Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://property-imper.sbs/api6
|
unknown
|
||
https://property-imper.sbs/
|
unknown
|
||
https://property-imper.sbs/api
|
104.21.33.116
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
104.21.33.116
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.33.116
|
property-imper.sbs
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
48C1000
|
heap
|
page read and write
|
||
117E000
|
heap
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
1101000
|
heap
|
page read and write
|
||
83F000
|
unkown
|
page execute and read and write
|
||
387F000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
F70000
|
heap
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
4D50000
|
direct allocation
|
page read and write
|
||
4D50000
|
direct allocation
|
page read and write
|
||
10A0000
|
direct allocation
|
page read and write
|
||
87C000
|
unkown
|
page execute and read and write
|
||
10F5000
|
heap
|
page read and write
|
||
2C0B000
|
stack
|
page read and write
|
||
581000
|
unkown
|
page execute and write copy
|
||
2FBF000
|
stack
|
page read and write
|
||
580000
|
unkown
|
page read and write
|
||
463F000
|
stack
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
10F5000
|
heap
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
1101000
|
heap
|
page read and write
|
||
542E000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
1181000
|
heap
|
page read and write
|
||
73C8F000
|
unkown
|
page readonly
|
||
116F000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
1117000
|
heap
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
4D50000
|
direct allocation
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
581000
|
unkown
|
page execute and read and write
|
||
48C1000
|
heap
|
page read and write
|
||
2D3F000
|
stack
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
1186000
|
heap
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
10A0000
|
direct allocation
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
10E7000
|
heap
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
73C8D000
|
unkown
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
73C86000
|
unkown
|
page readonly
|
||
10A0000
|
direct allocation
|
page read and write
|
||
87D000
|
unkown
|
page execute and write copy
|
||
580000
|
unkown
|
page readonly
|
||
467E000
|
stack
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
75E000
|
unkown
|
page execute and read and write
|
||
48C1000
|
heap
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
direct allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
2C37000
|
heap
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
10F7000
|
heap
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
53C0000
|
remote allocation
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
86D000
|
unkown
|
page execute and read and write
|
||
313E000
|
stack
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
10A0000
|
direct allocation
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
10A0000
|
direct allocation
|
page read and write
|
||
73C71000
|
unkown
|
page execute read
|
||
511D000
|
stack
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
56F0000
|
heap
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
10A0000
|
direct allocation
|
page read and write
|
||
10A0000
|
direct allocation
|
page read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
4D4D000
|
stack
|
page read and write
|
||
10A0000
|
direct allocation
|
page read and write
|
||
552F000
|
stack
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
EF0000
|
heap
|
page read and write
|
||
1119000
|
heap
|
page read and write
|
||
53C0000
|
remote allocation
|
page read and write
|
||
10A0000
|
direct allocation
|
page read and write
|
||
10A0000
|
direct allocation
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
4D9B000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
5D7000
|
unkown
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
39FE000
|
stack
|
page read and write
|
||
117E000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
595F000
|
stack
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
10F7000
|
heap
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
1189000
|
heap
|
page read and write
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
10A0000
|
direct allocation
|
page read and write
|
||
BAB000
|
stack
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
10BE000
|
heap
|
page read and write
|
||
5D9000
|
unkown
|
page execute and read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
AAB000
|
stack
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
A17000
|
unkown
|
page execute and read and write
|
||
47BE000
|
stack
|
page read and write
|
||
4D94000
|
direct allocation
|
page read and write
|
||
4D50000
|
direct allocation
|
page read and write
|
||
5D7000
|
unkown
|
page write copy
|
||
48C1000
|
heap
|
page read and write
|
||
10EF000
|
heap
|
page read and write
|
||
4E9F000
|
stack
|
page read and write
|
||
10A0000
|
direct allocation
|
page read and write
|
||
525F000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
116D000
|
heap
|
page read and write
|
||
111A000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
1117000
|
heap
|
page read and write
|
||
10E3000
|
heap
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
42BE000
|
stack
|
page read and write
|
||
117A000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
A18000
|
unkown
|
page execute and write copy
|
||
48C1000
|
heap
|
page read and write
|
||
107F000
|
stack
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
87C000
|
unkown
|
page execute and write copy
|
||
53C0000
|
remote allocation
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
501C000
|
stack
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
10EF000
|
heap
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
48BF000
|
stack
|
page read and write
|
||
10A0000
|
direct allocation
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
5C5000
|
unkown
|
page execute and read and write
|
||
323F000
|
stack
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
4EED000
|
stack
|
page read and write
|
||
12EF000
|
stack
|
page read and write
|
||
585E000
|
stack
|
page read and write
|
||
117E000
|
heap
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
10BA000
|
heap
|
page read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
73C70000
|
unkown
|
page readonly
|
||
867000
|
unkown
|
page execute and read and write
|
||
117E000
|
heap
|
page read and write
|
||
4F2D000
|
trusted library allocation
|
page read and write
|
||
10E7000
|
heap
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
2C3D000
|
heap
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
57FF000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
539F000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
There are 189 hidden memdumps, click here to show them.