Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\app.exe
|
"C:\Users\user\Desktop\app.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://POSTHTTP/1.1Content-Type:
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
87F000
|
heap
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
24B2000
|
heap
|
page read and write
|
||
22C4000
|
heap
|
page read and write
|
||
42F000
|
unkown
|
page readonly
|
||
871000
|
heap
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
867000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page execute and read and write
|
||
42F000
|
unkown
|
page readonly
|
||
26AF000
|
stack
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
442000
|
unkown
|
page write copy
|
||
444000
|
unkown
|
page read and write
|
||
23D0000
|
direct allocation
|
page execute and read and write
|
||
620000
|
heap
|
page read and write
|
||
2300000
|
direct allocation
|
page read and write
|
||
44A000
|
unkown
|
page read and write
|
||
42D000
|
unkown
|
page execute and write copy
|
||
22F0000
|
heap
|
page read and write
|
||
22FB000
|
heap
|
page read and write
|
||
7FE000
|
heap
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
22F6000
|
heap
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
66D000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
2250000
|
heap
|
page read and write
|
||
878000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
7FA000
|
heap
|
page read and write
|
||
4AA0000
|
heap
|
page read and write
|
||
44D000
|
unkown
|
page readonly
|
||
1F0000
|
heap
|
page read and write
|
||
28AF000
|
stack
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
875000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute and write copy
|
||
2FEE000
|
stack
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
224E000
|
stack
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
44D000
|
unkown
|
page readonly
|
||
660000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute and write copy
|
||
7AF000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
864000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
24A0000
|
heap
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
886000
|
heap
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3120000
|
heap
|
page read and write
|
||
442000
|
unkown
|
page write copy
|
||
832000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
866000
|
heap
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
229E000
|
stack
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
2D2F000
|
stack
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
There are 62 hidden memdumps, click here to show them.