Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\bxUX6ztvg2.exe
|
"C:\Users\user\Desktop\bxUX6ztvg2.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
hicham157484.ddns.net
|
|||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
hicham157484.ddns.net
|
45.74.34.32
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.74.34.32
|
hicham157484.ddns.net
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
248A0382000
|
unkown
|
page readonly
|
||
248A24CC000
|
trusted library allocation
|
page read and write
|
||
248A2466000
|
trusted library allocation
|
page read and write
|
||
248A23BF000
|
trusted library allocation
|
page read and write
|
||
248A2371000
|
trusted library allocation
|
page read and write
|
||
248A0380000
|
unkown
|
page readonly
|
||
248A236C000
|
trusted library allocation
|
page read and write
|
||
248A23D3000
|
trusted library allocation
|
page read and write
|
||
248A2417000
|
trusted library allocation
|
page read and write
|
||
248A241B000
|
trusted library allocation
|
page read and write
|
||
248A2464000
|
trusted library allocation
|
page read and write
|
||
248A2479000
|
trusted library allocation
|
page read and write
|
||
248A2435000
|
trusted library allocation
|
page read and write
|
||
248A0785000
|
heap
|
page read and write
|
||
248A24DE000
|
trusted library allocation
|
page read and write
|
||
248A0430000
|
heap
|
page read and write
|
||
248A23C2000
|
trusted library allocation
|
page read and write
|
||
248A2424000
|
trusted library allocation
|
page read and write
|
||
248A04D3000
|
heap
|
page read and write
|
||
248A2427000
|
trusted library allocation
|
page read and write
|
||
7FFAACBFC000
|
trusted library allocation
|
page execute and read and write
|
||
248A247E000
|
trusted library allocation
|
page read and write
|
||
248A0780000
|
heap
|
page read and write
|
||
248A06C3000
|
trusted library allocation
|
page read and write
|
||
248A0505000
|
heap
|
page read and write
|
||
248A23AC000
|
trusted library allocation
|
page read and write
|
||
248BAA10000
|
heap
|
page execute and read and write
|
||
248A2394000
|
trusted library allocation
|
page read and write
|
||
7FFAACC56000
|
trusted library allocation
|
page read and write
|
||
248A04D1000
|
heap
|
page read and write
|
||
A7576FE000
|
stack
|
page read and write
|
||
248BAA20000
|
heap
|
page read and write
|
||
248A236E000
|
trusted library allocation
|
page read and write
|
||
248A23C4000
|
trusted library allocation
|
page read and write
|
||
248A049C000
|
heap
|
page read and write
|
||
248A0490000
|
heap
|
page read and write
|
||
7FFAACC5C000
|
trusted library allocation
|
page execute and read and write
|
||
248A2468000
|
trusted library allocation
|
page read and write
|
||
248A23A3000
|
trusted library allocation
|
page read and write
|
||
248A2383000
|
trusted library allocation
|
page read and write
|
||
A757AFF000
|
stack
|
page read and write
|
||
248A23AE000
|
trusted library allocation
|
page read and write
|
||
248A0380000
|
unkown
|
page readonly
|
||
248A0470000
|
heap
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
7FFAACCC0000
|
trusted library allocation
|
page execute and read and write
|
||
248B20C1000
|
trusted library allocation
|
page read and write
|
||
248A04FE000
|
heap
|
page read and write
|
||
248A2402000
|
trusted library allocation
|
page read and write
|
||
248A23CD000
|
trusted library allocation
|
page read and write
|
||
248A2090000
|
heap
|
page execute and read and write
|
||
248A23B6000
|
trusted library allocation
|
page read and write
|
||
248A06B0000
|
trusted library allocation
|
page read and write
|
||
A7578FE000
|
stack
|
page read and write
|
||
A757124000
|
stack
|
page read and write
|
||
248A2431000
|
trusted library allocation
|
page read and write
|
||
248A0970000
|
heap
|
page read and write
|
||
248A23CF000
|
trusted library allocation
|
page read and write
|
||
248A2406000
|
trusted library allocation
|
page read and write
|
||
248A2448000
|
trusted library allocation
|
page read and write
|
||
248A2444000
|
trusted library allocation
|
page read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page read and write
|
||
248A04BB000
|
heap
|
page read and write
|
||
A7577FC000
|
stack
|
page read and write
|
||
248A244A000
|
trusted library allocation
|
page read and write
|
||
248A23E2000
|
trusted library allocation
|
page read and write
|
||
248A06C0000
|
trusted library allocation
|
page read and write
|
||
A7579FE000
|
stack
|
page read and write
|
||
248A2446000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB3000
|
trusted library allocation
|
page read and write
|
||
248A2419000
|
trusted library allocation
|
page read and write
|
||
248A246A000
|
trusted library allocation
|
page read and write
|
||
7FFAACBCB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACBA3000
|
trusted library allocation
|
page execute and read and write
|
||
248A0392000
|
unkown
|
page readonly
|
||
248A0975000
|
heap
|
page read and write
|
||
248A0450000
|
heap
|
page read and write
|
||
7FFAACBC4000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
248A247B000
|
trusted library allocation
|
page read and write
|
||
248A23D6000
|
trusted library allocation
|
page read and write
|
||
248A0420000
|
heap
|
page read and write
|
||
248A056A000
|
heap
|
page read and write
|
||
248A2381000
|
trusted library allocation
|
page read and write
|
||
7FFAACBA4000
|
trusted library allocation
|
page read and write
|
||
248A2442000
|
trusted library allocation
|
page read and write
|
||
248A23B0000
|
trusted library allocation
|
page read and write
|
||
248A2368000
|
trusted library allocation
|
page read and write
|
||
248A237B000
|
trusted library allocation
|
page read and write
|
||
248A236A000
|
trusted library allocation
|
page read and write
|
||
7FFAACBBD000
|
trusted library allocation
|
page execute and read and write
|
||
248A24C6000
|
trusted library allocation
|
page read and write
|
||
248A2422000
|
trusted library allocation
|
page read and write
|
||
248A2477000
|
trusted library allocation
|
page read and write
|
||
7FFAACBAD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACBCD000
|
trusted library allocation
|
page execute and read and write
|
||
248A2409000
|
trusted library allocation
|
page read and write
|
||
248A23B2000
|
trusted library allocation
|
page read and write
|
||
248A20C1000
|
trusted library allocation
|
page read and write
|
||
248A2475000
|
trusted library allocation
|
page read and write
|
||
248A239F000
|
trusted library allocation
|
page read and write
|
||
248A23F9000
|
trusted library allocation
|
page read and write
|
||
248A0690000
|
trusted library allocation
|
page read and write
|
||
248A238E000
|
trusted library allocation
|
page read and write
|
||
248BA448000
|
heap
|
page read and write
|
||
248A0580000
|
heap
|
page read and write
|
||
248A23B4000
|
trusted library allocation
|
page read and write
|
||
248A2433000
|
trusted library allocation
|
page read and write
|
||
248A23E6000
|
trusted library allocation
|
page read and write
|
||
248A237F000
|
trusted library allocation
|
page read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page execute and read and write
|
||
248A04BD000
|
heap
|
page read and write
|
||
248A23F3000
|
trusted library allocation
|
page read and write
|
||
248A1F90000
|
heap
|
page read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page read and write
|
||
248A2437000
|
trusted library allocation
|
page read and write
|
||
248A23A5000
|
trusted library allocation
|
page read and write
|
||
248A23E4000
|
trusted library allocation
|
page read and write
|
||
248A23D1000
|
trusted library allocation
|
page read and write
|
||
7FFAACC86000
|
trusted library allocation
|
page execute and read and write
|
||
248A2453000
|
trusted library allocation
|
page read and write
|
||
248A23E0000
|
trusted library allocation
|
page read and write
|
||
248A20B0000
|
heap
|
page read and write
|
||
248BAAC3000
|
heap
|
page read and write
|
||
248A2459000
|
trusted library allocation
|
page read and write
|
||
7FF4813C0000
|
trusted library allocation
|
page execute and read and write
|
||
248A239D000
|
trusted library allocation
|
page read and write
|
||
248A238C000
|
trusted library allocation
|
page read and write
|
||
248A245C000
|
trusted library allocation
|
page read and write
|
There are 119 hidden memdumps, click here to show them.