Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://tail-cease.cyou/api
|
104.21.93.105
|
||
https://tail-cease.cyou/
|
unknown
|
||
https://tail-cease.cyou:443/apia/
|
unknown
|
||
https://tail-cease.cyou/d
|
unknown
|
||
https://tail-cease.cyou/b
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
tail-cease.cyou
|
104.21.93.105
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.93.105
|
tail-cease.cyou
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B20000
|
direct allocation
|
page read and write
|
||
B98000
|
heap
|
page read and write
|
||
436000
|
unkown
|
page execute and read and write
|
||
43B1000
|
heap
|
page read and write
|
||
8FB000
|
stack
|
page read and write
|
||
4A04000
|
trusted library allocation
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
32F000
|
unkown
|
page execute and read and write
|
||
52E0000
|
heap
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
BFA000
|
heap
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
27A7000
|
heap
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
BB7000
|
heap
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
43B0000
|
heap
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
4EA0000
|
remote allocation
|
page read and write
|
||
49D0000
|
direct allocation
|
page execute and read and write
|
||
BB7000
|
heap
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
27AD000
|
heap
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
44D000
|
unkown
|
page execute and write copy
|
||
3B2E000
|
stack
|
page read and write
|
||
49C0000
|
direct allocation
|
page execute and read and write
|
||
BF4000
|
heap
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
B83000
|
heap
|
page read and write
|
||
43D000
|
unkown
|
page execute and read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
C02000
|
heap
|
page read and write
|
||
26CF000
|
stack
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
49C0000
|
direct allocation
|
page execute and read and write
|
||
500F000
|
stack
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
BFA000
|
heap
|
page read and write
|
||
49C0000
|
direct allocation
|
page execute and read and write
|
||
BED000
|
heap
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
487B000
|
stack
|
page read and write
|
||
2AEE000
|
stack
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
4840000
|
direct allocation
|
page read and write
|
||
52BF000
|
stack
|
page read and write
|
||
47F0000
|
trusted library allocation
|
page read and write
|
||
4D3F000
|
stack
|
page read and write
|
||
BEF000
|
heap
|
page read and write
|
||
274E000
|
stack
|
page read and write
|
||
CB000
|
stack
|
page read and write
|
||
482E000
|
stack
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
278E000
|
stack
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
BEF000
|
heap
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
BF2000
|
heap
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
BEF000
|
heap
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
4E7F000
|
stack
|
page read and write
|
||
B98000
|
heap
|
page read and write
|
||
44E000
|
unkown
|
page execute and write copy
|
||
44D000
|
unkown
|
page execute and read and write
|
||
40D000
|
unkown
|
page execute and read and write
|
||
B79000
|
heap
|
page read and write
|
||
49C0000
|
direct allocation
|
page execute and read and write
|
||
B00000
|
heap
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
5F4000
|
unkown
|
page execute and write copy
|
||
185000
|
unkown
|
page execute and read and write
|
||
49B0000
|
direct allocation
|
page execute and read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
4EA0000
|
remote allocation
|
page read and write
|
||
5F3000
|
unkown
|
page execute and read and write
|
||
B74000
|
heap
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
141000
|
unkown
|
page execute and write copy
|
||
51BE000
|
stack
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
B8C000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
2AAF000
|
stack
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
BF2000
|
heap
|
page read and write
|
||
E2E000
|
stack
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
B3A000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
270C000
|
stack
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
965000
|
heap
|
page read and write
|
||
B69000
|
heap
|
page read and write
|
||
BEA000
|
heap
|
page read and write
|
||
49A0000
|
direct allocation
|
page execute and read and write
|
||
D2F000
|
stack
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
29AF000
|
stack
|
page read and write
|
||
B3E000
|
heap
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
197000
|
unkown
|
page write copy
|
||
504E000
|
stack
|
page read and write
|
||
B8C000
|
heap
|
page read and write
|
||
497F000
|
stack
|
page read and write
|
||
BF2000
|
heap
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
BFF000
|
heap
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
4BFD000
|
stack
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
197000
|
unkown
|
page read and write
|
||
28AF000
|
stack
|
page read and write
|
||
49C0000
|
direct allocation
|
page execute and read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
199000
|
unkown
|
page execute and read and write
|
||
514E000
|
stack
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
B79000
|
heap
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
49CD000
|
stack
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
4884000
|
direct allocation
|
page read and write
|
||
BFA000
|
heap
|
page read and write
|
||
B69000
|
heap
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
141000
|
unkown
|
page execute and read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
4AFD000
|
stack
|
page read and write
|
||
BFA000
|
heap
|
page read and write
|
||
49C0000
|
direct allocation
|
page execute and read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
B83000
|
heap
|
page read and write
|
||
4EA0000
|
remote allocation
|
page read and write
|
There are 192 hidden memdumps, click here to show them.