Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.php9
|
unknown
|
||
http://185.215.113.206/p
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
http://185.215.113.206tD
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpI9
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpy9
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpu9
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
ax-0001.ax-msedge.net
|
150.171.28.10
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4D1000
|
unkown
|
page execute and read and write
|
||
CDE000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
D52000
|
heap
|
page read and write
|
||
CAE000
|
stack
|
page read and write
|
||
708000
|
unkown
|
page execute and read and write
|
||
440000
|
heap
|
page read and write
|
||
1D17E000
|
stack
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
1CFDD000
|
stack
|
page read and write
|
||
1CE4F000
|
stack
|
page read and write
|
||
1D0DE000
|
stack
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
D25000
|
heap
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1CF9D000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
29E0000
|
direct allocation
|
page read and write
|
||
1CD0F000
|
stack
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
1D280000
|
heap
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
B6B000
|
unkown
|
page execute and read and write
|
||
363F000
|
stack
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4BE000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
46A0000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
9BA000
|
unkown
|
page execute and read and write
|
||
464000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
9C8000
|
unkown
|
page execute and write copy
|
||
464000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
1CBCE000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
29E0000
|
direct allocation
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
464000
|
heap
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
4B36000
|
direct allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
B6C000
|
unkown
|
page execute and write copy
|
||
464000
|
heap
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
29F7000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
453F000
|
stack
|
page read and write
|
||
29BB000
|
stack
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
D23000
|
heap
|
page read and write
|
||
507000
|
unkown
|
page execute and read and write
|
||
9C8000
|
unkown
|
page execute and read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
4B3B000
|
stack
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
F9F000
|
stack
|
page read and write
|
||
1CC0E000
|
stack
|
page read and write
|
||
4690000
|
heap
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
57F000
|
unkown
|
page execute and read and write
|
||
303E000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
29E0000
|
direct allocation
|
page read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
4681000
|
heap
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4C3F000
|
stack
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1CC000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
71C000
|
unkown
|
page execute and read and write
|
||
4681000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1CE9D000
|
stack
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
297F000
|
stack
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
4D0000
|
unkown
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4D1000
|
unkown
|
page execute and write copy
|
||
317E000
|
stack
|
page read and write
|
||
1CD4E000
|
stack
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
55E000
|
unkown
|
page execute and read and write
|
||
4681000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
566000
|
unkown
|
page execute and read and write
|
||
D36000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1CA8F000
|
stack
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
71A000
|
unkown
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4D0000
|
unkown
|
page readonly
|
||
1C98E000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
403F000
|
stack
|
page read and write
|
||
CDA000
|
heap
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
1CACE000
|
stack
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
9C9000
|
unkown
|
page execute and write copy
|
||
464000
|
heap
|
page read and write
|
||
29FB000
|
heap
|
page read and write
|
||
8B1000
|
unkown
|
page execute and read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
71A000
|
unkown
|
page write copy
|
||
417F000
|
stack
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4680000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
42BF000
|
stack
|
page read and write
|
||
109F000
|
stack
|
page read and write
|
||
9B2000
|
unkown
|
page execute and read and write
|
||
4681000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
CD0000
|
heap
|
page read and write
|
||
C65000
|
stack
|
page read and write
|
||
1D27E000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
287E000
|
stack
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
464000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
989000
|
unkown
|
page execute and read and write
|
||
353E000
|
stack
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
4685000
|
heap
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
There are 226 hidden memdumps, click here to show them.