Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpw
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpH
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phptop
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
E31000
|
unkown
|
page execute and read and write
|
||
5080000
|
direct allocation
|
page read and write
|
||
D0E000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
D0A000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
51BF000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
3020000
|
direct allocation
|
page execute and read and write
|
||
4C01000
|
heap
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
BA0000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
1068000
|
unkown
|
page execute and read and write
|
||
3030000
|
heap
|
page read and write
|
||
D67000
|
heap
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
107A000
|
unkown
|
page write copy
|
||
B3E000
|
stack
|
page read and write
|
||
4BFF000
|
stack
|
page read and write
|
||
B9E000
|
stack
|
page read and write
|
||
107C000
|
unkown
|
page execute and read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
303B000
|
heap
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
1D4EC000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
1D7C0000
|
heap
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
50B6000
|
direct allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
E67000
|
unkown
|
page execute and read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
130C000
|
unkown
|
page execute and read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
D55000
|
heap
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
4C00000
|
heap
|
page read and write
|
||
107A000
|
unkown
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
71C000
|
stack
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
15BF000
|
stack
|
page read and write
|
||
EBE000
|
unkown
|
page execute and read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
131B000
|
unkown
|
page execute and read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
423D000
|
stack
|
page read and write
|
||
1D3AF000
|
stack
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
4C20000
|
heap
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
1D6BE000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
16BE000
|
stack
|
page read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
1D52E000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
497F000
|
stack
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
EDF000
|
unkown
|
page execute and read and write
|
||
4C01000
|
heap
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
1D16E000
|
stack
|
page read and write
|
||
AF5000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
1D2AE000
|
stack
|
page read and write
|
||
50BB000
|
stack
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
1D02E000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
E30000
|
unkown
|
page read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
1303000
|
unkown
|
page execute and read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
3F7F000
|
stack
|
page read and write
|
||
1D62E000
|
stack
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
E31000
|
unkown
|
page execute and write copy
|
||
1D3EE000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
1CEEE000
|
stack
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
14B3000
|
unkown
|
page execute and read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
4C01000
|
heap
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
CCC000
|
stack
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
1D12F000
|
stack
|
page read and write
|
||
D83000
|
heap
|
page read and write
|
||
1D26F000
|
stack
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
5200000
|
direct allocation
|
page execute and read and write
|
||
AFE000
|
stack
|
page read and write
|
||
1D7BE000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
487E000
|
stack
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
1204000
|
unkown
|
page execute and read and write
|
||
131C000
|
unkown
|
page execute and write copy
|
||
EC6000
|
unkown
|
page execute and read and write
|
||
4C01000
|
heap
|
page read and write
|
||
49BE000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
12DA000
|
unkown
|
page execute and read and write
|
||
4ABF000
|
stack
|
page read and write
|
||
14B4000
|
unkown
|
page execute and write copy
|
||
301E000
|
stack
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
131B000
|
unkown
|
page execute and write copy
|
||
3037000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
1CFEE000
|
stack
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C16000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
There are 199 hidden memdumps, click here to show them.