Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://property-imper.sbs/apit
|
unknown
|
||
https://property-imper.sbs/apivRx
|
unknown
|
||
https://property-imper.sbs:443/api
|
unknown
|
||
https://property-imper.sbs/apis0
|
unknown
|
||
https://property-imper.sbs/
|
unknown
|
||
https://property-imper.sbs/api
|
104.21.33.116
|
||
https://property-imper.sbs/Y
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
104.21.33.116
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.33.116
|
property-imper.sbs
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4FF1000
|
heap
|
page read and write
|
||
5630000
|
direct allocation
|
page execute and read and write
|
||
371E000
|
stack
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
574E000
|
stack
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
547D000
|
stack
|
page read and write
|
||
471F000
|
stack
|
page read and write
|
||
4E9F000
|
stack
|
page read and write
|
||
40DF000
|
stack
|
page read and write
|
||
36DF000
|
stack
|
page read and write
|
||
3C1E000
|
stack
|
page read and write
|
||
CF7000
|
unkown
|
page write copy
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
1735000
|
heap
|
page read and write
|
||
FA0000
|
unkown
|
page execute and write copy
|
||
1731000
|
heap
|
page read and write
|
||
16D8000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
16A9000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4C1F000
|
stack
|
page read and write
|
||
55CF000
|
stack
|
page read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
172E000
|
heap
|
page read and write
|
||
449F000
|
stack
|
page read and write
|
||
193F000
|
stack
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
CF7000
|
unkown
|
page read and write
|
||
3FDE000
|
stack
|
page read and write
|
||
5DC0000
|
heap
|
page read and write
|
||
11DB000
|
stack
|
page read and write
|
||
167A000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
425E000
|
stack
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
16CC000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
16DA000
|
heap
|
page read and write
|
||
5D9E000
|
stack
|
page read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
1141000
|
unkown
|
page execute and read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
16C3000
|
heap
|
page read and write
|
||
14FB000
|
stack
|
page read and write
|
||
CA1000
|
unkown
|
page execute and write copy
|
||
15BE000
|
stack
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
4FF2000
|
heap
|
page read and write
|
||
5E1E000
|
stack
|
page read and write
|
||
16C3000
|
heap
|
page read and write
|
||
16A9000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
3BDF000
|
stack
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
4ADF000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
33D7000
|
heap
|
page read and write
|
||
4FDF000
|
stack
|
page read and write
|
||
45DF000
|
stack
|
page read and write
|
||
399E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
1142000
|
unkown
|
page execute and write copy
|
||
584D000
|
stack
|
page read and write
|
||
499F000
|
stack
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
15D5000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
33DC000
|
heap
|
page read and write
|
||
3F9F000
|
stack
|
page read and write
|
||
1735000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
385E000
|
stack
|
page read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
49DE000
|
stack
|
page read and write
|
||
54D4000
|
direct allocation
|
page read and write
|
||
5490000
|
direct allocation
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
3ADE000
|
stack
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
3D5E000
|
stack
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
5AF0000
|
remote allocation
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
CA1000
|
unkown
|
page execute and read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
598F000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
411E000
|
stack
|
page read and write
|
||
435F000
|
stack
|
page read and write
|
||
461E000
|
stack
|
page read and write
|
||
5C9E000
|
stack
|
page read and write
|
||
421F000
|
stack
|
page read and write
|
||
4D5F000
|
stack
|
page read and write
|
||
59CE000
|
stack
|
page read and write
|
||
5620000
|
direct allocation
|
page execute and read and write
|
||
5AF0000
|
remote allocation
|
page read and write
|
||
1735000
|
heap
|
page read and write
|
||
16D8000
|
heap
|
page read and write
|
||
1745000
|
heap
|
page read and write
|
||
55F0000
|
direct allocation
|
page execute and read and write
|
||
CF9000
|
unkown
|
page execute and read and write
|
||
5ACF000
|
stack
|
page read and write
|
||
588E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
3E9E000
|
stack
|
page read and write
|
||
331B000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
16CC000
|
heap
|
page read and write
|
||
16B6000
|
heap
|
page read and write
|
||
381F000
|
stack
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
F63000
|
unkown
|
page execute and read and write
|
||
5C5F000
|
stack
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
1745000
|
heap
|
page read and write
|
||
5655000
|
trusted library allocation
|
page read and write
|
||
F8A000
|
unkown
|
page execute and read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
4C5E000
|
stack
|
page read and write
|
||
161E000
|
stack
|
page read and write
|
||
395F000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
5B5E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
16DB000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
561D000
|
stack
|
page read and write
|
||
3E5F000
|
stack
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
E83000
|
unkown
|
page execute and read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
489E000
|
stack
|
page read and write
|
||
34DF000
|
stack
|
page read and write
|
||
3D1F000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
16B6000
|
heap
|
page read and write
|
||
166E000
|
stack
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
167E000
|
heap
|
page read and write
|
||
4EDE000
|
stack
|
page read and write
|
||
FA0000
|
unkown
|
page execute and read and write
|
||
5640000
|
direct allocation
|
page execute and read and write
|
||
F91000
|
unkown
|
page execute and read and write
|
||
1A3E000
|
stack
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
CE5000
|
unkown
|
page execute and read and write
|
||
5F1F000
|
stack
|
page read and write
|
||
CA0000
|
unkown
|
page read and write
|
||
5AF0000
|
remote allocation
|
page read and write
|
||
FA1000
|
unkown
|
page execute and write copy
|
||
3A9F000
|
stack
|
page read and write
|
||
173F000
|
heap
|
page read and write
|
||
54CB000
|
stack
|
page read and write
|
There are 176 hidden memdumps, click here to show them.