Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.phpK
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php9
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206/&~
|
unknown
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php#
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php2
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpw
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
131E000
|
heap
|
page read and write
|
||
6A1000
|
unkown
|
page execute and read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
1D3BF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
3F2F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1307000
|
heap
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4BC8000
|
heap
|
page read and write
|
||
160F000
|
stack
|
page read and write
|
||
130B000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1D63E000
|
stack
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
519F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
B96000
|
unkown
|
page execute and read and write
|
||
1254000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
46AF000
|
stack
|
page read and write
|
||
D38000
|
unkown
|
page execute and write copy
|
||
1D16E000
|
stack
|
page read and write
|
||
72E000
|
unkown
|
page execute and read and write
|
||
31AE000
|
stack
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
6A1000
|
unkown
|
page execute and write copy
|
||
4BC1000
|
heap
|
page read and write
|
||
1D7DF000
|
stack
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
509C000
|
stack
|
page read and write
|
||
736000
|
unkown
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4A6F000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1D02E000
|
stack
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
8EC000
|
unkown
|
page execute and read and write
|
||
1254000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
B97000
|
unkown
|
page execute and write copy
|
||
1130000
|
heap
|
page read and write
|
||
482E000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
5200000
|
direct allocation
|
page execute and read and write
|
||
1D3FD000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
A72000
|
unkown
|
page execute and read and write
|
||
B96000
|
unkown
|
page execute and write copy
|
||
1254000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
6A0000
|
unkown
|
page readonly
|
||
10F5000
|
stack
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
131A000
|
heap
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
B53000
|
unkown
|
page execute and read and write
|
||
41AF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
74F000
|
unkown
|
page execute and read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
1254000
|
heap
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
1D53D000
|
stack
|
page read and write
|
||
1D26F000
|
stack
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
38EF000
|
stack
|
page read and write
|
||
B7E000
|
unkown
|
page execute and read and write
|
||
1254000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
8D8000
|
unkown
|
page execute and read and write
|
||
1254000
|
heap
|
page read and write
|
||
1D6DE000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
B86000
|
unkown
|
page execute and read and write
|
||
6D7000
|
unkown
|
page execute and read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
4BAF000
|
stack
|
page read and write
|
||
1D12F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
1D4FC000
|
stack
|
page read and write
|
||
47EF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
1D7E0000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
150F000
|
stack
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
139B000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
D37000
|
unkown
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
2F2B000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
DCC000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
1254000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
492F000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
1D2BE000
|
stack
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
51B0000
|
heap
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1CEEE000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
8EA000
|
unkown
|
page write copy
|
||
1254000
|
heap
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
8EA000
|
unkown
|
page read and write
|
||
41ED000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5086000
|
direct allocation
|
page read and write
|
||
496E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1CFEF000
|
stack
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
12DE000
|
stack
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
There are 229 hidden memdumps, click here to show them.