Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/3
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpUN
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.php-
|
unknown
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/J
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpQ
|
unknown
|
||
185.215.113.206/c4becf79229cb002.php
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
11AE000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
2B1000
|
unkown
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
346000
|
unkown
|
page execute and read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
1D47D000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
2B0000
|
unkown
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4FA000
|
unkown
|
page write copy
|
||
1D1CE000
|
stack
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
4B70000
|
heap
|
page read and write
|
||
681000
|
unkown
|
page execute and read and write
|
||
1D32F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B60000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
33E000
|
unkown
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
117D000
|
stack
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
49EF000
|
stack
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
513F000
|
stack
|
page read and write
|
||
92E000
|
unkown
|
page execute and read and write
|
||
11F5000
|
heap
|
page read and write
|
||
1D37E000
|
stack
|
page read and write
|
||
1CF8E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
79A000
|
unkown
|
page execute and write copy
|
||
362E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
D4C000
|
stack
|
page read and write
|
||
5026000
|
direct allocation
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1206000
|
heap
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
113E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
10F5000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
156F000
|
stack
|
page read and write
|
||
11F2000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
4B2F000
|
stack
|
page read and write
|
||
2DA7000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
2B0000
|
unkown
|
page readonly
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
1D4BD000
|
stack
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
2DAB000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
783000
|
unkown
|
page execute and read and write
|
||
312E000
|
stack
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
799000
|
unkown
|
page execute and read and write
|
||
1223000
|
heap
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
1D5BE000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4E8000
|
unkown
|
page execute and read and write
|
||
386F000
|
stack
|
page read and write
|
||
78B000
|
unkown
|
page execute and read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
2D8B000
|
stack
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
1D0CE000
|
stack
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
1D08F000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
92F000
|
unkown
|
page execute and write copy
|
||
2B1000
|
unkown
|
page execute and write copy
|
||
4B61000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
503E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
75C000
|
unkown
|
page execute and read and write
|
||
1D22E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
2E7000
|
unkown
|
page execute and read and write
|
||
33AE000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
4FC000
|
unkown
|
page execute and read and write
|
||
1CF4F000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
518E000
|
stack
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
799000
|
unkown
|
page execute and write copy
|
||
376E000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
4FA000
|
unkown
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
35F000
|
unkown
|
page execute and read and write
|
||
4B30000
|
heap
|
page read and write
|
||
4B61000
|
heap
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
34EE000
|
stack
|
page read and write
|
There are 197 hidden memdumps, click here to show them.