Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://frogs-severz.sbs/W
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://frogs-severz.sbs/
|
unknown
|
||
https://frogs-severz.sbs//
|
unknown
|
||
https://frogs-severz.sbs/api(wWdtP
|
unknown
|
||
https://frogs-severz.sbs/apiC
|
unknown
|
||
https://frogs-severz.sbs/api
|
104.21.88.250
|
||
https://frogs-severz.sbs/api(wl
|
unknown
|
||
https://frogs-severz.sbs/apiR
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
frogs-severz.sbs
|
104.21.88.250
|
||
property-imper.sbs
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.88.250
|
frogs-severz.sbs
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
14A8000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
529F000
|
stack
|
page read and write
|
||
1533000
|
heap
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
B68000
|
unkown
|
page execute and read and write
|
||
597E000
|
stack
|
page read and write
|
||
13ED000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5CCF000
|
stack
|
page read and write
|
||
551D000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
1527000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
48FF000
|
stack
|
page read and write
|
||
149F000
|
heap
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
569E000
|
stack
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
13E7000
|
heap
|
page read and write
|
||
532E000
|
trusted library allocation
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
981000
|
unkown
|
page execute and read and write
|
||
353E000
|
stack
|
page read and write
|
||
73D16000
|
unkown
|
page readonly
|
||
2FFF000
|
stack
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
152D000
|
heap
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
C3B000
|
unkown
|
page execute and read and write
|
||
467F000
|
stack
|
page read and write
|
||
C67000
|
unkown
|
page execute and read and write
|
||
514D000
|
stack
|
page read and write
|
||
555E000
|
stack
|
page read and write
|
||
579F000
|
stack
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4A3F000
|
stack
|
page read and write
|
||
57C0000
|
remote allocation
|
page read and write
|
||
980000
|
unkown
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
57C0000
|
remote allocation
|
page read and write
|
||
153F000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
1524000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
E15000
|
unkown
|
page execute and read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
1537000
|
heap
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
14C7000
|
heap
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
73D00000
|
unkown
|
page readonly
|
||
C6D000
|
unkown
|
page execute and read and write
|
||
5ADE000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
165E000
|
stack
|
page read and write
|
||
5160000
|
direct allocation
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
453F000
|
stack
|
page read and write
|
||
1537000
|
heap
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
5150000
|
direct allocation
|
page read and write
|
||
981000
|
unkown
|
page execute and write copy
|
||
175F000
|
stack
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
153F000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5A7F000
|
stack
|
page read and write
|
||
519C000
|
stack
|
page read and write
|
||
FAB000
|
stack
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
303B000
|
stack
|
page read and write
|
||
152D000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
73D1D000
|
unkown
|
page read and write
|
||
417F000
|
stack
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
46BE000
|
stack
|
page read and write
|
||
14B1000
|
heap
|
page read and write
|
||
9D9000
|
unkown
|
page execute and read and write
|
||
C7D000
|
unkown
|
page execute and write copy
|
||
1450000
|
direct allocation
|
page read and write
|
||
57C0000
|
remote allocation
|
page read and write
|
||
3DBF000
|
stack
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
EAB000
|
stack
|
page read and write
|
||
1537000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
407E000
|
stack
|
page read and write
|
||
14DA000
|
heap
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
51A4000
|
direct allocation
|
page read and write
|
||
9D7000
|
unkown
|
page read and write
|
||
4CBF000
|
stack
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
5150000
|
direct allocation
|
page read and write
|
||
4B7F000
|
stack
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
153F000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
73D1F000
|
unkown
|
page readonly
|
||
3EFF000
|
stack
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
5300000
|
direct allocation
|
page execute and read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
152D000
|
heap
|
page read and write
|
||
42BF000
|
stack
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
149F000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
152D000
|
heap
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
5150000
|
direct allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
146A000
|
heap
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
52F0000
|
direct allocation
|
page execute and read and write
|
||
9C5000
|
unkown
|
page execute and read and write
|
||
1517000
|
heap
|
page read and write
|
||
14B1000
|
heap
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
1450000
|
direct allocation
|
page read and write
|
||
14DA000
|
heap
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
9D7000
|
unkown
|
page write copy
|
||
14E0000
|
heap
|
page read and write
|
||
5BC0000
|
heap
|
page read and write
|
||
73D01000
|
unkown
|
page execute read
|
||
327F000
|
stack
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
C7C000
|
unkown
|
page execute and write copy
|
||
43FF000
|
stack
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
1493000
|
heap
|
page read and write
|
||
C7C000
|
unkown
|
page execute and read and write
|
||
1537000
|
heap
|
page read and write
|
||
146E000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
47FE000
|
stack
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
153F000
|
heap
|
page read and write
|
||
14C7000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
47BF000
|
stack
|
page read and write
|
||
142E000
|
stack
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
1539000
|
heap
|
page read and write
|
||
153B000
|
heap
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
590E000
|
stack
|
page read and write
|
||
E16000
|
unkown
|
page execute and write copy
|
There are 192 hidden memdumps, click here to show them.