Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://curl.se/docs/hsts.html
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
https://curl.se/docs/alt-svc.html#
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW173201934735a1
|
unknown
|
||
https://curl.se/docs/http-cookies.html
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347libgcc_s_dw2-1.dll__register_frame_info__der
|
unknown
|
||
https://curl.se/docs/hsts.html#
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW17
|
unknown
|
||
https://curl.se/docs/http-cookies.html#
|
unknown
|
||
https://curl.se/docs/alt-svc.html
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
http://.css
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/test
|
unknown
|
||
http://.jpg
|
unknown
|
There are 5 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3D30000
|
direct allocation
|
page read and write
|
||
5E2E000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
626E000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
7980000
|
direct allocation
|
page execute and read and write
|
||
7930000
|
direct allocation
|
page execute and read and write
|
||
6FEF000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
79D0000
|
direct allocation
|
page execute and read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
1A2B000
|
unkown
|
page execute and read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
7231000
|
heap
|
page read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
1A44000
|
unkown
|
page execute and read and write
|
||
5BAF000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
1E40000
|
heap
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
7231000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
FC1000
|
unkown
|
page execute and write copy
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
F44000
|
heap
|
page read and write
|
||
602F000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
F50000
|
heap
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
16CC000
|
unkown
|
page execute and read and write
|
||
7231000
|
heap
|
page read and write
|
||
52AF000
|
stack
|
page read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
6DEE000
|
stack
|
page read and write
|
||
672E000
|
stack
|
page read and write
|
||
66EF000
|
stack
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
4E2F000
|
stack
|
page read and write
|
||
59AE000
|
stack
|
page read and write
|
||
7DBB000
|
direct allocation
|
page read and write
|
||
1A44000
|
unkown
|
page execute and write copy
|
||
7990000
|
direct allocation
|
page execute and read and write
|
||
7231000
|
heap
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
1573000
|
unkown
|
page execute and read and write
|
||
596F000
|
stack
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
606E000
|
stack
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
1A45000
|
unkown
|
page execute and write copy
|
||
4C2E000
|
stack
|
page read and write
|
||
1951000
|
unkown
|
page execute and read and write
|
||
7970000
|
direct allocation
|
page execute and read and write
|
||
184F000
|
unkown
|
page execute and read and write
|
||
576E000
|
stack
|
page read and write
|
||
79E0000
|
direct allocation
|
page execute and read and write
|
||
7231000
|
heap
|
page read and write
|
||
3D67000
|
heap
|
page read and write
|
||
722F000
|
stack
|
page read and write
|
||
FC1000
|
unkown
|
page execute and read and write
|
||
7330000
|
trusted library allocation
|
page read and write
|
||
79C0000
|
direct allocation
|
page execute and read and write
|
||
572F000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
792E000
|
stack
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
7231000
|
heap
|
page read and write
|
||
54EF000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
7231000
|
heap
|
page read and write
|
||
1BEC000
|
unkown
|
page execute and read and write
|
||
6BAE000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
692F000
|
stack
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
264F000
|
stack
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
62AE000
|
stack
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
78F0000
|
direct allocation
|
page execute and read and write
|
||
7231000
|
heap
|
page read and write
|
||
244E000
|
stack
|
page read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
EED000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
3D60000
|
heap
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
F44000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
506F000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
1EA1000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
7230000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
64AF000
|
stack
|
page read and write
|
||
220F000
|
stack
|
page read and write
|
||
78EF000
|
stack
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
FC0000
|
unkown
|
page readonly
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
7DB9000
|
direct allocation
|
page read and write
|
||
696E000
|
stack
|
page read and write
|
||
16D1000
|
unkown
|
page execute and read and write
|
||
7231000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
7670000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
76EC000
|
stack
|
page read and write
|
||
3D50000
|
direct allocation
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
6B6F000
|
stack
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
F44000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
1E4A000
|
heap
|
page read and write
|
||
7BEF000
|
stack
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
6DAF000
|
stack
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
7900000
|
direct allocation
|
page execute and read and write
|
||
7231000
|
heap
|
page read and write
|
||
3D50000
|
direct allocation
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
3C6C000
|
stack
|
page read and write
|
||
5BEE000
|
stack
|
page read and write
|
||
64EE000
|
stack
|
page read and write
|
||
1A37000
|
unkown
|
page execute and read and write
|
||
7231000
|
heap
|
page read and write
|
||
7950000
|
direct allocation
|
page execute and read and write
|
||
7940000
|
direct allocation
|
page execute and read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
1E4E000
|
heap
|
page read and write
|
||
1E3E000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
79B0000
|
direct allocation
|
page execute and read and write
|
||
7231000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
7960000
|
direct allocation
|
page execute and read and write
|
||
FC0000
|
unkown
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
76B0000
|
direct allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
16CA000
|
unkown
|
page execute and read and write
|
||
7231000
|
heap
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
49AF000
|
stack
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
7C62000
|
direct allocation
|
page read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
7920000
|
direct allocation
|
page execute and read and write
|
||
7231000
|
heap
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
5DEF000
|
stack
|
page read and write
|
||
CEC000
|
stack
|
page read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
1958000
|
unkown
|
page execute and read and write
|
||
7231000
|
heap
|
page read and write
|
||
79A0000
|
direct allocation
|
page execute and read and write
|
||
F44000
|
heap
|
page read and write
|
There are 204 hidden memdumps, click here to show them.