Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://cook-rain.sbs/
|
unknown
|
||
p10tgrace.sbs
|
|||
p3ar11fter.sbs
|
|||
https://cook-rain.sbs/api
|
104.21.66.38
|
||
https://cook-rain.sbs/api-
|
unknown
|
||
https://cook-rain.sbs/apiIO
|
unknown
|
||
peepburry828.sbs
|
|||
processhol.sbs
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cook-rain.sbs
|
104.21.66.38
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.66.38
|
cook-rain.sbs
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
351000
|
unkown
|
page execute and read and write
|
||
E94000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
60B000
|
unkown
|
page execute and read and write
|
||
585E000
|
stack
|
page read and write
|
||
350000
|
unkown
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
1062000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
350000
|
unkown
|
page readonly
|
||
10BE000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
52CE000
|
stack
|
page read and write
|
||
73CF0000
|
unkown
|
page readonly
|
||
105F000
|
heap
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
567E000
|
stack
|
page read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
7EE000
|
unkown
|
page execute and write copy
|
||
47AE000
|
stack
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
73D06000
|
unkown
|
page readonly
|
||
48B1000
|
heap
|
page read and write
|
||
64F000
|
unkown
|
page execute and write copy
|
||
39AF000
|
stack
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
FD1000
|
heap
|
page read and write
|
||
596E000
|
stack
|
page read and write
|
||
4D50000
|
direct allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
64E000
|
unkown
|
page execute and write copy
|
||
11BE000
|
stack
|
page read and write
|
||
518E000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
500D000
|
stack
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
53D0000
|
remote allocation
|
page read and write
|
||
ABB000
|
stack
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
1049000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
57EF000
|
stack
|
page read and write
|
||
64E000
|
unkown
|
page execute and read and write
|
||
BBB000
|
stack
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
2BDF000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
4D94000
|
direct allocation
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
56EE000
|
stack
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
53CE000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
11FE000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
73D0F000
|
unkown
|
page readonly
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
5860000
|
heap
|
page read and write
|
||
2BED000
|
heap
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
553F000
|
stack
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
FBF000
|
heap
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
351000
|
unkown
|
page execute and write copy
|
||
3A7000
|
unkown
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
49B0000
|
trusted library allocation
|
page read and write
|
||
4E8F000
|
stack
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
1053000
|
heap
|
page read and write
|
||
528F000
|
stack
|
page read and write
|
||
395000
|
unkown
|
page execute and read and write
|
||
504E000
|
stack
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
4D40000
|
direct allocation
|
page read and write
|
||
4F17000
|
trusted library allocation
|
page read and write
|
||
1002000
|
heap
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
1061000
|
heap
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
53D0000
|
remote allocation
|
page read and write
|
||
4D40000
|
direct allocation
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
53D0000
|
remote allocation
|
page read and write
|
||
638000
|
unkown
|
page execute and read and write
|
||
34AF000
|
stack
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
F8A000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
73D0D000
|
unkown
|
page read and write
|
||
3A9000
|
unkown
|
page execute and read and write
|
||
1046000
|
heap
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
4D40000
|
direct allocation
|
page read and write
|
||
FF3000
|
heap
|
page read and write
|
||
73CF1000
|
unkown
|
page execute read
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
42AE000
|
stack
|
page read and write
|
||
52C000
|
unkown
|
page execute and read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
7ED000
|
unkown
|
page execute and read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B0000
|
heap
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
F8E000
|
heap
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
4EDD000
|
stack
|
page read and write
|
||
514D000
|
stack
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
FC8000
|
heap
|
page read and write
|
||
1045000
|
heap
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
2BE7000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
E94000
|
heap
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
FB7000
|
heap
|
page read and write
|
||
63F000
|
unkown
|
page execute and read and write
|
||
3A7000
|
unkown
|
page write copy
|
||
3C2F000
|
stack
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
105A000
|
heap
|
page read and write
|
||
1053000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
4D8C000
|
stack
|
page read and write
|
||
2C2C000
|
stack
|
page read and write
|
There are 192 hidden memdumps, click here to show them.