Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206-
|
unknown
|
||
http://185.215.113.206/0
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phps0_
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpC0o
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpk1G
|
unknown
|
||
185.215.113.206/c4becf79229cb002.php
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1018000
|
heap
|
page read and write
|
||
6D1000
|
unkown
|
page execute and read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
FFE000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
468F000
|
stack
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
BCD000
|
unkown
|
page execute and read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
1D00D000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
1013000
|
heap
|
page read and write
|
||
4DF0000
|
direct allocation
|
page execute and read and write
|
||
47E1000
|
heap
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
91C000
|
unkown
|
page execute and read and write
|
||
37CE000
|
stack
|
page read and write
|
||
1CC3E000
|
stack
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
1D3F0000
|
heap
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4DBF000
|
stack
|
page read and write
|
||
E75000
|
stack
|
page read and write
|
||
4DD0000
|
direct allocation
|
page execute and read and write
|
||
BCD000
|
unkown
|
page execute and write copy
|
||
4C70000
|
direct allocation
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
33C000
|
stack
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
1CD3F000
|
stack
|
page read and write
|
||
3E0D000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
||
91A000
|
unkown
|
page write copy
|
||
47E1000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
4800000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
1CAFE000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
1D3EE000
|
stack
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
1D2EE000
|
stack
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
1075000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
B8C000
|
unkown
|
page execute and read and write
|
||
3D4000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
112D000
|
stack
|
page read and write
|
||
1043000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
1CBFF000
|
stack
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
1CE7E000
|
stack
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
1D14E000
|
stack
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
6D1000
|
unkown
|
page execute and write copy
|
||
1CECE000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
3DCF000
|
stack
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47CF000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
47E7000
|
heap
|
page read and write
|
||
1CD7E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
BB7000
|
unkown
|
page execute and read and write
|
||
AAF000
|
unkown
|
page execute and read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
BCE000
|
unkown
|
page execute and write copy
|
||
D70000
|
unkown
|
page execute and write copy
|
||
D6F000
|
unkown
|
page execute and read and write
|
||
47E1000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
FEB000
|
heap
|
page read and write
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
BBE000
|
unkown
|
page execute and read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
FFA000
|
heap
|
page read and write
|
||
75E000
|
unkown
|
page execute and read and write
|
||
46CE000
|
stack
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
91A000
|
unkown
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
707000
|
unkown
|
page execute and read and write
|
||
38CF000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
1045000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
48E0000
|
trusted library allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
47E1000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
2B4B000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
3D4000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
1D24E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
1D10C000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
77F000
|
unkown
|
page execute and read and write
|
||
3D4000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
1CFCF000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
4DE0000
|
direct allocation
|
page execute and read and write
|
||
E7E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
908000
|
unkown
|
page execute and read and write
|
||
3D4000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
454F000
|
stack
|
page read and write
|
||
4CBB000
|
stack
|
page read and write
|
||
1039000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
766000
|
unkown
|
page execute and read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4CB6000
|
direct allocation
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
There are 232 hidden memdumps, click here to show them.