Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://property-imper.sbs/apiS
|
unknown
|
||
https://property-imper.sbs/Q
|
unknown
|
||
https://property-imper.sbs/q
|
unknown
|
||
https://property-imper.sbs/
|
unknown
|
||
https://property-imper.sbs/api
|
172.67.162.84
|
||
http://crl.m8
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
172.67.162.84
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.162.84
|
property-imper.sbs
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
157B000
|
stack
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
5810000
|
direct allocation
|
page execute and read and write
|
||
5D4E000
|
stack
|
page read and write
|
||
12DD000
|
unkown
|
page execute and read and write
|
||
1AA0000
|
heap
|
page read and write
|
||
56B4000
|
direct allocation
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
12DD000
|
unkown
|
page execute and write copy
|
||
1AB0000
|
direct allocation
|
page read and write
|
||
1AB0000
|
direct allocation
|
page read and write
|
||
12D0000
|
unkown
|
page execute and read and write
|
||
1B08000
|
heap
|
page read and write
|
||
1AB0000
|
direct allocation
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
1B90000
|
heap
|
page read and write
|
||
147B000
|
unkown
|
page execute and read and write
|
||
1AB0000
|
direct allocation
|
page read and write
|
||
57D0000
|
direct allocation
|
page execute and read and write
|
||
1B22000
|
heap
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
4E2F000
|
stack
|
page read and write
|
||
1B8C000
|
heap
|
page read and write
|
||
46AF000
|
stack
|
page read and write
|
||
1AB0000
|
direct allocation
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
5F8E000
|
stack
|
page read and write
|
||
5670000
|
direct allocation
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
57E0000
|
direct allocation
|
page execute and read and write
|
||
51F1000
|
heap
|
page read and write
|
||
3F2F000
|
stack
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
5670000
|
direct allocation
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
1B94000
|
heap
|
page read and write
|
||
482E000
|
stack
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
496E000
|
stack
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
5670000
|
direct allocation
|
page read and write
|
||
1AB0000
|
direct allocation
|
page read and write
|
||
1B97000
|
heap
|
page read and write
|
||
5800000
|
direct allocation
|
page execute and read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
1AD0000
|
heap
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
1AB0000
|
direct allocation
|
page read and write
|
||
1A6B000
|
stack
|
page read and write
|
||
38EF000
|
stack
|
page read and write
|
||
60FF000
|
stack
|
page read and write
|
||
4D2E000
|
stack
|
page read and write
|
||
12DE000
|
unkown
|
page execute and write copy
|
||
1B9F000
|
heap
|
page read and write
|
||
1BA8000
|
heap
|
page read and write
|
||
5800000
|
direct allocation
|
page execute and read and write
|
||
1037000
|
unkown
|
page write copy
|
||
50EE000
|
stack
|
page read and write
|
||
6110000
|
heap
|
page read and write
|
||
1B14000
|
heap
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
15BE000
|
stack
|
page read and write
|
||
FE0000
|
unkown
|
page readonly
|
||
1BA7000
|
heap
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
11C3000
|
unkown
|
page execute and read and write
|
||
50AF000
|
stack
|
page read and write
|
||
1025000
|
unkown
|
page execute and read and write
|
||
492F000
|
stack
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
12C8000
|
unkown
|
page execute and read and write
|
||
1039000
|
unkown
|
page execute and read and write
|
||
1A70000
|
heap
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
5CE0000
|
remote allocation
|
page read and write
|
||
5820000
|
direct allocation
|
page execute and read and write
|
||
51F1000
|
heap
|
page read and write
|
||
5800000
|
direct allocation
|
page execute and read and write
|
||
129C000
|
unkown
|
page execute and read and write
|
||
19CE000
|
stack
|
page read and write
|
||
4BAF000
|
stack
|
page read and write
|
||
57F0000
|
direct allocation
|
page execute and read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
5E8D000
|
stack
|
page read and write
|
||
1AB0000
|
direct allocation
|
page read and write
|
||
1AB0000
|
direct allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
1B94000
|
heap
|
page read and write
|
||
1AAC000
|
heap
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
51EF000
|
stack
|
page read and write
|
||
47EF000
|
stack
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
1B97000
|
heap
|
page read and write
|
||
5BBE000
|
stack
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
57BF000
|
stack
|
page read and write
|
||
FE0000
|
unkown
|
page read and write
|
||
51F0000
|
heap
|
page read and write
|
||
1CCF000
|
stack
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
1A80000
|
heap
|
page read and write
|
||
1AB0000
|
direct allocation
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
593D000
|
stack
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
5CE0000
|
remote allocation
|
page read and write
|
||
1B11000
|
heap
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
4F6F000
|
stack
|
page read and write
|
||
5B7E000
|
stack
|
page read and write
|
||
1ADA000
|
heap
|
page read and write
|
||
5E4F000
|
stack
|
page read and write
|
||
F2B000
|
stack
|
page read and write
|
||
1B43000
|
heap
|
page read and write
|
||
41AF000
|
stack
|
page read and write
|
||
1BA4000
|
heap
|
page read and write
|
||
1B8B000
|
heap
|
page read and write
|
||
1037000
|
unkown
|
page read and write
|
||
5830000
|
direct allocation
|
page execute and read and write
|
||
19D0000
|
heap
|
page read and write
|
||
5A7D000
|
stack
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
19D5000
|
heap
|
page read and write
|
||
5800000
|
direct allocation
|
page execute and read and write
|
||
5800000
|
direct allocation
|
page execute and read and write
|
||
1AB0000
|
direct allocation
|
page read and write
|
||
5670000
|
direct allocation
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
15FE000
|
stack
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
1B8D000
|
heap
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
5CBF000
|
stack
|
page read and write
|
||
147C000
|
unkown
|
page execute and write copy
|
||
4A6F000
|
stack
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
1B36000
|
heap
|
page read and write
|
||
FE1000
|
unkown
|
page execute and read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
5A3D000
|
stack
|
page read and write
|
||
1AA7000
|
heap
|
page read and write
|
||
5CE0000
|
remote allocation
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
1AB0000
|
direct allocation
|
page read and write
|
||
5FFE000
|
stack
|
page read and write
|
||
5800000
|
direct allocation
|
page execute and read and write
|
||
446E000
|
stack
|
page read and write
|
||
1ADE000
|
heap
|
page read and write
|
||
56BB000
|
stack
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
1AB0000
|
direct allocation
|
page read and write
|
||
FE1000
|
unkown
|
page execute and write copy
|
||
4CEF000
|
stack
|
page read and write
|
||
1A2E000
|
stack
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
584B000
|
trusted library allocation
|
page read and write
|
||
566D000
|
stack
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
1B18000
|
heap
|
page read and write
|
||
1AB0000
|
direct allocation
|
page read and write
|
There are 170 hidden memdumps, click here to show them.