
stack
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
2A37000
|
heap
|
page read and write
|
||
4780000
|
heap
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
2A20000
|
direct allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
3CE000
|
unkown
|
page execute and read and write
|
||
2A20000
|
direct allocation
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
3EF000
|
unkown
|
page execute and read and write
|
||
340000
|
unkown
|
page readonly
|
||
58C000
|
unkown
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4860000
|
heap
|
page read and write
|
||
7F0000
|
unkown
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
822000
|
unkown
|
page execute and read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
2A20000
|
direct allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
9CB000
|
unkown
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
F8A000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
2A30000
|
heap
|
page read and write
|
||
58A000
|
unkown
|
page write copy
|
||
3FFE000
|
stack
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
2A20000
|
direct allocation
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
1CF8E000
|
stack
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
FE9000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
340000
|
unkown
|
page read and write
|
||
9CC000
|
unkown
|
page execute and write copy
|
||
4760000
|
heap
|
page read and write
|
There are 202 hidden memdumps, click here to show them.