Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://frogs-severz.sbs/api
|
104.21.88.250
|
||
https://frogs-severz.sbs/w
|
unknown
|
||
https://frogs-severz.sbs/apin
|
unknown
|
||
https://frogs-severz.sbs/
|
unknown
|
||
http://crl.microsoftb
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
frogs-severz.sbs
|
104.21.88.250
|
||
property-imper.sbs
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.88.250
|
frogs-severz.sbs
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1660000
|
direct allocation
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
32C7000
|
heap
|
page read and write
|
||
E87000
|
unkown
|
page write copy
|
||
350E000
|
stack
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
440E000
|
stack
|
page read and write
|
||
43CF000
|
stack
|
page read and write
|
||
378E000
|
stack
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
12D8000
|
unkown
|
page execute and read and write
|
||
4F20000
|
heap
|
page read and write
|
||
174A000
|
heap
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
428F000
|
stack
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
567D000
|
stack
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
173F000
|
heap
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
1746000
|
heap
|
page read and write
|
||
1128000
|
unkown
|
page execute and read and write
|
||
364E000
|
stack
|
page read and write
|
||
5B4E000
|
stack
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
32A0000
|
direct allocation
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
1660000
|
direct allocation
|
page read and write
|
||
1765000
|
heap
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
1660000
|
direct allocation
|
page read and write
|
||
1742000
|
heap
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
5520000
|
direct allocation
|
page execute and read and write
|
||
1660000
|
direct allocation
|
page read and write
|
||
1137000
|
unkown
|
page execute and write copy
|
||
4F11000
|
heap
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
1758000
|
heap
|
page read and write
|
||
5CBF000
|
stack
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
53CB000
|
stack
|
page read and write
|
||
E31000
|
unkown
|
page execute and read and write
|
||
1494000
|
heap
|
page read and write
|
||
1660000
|
direct allocation
|
page read and write
|
||
5A00000
|
remote allocation
|
page read and write
|
||
174A000
|
heap
|
page read and write
|
||
478F000
|
stack
|
page read and write
|
||
5350000
|
heap
|
page read and write
|
||
54CF000
|
stack
|
page read and write
|
||
5549000
|
trusted library allocation
|
page read and write
|
||
450F000
|
stack
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
168E000
|
heap
|
page read and write
|
||
16FA000
|
heap
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
53D4000
|
direct allocation
|
page read and write
|
||
73D1F000
|
unkown
|
page readonly
|
||
3ECF000
|
stack
|
page read and write
|
||
4C8F000
|
stack
|
page read and write
|
||
5530000
|
direct allocation
|
page execute and read and write
|
||
5A00000
|
remote allocation
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
1751000
|
heap
|
page read and write
|
||
E75000
|
unkown
|
page execute and read and write
|
||
3B0F000
|
stack
|
page read and write
|
||
1756000
|
heap
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
111F000
|
unkown
|
page execute and read and write
|
||
1494000
|
heap
|
page read and write
|
||
1746000
|
heap
|
page read and write
|
||
E87000
|
unkown
|
page read and write
|
||
197E000
|
stack
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
16BF000
|
heap
|
page read and write
|
||
59FE000
|
stack
|
page read and write
|
||
1660000
|
direct allocation
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
1660000
|
direct allocation
|
page read and write
|
||
550D000
|
stack
|
page read and write
|
||
15AE000
|
stack
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
168A000
|
heap
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
E89000
|
unkown
|
page execute and read and write
|
||
388F000
|
stack
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
1138000
|
unkown
|
page execute and write copy
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
563D000
|
stack
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
4F11000
|
heap
|
page read and write
|
||
3C8E000
|
stack
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
32CC000
|
heap
|
page read and write
|
||
58BF000
|
stack
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
1765000
|
heap
|
page read and write
|
||
1660000
|
direct allocation
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
5A00000
|
remote allocation
|
page read and write
|
||
16D1000
|
heap
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
73D1D000
|
unkown
|
page read and write
|
||
1660000
|
direct allocation
|
page read and write
|
||
5390000
|
direct allocation
|
page read and write
|
||
1765000
|
heap
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
3D8F000
|
stack
|
page read and write
|
||
4A0F000
|
stack
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
39CF000
|
stack
|
page read and write
|
||
58FE000
|
stack
|
page read and write
|
||
73D16000
|
unkown
|
page readonly
|
||
1660000
|
direct allocation
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
187F000
|
stack
|
page read and write
|
||
57BE000
|
stack
|
page read and write
|
||
1660000
|
direct allocation
|
page read and write
|
||
3C4F000
|
stack
|
page read and write
|
||
1660000
|
direct allocation
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
1490000
|
heap
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
4DCF000
|
stack
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
32A0000
|
direct allocation
|
page read and write
|
||
73D01000
|
unkown
|
page execute read
|
||
32A0000
|
direct allocation
|
page read and write
|
||
490E000
|
stack
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
5E20000
|
heap
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
E31000
|
unkown
|
page execute and write copy
|
||
414F000
|
stack
|
page read and write
|
||
4F0F000
|
stack
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
1660000
|
direct allocation
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
141B000
|
stack
|
page read and write
|
||
1137000
|
unkown
|
page execute and read and write
|
||
E30000
|
unkown
|
page read and write
|
||
5A4D000
|
stack
|
page read and write
|
||
1019000
|
unkown
|
page execute and read and write
|
||
1494000
|
heap
|
page read and write
|
||
12D9000
|
unkown
|
page execute and write copy
|
||
418E000
|
stack
|
page read and write
|
||
1759000
|
heap
|
page read and write
|
||
464F000
|
stack
|
page read and write
|
||
73D00000
|
unkown
|
page readonly
|
||
4F11000
|
heap
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
4F11000
|
heap
|
page read and write
|
||
10F3000
|
unkown
|
page execute and read and write
|
||
468E000
|
stack
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
16C8000
|
heap
|
page read and write
|
||
1660000
|
direct allocation
|
page read and write
|
||
5E1F000
|
stack
|
page read and write
|
||
16E6000
|
heap
|
page read and write
|
||
1758000
|
heap
|
page read and write
|
||
5D1E000
|
stack
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
16B7000
|
heap
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
5BBE000
|
stack
|
page read and write
|
||
48CF000
|
stack
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
325C000
|
stack
|
page read and write
|
||
15EE000
|
stack
|
page read and write
|
||
175A000
|
heap
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
577D000
|
stack
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
131B000
|
stack
|
page read and write
|
There are 194 hidden memdumps, click here to show them.