Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206//oY=
|
unknown
|
||
http://185.215.113.206/ToN=
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206%
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phph
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4E10000
|
direct allocation
|
page read and write
|
||
431000
|
unkown
|
page execute and read and write
|
||
FDE000
|
heap
|
page read and write
|
||
480F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
1CE9F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
4E46000
|
direct allocation
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
67A000
|
unkown
|
page write copy
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
3F8D000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
1D570000
|
heap
|
page read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
||
4981000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
1053000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
458F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
81B000
|
unkown
|
page execute and read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
1D2CE000
|
stack
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
1D28C000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4DF000
|
unkown
|
page execute and read and write
|
||
32CF000
|
stack
|
page read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
1061000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
1CFDF000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
8F0000
|
unkown
|
page execute and read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
470E000
|
stack
|
page read and write
|
||
2BAB000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
1024000
|
heap
|
page read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
4995000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
ADA000
|
unkown
|
page execute and write copy
|
||
4E10000
|
direct allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
112E000
|
stack
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
2C07000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
B6C000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
1CEDE000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
157E000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
1CD9E000
|
stack
|
page read and write
|
||
431000
|
unkown
|
page execute and write copy
|
||
122E000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
925000
|
unkown
|
page execute and read and write
|
||
448E000
|
stack
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
67C000
|
unkown
|
page execute and read and write
|
||
467000
|
unkown
|
page execute and read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
934000
|
unkown
|
page execute and write copy
|
||
4970000
|
direct allocation
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
105D000
|
heap
|
page read and write
|
||
4BE000
|
unkown
|
page execute and read and write
|
||
430000
|
unkown
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
AD9000
|
unkown
|
page execute and read and write
|
||
484E000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
1D3CE000
|
stack
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
EF5000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
49A0000
|
heap
|
page read and write
|
||
67A000
|
unkown
|
page read and write
|
||
934000
|
unkown
|
page execute and read and write
|
||
420E000
|
stack
|
page read and write
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
||
408E000
|
stack
|
page read and write
|
||
1CD5F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
1D13F000
|
stack
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
1D46E000
|
stack
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
41CF000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4F70000
|
direct allocation
|
page execute and read and write
|
||
46CF000
|
stack
|
page read and write
|
||
1038000
|
heap
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
4970000
|
direct allocation
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
1D56F000
|
stack
|
page read and write
|
||
935000
|
unkown
|
page execute and write copy
|
||
2C0B000
|
heap
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
668000
|
unkown
|
page execute and read and write
|
||
394E000
|
stack
|
page read and write
|
||
4F5F000
|
stack
|
page read and write
|
||
494F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
1D03E000
|
stack
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
91B000
|
unkown
|
page execute and read and write
|
||
4981000
|
heap
|
page read and write
|
||
1D18D000
|
stack
|
page read and write
|
||
4C6000
|
unkown
|
page execute and read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
4981000
|
heap
|
page read and write
|
There are 202 hidden memdumps, click here to show them.