Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.php:
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpz
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206d
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpE
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpv
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4A10000
|
direct allocation
|
page read and write
|
||
6C1000
|
unkown
|
page execute and read and write
|
||
EFE000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4B60000
|
direct allocation
|
page execute and read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4590000
|
heap
|
page read and write
|
||
4B9E000
|
stack
|
page read and write
|
||
90A000
|
unkown
|
page write copy
|
||
2C6F000
|
stack
|
page read and write
|
||
BB7000
|
unkown
|
page execute and read and write
|
||
BB7000
|
unkown
|
page execute and write copy
|
||
4571000
|
heap
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
2890000
|
direct allocation
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
2890000
|
direct allocation
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
4A00000
|
direct allocation
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
1CC4C000
|
stack
|
page read and write
|
||
1CD8E000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
1CEFE000
|
stack
|
page read and write
|
||
48D000
|
stack
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
F3A000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
2890000
|
direct allocation
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
2890000
|
direct allocation
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
76F000
|
unkown
|
page execute and read and write
|
||
AC000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
2890000
|
direct allocation
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
2890000
|
direct allocation
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
D5D000
|
unkown
|
page execute and read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
1C95F000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
1CA9F000
|
stack
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
BA9000
|
unkown
|
page execute and read and write
|
||
F45000
|
heap
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
8F8000
|
unkown
|
page execute and read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
F7E000
|
heap
|
page read and write
|
||
2890000
|
direct allocation
|
page read and write
|
||
BB8000
|
unkown
|
page execute and write copy
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
2890000
|
direct allocation
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
6F7000
|
unkown
|
page execute and read and write
|
||
442F000
|
stack
|
page read and write
|
||
4A00000
|
direct allocation
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
41AF000
|
stack
|
page read and write
|
||
D5E000
|
unkown
|
page execute and write copy
|
||
4571000
|
heap
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
28AB000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
1D160000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
392E000
|
stack
|
page read and write
|
||
1CFFF000
|
stack
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
28EB000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
6C0000
|
unkown
|
page read and write
|
||
2890000
|
direct allocation
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
4B90000
|
direct allocation
|
page execute and read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
4571000
|
heap
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
1A5000
|
stack
|
page read and write
|
||
EFA000
|
heap
|
page read and write
|
||
1C99E000
|
stack
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
1CE8E000
|
stack
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4A00000
|
direct allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
F8C000
|
heap
|
page read and write
|
||
90C000
|
unkown
|
page execute and read and write
|
||
74E000
|
unkown
|
page execute and read and write
|
||
4571000
|
heap
|
page read and write
|
||
1CD4B000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
28A7000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
38EF000
|
stack
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page execute and read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
2890000
|
direct allocation
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
2890000
|
direct allocation
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
2890000
|
direct allocation
|
page read and write
|
||
2A2E000
|
stack
|
page read and write
|
||
1AE000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
288F000
|
stack
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
1D05E000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
3F2F000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
4571000
|
heap
|
page read and write
|
||
756000
|
unkown
|
page execute and read and write
|
||
4571000
|
heap
|
page read and write
|
||
2890000
|
direct allocation
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
1D15F000
|
stack
|
page read and write
|
||
F79000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4570000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
6C1000
|
unkown
|
page execute and write copy
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
F4E000
|
heap
|
page read and write
|
||
B71000
|
unkown
|
page execute and read and write
|
||
4571000
|
heap
|
page read and write
|
||
4A46000
|
direct allocation
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4583000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
90A000
|
unkown
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4B90000
|
direct allocation
|
page execute and read and write
|
||
28A0000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
1CBDE000
|
stack
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
B9F000
|
unkown
|
page execute and read and write
|
||
2890000
|
direct allocation
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
49B0000
|
trusted library allocation
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
A90000
|
unkown
|
page execute and read and write
|
||
1CADE000
|
stack
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
There are 204 hidden memdumps, click here to show them.