Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/ninet.dll
|
unknown
|
||
http://185.215.113.206/8
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpKZ
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
15ED000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page read and write
|
||
901000
|
unkown
|
page execute and read and write
|
||
1D75D000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
1D61F000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
155D000
|
stack
|
page read and write
|
||
B4C000
|
unkown
|
page execute and read and write
|
||
37BF000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
17BF000
|
stack
|
page read and write
|
||
1D65D000
|
stack
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
1D36E000
|
stack
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
133D000
|
stack
|
page read and write
|
||
B4A000
|
unkown
|
page write copy
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
B4A000
|
unkown
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
447E000
|
stack
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
DB1000
|
unkown
|
page execute and read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
493F000
|
stack
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
9AF000
|
unkown
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
CD1000
|
unkown
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
1D51E000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
5316000
|
direct allocation
|
page read and write
|
||
1629000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
DDC000
|
unkown
|
page execute and read and write
|
||
1390000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
357E000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
1445000
|
heap
|
page read and write
|
||
531C000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
30FB000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
15CA000
|
heap
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
F8E000
|
unkown
|
page execute and read and write
|
||
140E000
|
stack
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
B38000
|
unkown
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
18BE000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
901000
|
unkown
|
page execute and write copy
|
||
546E000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
541F000
|
stack
|
page read and write
|
||
DE4000
|
unkown
|
page execute and read and write
|
||
1D26E000
|
stack
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
41FE000
|
stack
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
F8F000
|
unkown
|
page execute and write copy
|
||
30E0000
|
direct allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
98E000
|
unkown
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
309C000
|
stack
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
1D3AE000
|
stack
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
4E3F000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
1646000
|
heap
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
DF3000
|
unkown
|
page execute and write copy
|
||
407F000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
30F7000
|
heap
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E47000
|
heap
|
page read and write
|
||
DF2000
|
unkown
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
1D4AF000
|
stack
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
1D89C000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
1334000
|
stack
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
1D22E000
|
stack
|
page read and write
|
||
1D79E000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
DF2000
|
unkown
|
page execute and write copy
|
||
900000
|
unkown
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
1612000
|
heap
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4CFF000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
996000
|
unkown
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
937000
|
unkown
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
15CE000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
41BF000
|
stack
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
900000
|
unkown
|
page readonly
|
||
443F000
|
stack
|
page read and write
|
There are 200 hidden memdumps, click here to show them.