Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.php/i
|
unknown
|
||
http://185.215.113.206k
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/G
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpy;
|
unknown
|
||
http://185.215.113.206/5zm$
|
unknown
|
||
185.215.113.206/c4becf79229cb002.php
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
441000
|
unkown
|
page execute and read and write
|
||
156E000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1D12E000
|
stack
|
page read and write
|
||
1D22F000
|
stack
|
page read and write
|
||
1D8A4000
|
heap
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
68A000
|
unkown
|
page read and write
|
||
15B2000
|
heap
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
4EF000
|
unkown
|
page execute and read and write
|
||
926000
|
unkown
|
page execute and read and write
|
||
52BF000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1530000
|
direct allocation
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
678000
|
unkown
|
page execute and read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1D5FC000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
1D3AE000
|
stack
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1D63E000
|
stack
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
1404000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
441000
|
unkown
|
page execute and write copy
|
||
2F3E000
|
stack
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
8F8000
|
unkown
|
page execute and read and write
|
||
4D01000
|
heap
|
page read and write
|
||
EDC000
|
stack
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1D89F000
|
stack
|
page read and write
|
||
150F000
|
stack
|
page read and write
|
||
1CFEE000
|
stack
|
page read and write
|
||
1D36E000
|
stack
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
4D17000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
935000
|
unkown
|
page execute and read and write
|
||
440000
|
unkown
|
page read and write
|
||
1D73E000
|
stack
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
935000
|
unkown
|
page execute and write copy
|
||
1510000
|
direct allocation
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
1D4AF000
|
stack
|
page read and write
|
||
1D0EF000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
68C000
|
unkown
|
page execute and read and write
|
||
1D79E000
|
stack
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1547000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
936000
|
unkown
|
page execute and write copy
|
||
4D00000
|
heap
|
page read and write
|
||
52F0000
|
direct allocation
|
page execute and read and write
|
||
41BF000
|
stack
|
page read and write
|
||
477000
|
unkown
|
page execute and read and write
|
||
4D01000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
493F000
|
stack
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
15B4000
|
heap
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
AD3000
|
unkown
|
page execute and read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
447E000
|
stack
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
52F0000
|
direct allocation
|
page execute and read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
5300000
|
direct allocation
|
page execute and read and write
|
||
33FF000
|
stack
|
page read and write
|
||
4CFF000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
15E9000
|
heap
|
page read and write
|
||
68A000
|
unkown
|
page write copy
|
||
4D01000
|
heap
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1530000
|
direct allocation
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
1404000
|
heap
|
page read and write
|
||
1530000
|
direct allocation
|
page read and write
|
||
4D6000
|
unkown
|
page execute and read and write
|
||
1D8A0000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
FD5000
|
stack
|
page read and write
|
||
1D26E000
|
stack
|
page read and write
|
||
816000
|
unkown
|
page execute and read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
15E2000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
91F000
|
unkown
|
page execute and read and write
|
||
1D4FD000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
4CE000
|
unkown
|
page execute and read and write
|
||
4D01000
|
heap
|
page read and write
|
||
51B6000
|
direct allocation
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
175F000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
15C7000
|
heap
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
4D10000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
307C000
|
stack
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
AD4000
|
unkown
|
page execute and write copy
|
There are 227 hidden memdumps, click here to show them.