Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
dare-curbys.biz
|
|||
impend-differ.biz
|
|||
zinc-sneark.biz
|
|||
covery-mover.biz
|
|||
formy-spill.biz
|
|||
atten-supporse.biz
|
|||
https://atten-supporse.biz/api
|
104.21.64.1
|
||
https://atten-supporse.biz:443/api
|
unknown
|
||
https://atten-supporse.biz/apir
|
unknown
|
||
se-blurry.biz
|
|||
https://atten-supporse.biz/
|
unknown
|
||
print-vexer.biz
|
|||
dwell-exclaim.biz
|
There are 3 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
atten-supporse.biz
|
104.21.64.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.64.1
|
atten-supporse.biz
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
F91000
|
unkown
|
page execute and read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4AB1000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
DBE000
|
stack
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
589E000
|
stack
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
141B000
|
unkown
|
page execute and read and write
|
||
485E000
|
stack
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
AFB000
|
stack
|
page read and write
|
||
4F10000
|
remote allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
C0B000
|
heap
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
50DA000
|
trusted library allocation
|
page read and write
|
||
C1D000
|
heap
|
page read and write
|
||
1166000
|
unkown
|
page execute and read and write
|
||
40DE000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
2DFC000
|
stack
|
page read and write
|
||
F90000
|
unkown
|
page readonly
|
||
1245000
|
unkown
|
page execute and read and write
|
||
C0F000
|
heap
|
page read and write
|
||
558F000
|
stack
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
F90000
|
unkown
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
572D000
|
stack
|
page read and write
|
||
BB3000
|
heap
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
37DF000
|
stack
|
page read and write
|
||
C1A000
|
heap
|
page read and write
|
||
BB6000
|
heap
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
B92000
|
heap
|
page read and write
|
||
C1E000
|
heap
|
page read and write
|
||
5910000
|
heap
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
509D000
|
stack
|
page read and write
|
||
B92000
|
heap
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
409F000
|
stack
|
page read and write
|
||
BB3000
|
heap
|
page read and write
|
||
495F000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
5A1F000
|
stack
|
page read and write
|
||
4F61000
|
direct allocation
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
FE5000
|
unkown
|
page execute and read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
B87000
|
heap
|
page read and write
|
||
3F9E000
|
stack
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
B5A000
|
heap
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
C0F000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
C54000
|
heap
|
page read and write
|
||
B87000
|
heap
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
530D000
|
stack
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
2E5D000
|
heap
|
page read and write
|
||
C1D000
|
heap
|
page read and write
|
||
4F10000
|
remote allocation
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
1283000
|
unkown
|
page execute and write copy
|
||
F91000
|
unkown
|
page execute and write copy
|
||
F70000
|
direct allocation
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
C1D000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
56EF000
|
stack
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
C24000
|
heap
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
534D000
|
stack
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
C0F000
|
heap
|
page read and write
|
||
505F000
|
stack
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
C1D000
|
heap
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
3CDF000
|
stack
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
520D000
|
stack
|
page read and write
|
||
C27000
|
heap
|
page read and write
|
||
548E000
|
stack
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
B83000
|
heap
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
3A5F000
|
stack
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
1274000
|
unkown
|
page execute and read and write
|
||
FE3000
|
unkown
|
page write copy
|
||
C54000
|
heap
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
51CD000
|
stack
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
2E57000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
2E40000
|
direct allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
BB7000
|
heap
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
C23000
|
heap
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
7FB000
|
stack
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
4F5B000
|
stack
|
page read and write
|
||
1282000
|
unkown
|
page execute and read and write
|
||
4EE0000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
459F000
|
stack
|
page read and write
|
||
41DF000
|
stack
|
page read and write
|
||
FD2000
|
unkown
|
page execute and read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
2E40000
|
direct allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
126B000
|
unkown
|
page execute and read and write
|
||
319F000
|
stack
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
481F000
|
stack
|
page read and write
|
||
3BDE000
|
stack
|
page read and write
|
||
3E1F000
|
stack
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
B5E000
|
heap
|
page read and write
|
||
445F000
|
stack
|
page read and write
|
||
3F5F000
|
stack
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
141C000
|
unkown
|
page execute and write copy
|
||
4AA0000
|
heap
|
page read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
46DF000
|
stack
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
4F10000
|
remote allocation
|
page read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
1282000
|
unkown
|
page execute and write copy
|
||
4AA1000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
C26000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
FE3000
|
unkown
|
page write copy
|
||
C54000
|
heap
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
151E000
|
stack
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
There are 190 hidden memdumps, click here to show them.