Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/d9
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpft
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206/H
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpR
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php&
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpF
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpv9
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
E41000
|
unkown
|
page execute and read and write
|
||
5490000
|
direct allocation
|
page read and write
|
||
16AE000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
338B000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
488F000
|
stack
|
page read and write
|
||
5110000
|
trusted library allocation
|
page read and write
|
||
1A6E000
|
stack
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
132F000
|
unkown
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
3360000
|
direct allocation
|
page execute and read and write
|
||
E41000
|
unkown
|
page execute and write copy
|
||
108C000
|
unkown
|
page execute and read and write
|
||
108A000
|
unkown
|
page write copy
|
||
5011000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
14E3000
|
unkown
|
page execute and write copy
|
||
5011000
|
heap
|
page read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
44CF000
|
stack
|
page read and write
|
||
ECE000
|
unkown
|
page execute and read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
1D8FE000
|
stack
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
48CE000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
1DA3C000
|
stack
|
page read and write
|
||
4D8F000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
43CE000
|
stack
|
page read and write
|
||
1222000
|
unkown
|
page execute and read and write
|
||
1DADE000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
EEF000
|
unkown
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
1328000
|
unkown
|
page execute and read and write
|
||
B54000
|
heap
|
page read and write
|
||
49CF000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
E40000
|
unkown
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
108A000
|
unkown
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
474F000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
14E2000
|
unkown
|
page execute and read and write
|
||
B1C000
|
stack
|
page read and write
|
||
1D6BE000
|
stack
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
500F000
|
stack
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
15E5000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
1D56E000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
16F3000
|
heap
|
page read and write
|
||
1D3EF000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
16AA000
|
heap
|
page read and write
|
||
54CC000
|
stack
|
page read and write
|
||
3ECE000
|
stack
|
page read and write
|
||
55CF000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
54C6000
|
direct allocation
|
page read and write
|
||
3370000
|
direct allocation
|
page execute and read and write
|
||
5470000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
16F5000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
133F000
|
unkown
|
page execute and write copy
|
||
5011000
|
heap
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
5026000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
55F0000
|
direct allocation
|
page execute and read and write
|
||
3387000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
16A0000
|
heap
|
page read and write
|
||
1D52F000
|
stack
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
1078000
|
unkown
|
page execute and read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
4B0F000
|
stack
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
15EE000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
1D2EE000
|
stack
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
ED6000
|
unkown
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
4C4F000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
133E000
|
unkown
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
E77000
|
unkown
|
page execute and read and write
|
||
B54000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1D66F000
|
stack
|
page read and write
|
||
334B000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
3ACF000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
12FF000
|
unkown
|
page execute and read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
133E000
|
unkown
|
page execute and write copy
|
||
B54000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
166E000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
1D93D000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
196E000
|
stack
|
page read and write
|
||
1D7FE000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
162E000
|
stack
|
page read and write
|
||
360E000
|
stack
|
page read and write
|
||
1726000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
E40000
|
unkown
|
page readonly
|
||
1DBE0000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1DBDF000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
1D7BF000
|
stack
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
1D42E000
|
stack
|
page read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
1708000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
438F000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
460F000
|
stack
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
55D0000
|
direct allocation
|
page execute and read and write
|
||
464E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
There are 228 hidden memdumps, click here to show them.