Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.phpi
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/L
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php$XV
|
unknown
|
||
http://185.215.113.206/u
|
unknown
|
||
185.215.113.206/c4becf79229cb002.php
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1B7E000
|
heap
|
page read and write
|
||
FB1000
|
unkown
|
page execute and read and write
|
||
5750000
|
direct allocation
|
page read and write
|
||
588F000
|
stack
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
FE7000
|
unkown
|
page execute and read and write
|
||
4A0F000
|
stack
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
1B40000
|
direct allocation
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
103E000
|
unkown
|
page execute and read and write
|
||
1D82E000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1BF6000
|
heap
|
page read and write
|
||
11FA000
|
unkown
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
5786000
|
direct allocation
|
page read and write
|
||
1D7EF000
|
stack
|
page read and write
|
||
428F000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1AFE000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1B70000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
175E000
|
stack
|
page read and write
|
||
518F000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1D6EE000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
FB0000
|
unkown
|
page readonly
|
||
1B40000
|
direct allocation
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
52D0000
|
heap
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
17EE000
|
stack
|
page read and write
|
||
4F0F000
|
stack
|
page read and write
|
||
58D0000
|
direct allocation
|
page execute and read and write
|
||
52D1000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1D6AF000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
E0C000
|
stack
|
page read and write
|
||
105F000
|
unkown
|
page execute and read and write
|
||
52CF000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1710000
|
heap
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
3570000
|
direct allocation
|
page execute and read and write
|
||
1495000
|
unkown
|
page execute and read and write
|
||
43CF000
|
stack
|
page read and write
|
||
1B60000
|
direct allocation
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1B60000
|
direct allocation
|
page read and write
|
||
11FA000
|
unkown
|
page write copy
|
||
1495000
|
unkown
|
page execute and write copy
|
||
1BD7000
|
heap
|
page read and write
|
||
1B40000
|
direct allocation
|
page read and write
|
||
1B40000
|
direct allocation
|
page read and write
|
||
1488000
|
unkown
|
page execute and read and write
|
||
1B40000
|
direct allocation
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
58A0000
|
direct allocation
|
page execute and read and write
|
||
1714000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
3C8E000
|
stack
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
1D5AE000
|
stack
|
page read and write
|
||
440E000
|
stack
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1D92F000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
FB1000
|
unkown
|
page execute and write copy
|
||
1714000
|
heap
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
3587000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
F05000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
11FC000
|
unkown
|
page execute and read and write
|
||
1714000
|
heap
|
page read and write
|
||
11E8000
|
unkown
|
page execute and read and write
|
||
490E000
|
stack
|
page read and write
|
||
1B40000
|
direct allocation
|
page read and write
|
||
3ECF000
|
stack
|
page read and write
|
||
1B40000
|
direct allocation
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
58A0000
|
direct allocation
|
page execute and read and write
|
||
58C0000
|
direct allocation
|
page execute and read and write
|
||
1B40000
|
direct allocation
|
page read and write
|
||
162C000
|
unkown
|
page execute and read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
4DCF000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1DCFE000
|
stack
|
page read and write
|
||
1D6E000
|
stack
|
page read and write
|
||
162D000
|
unkown
|
page execute and write copy
|
||
388F000
|
stack
|
page read and write
|
||
5890000
|
direct allocation
|
page execute and read and write
|
||
1714000
|
heap
|
page read and write
|
||
1BF3000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
3560000
|
direct allocation
|
page execute and read and write
|
||
450F000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
504F000
|
stack
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
478F000
|
stack
|
page read and write
|
||
1B40000
|
direct allocation
|
page read and write
|
||
179E000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1B40000
|
direct allocation
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1DBFD000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
3B0F000
|
stack
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
F0E000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
52D5000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1BC0000
|
heap
|
page read and write
|
||
4C8F000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1380000
|
unkown
|
page execute and read and write
|
||
1456000
|
unkown
|
page execute and read and write
|
||
52D1000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
1046000
|
unkown
|
page execute and read and write
|
||
464F000
|
stack
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
39CF000
|
stack
|
page read and write
|
||
1B40000
|
direct allocation
|
page read and write
|
||
3580000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
58B0000
|
direct allocation
|
page execute and read and write
|
||
1DABD000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
52E0000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1B40000
|
direct allocation
|
page read and write
|
||
147E000
|
unkown
|
page execute and read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
FB0000
|
unkown
|
page read and write
|
||
1B40000
|
direct allocation
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
1DA6F000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1496000
|
unkown
|
page execute and write copy
|
||
52D1000
|
heap
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
48CF000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
3C4F000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
5730000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
418E000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
1DBBC000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1D96E000
|
stack
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1B40000
|
direct allocation
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
3D8F000
|
stack
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1B78000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1B3C000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
358B000
|
heap
|
page read and write
|
||
1B60000
|
direct allocation
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
There are 223 hidden memdumps, click here to show them.