Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\g5tO58gHku.exe
|
"C:\Users\user\Desktop\g5tO58gHku.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
hicham157484.ddns.net
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
hicham157484.ddns.net
|
45.74.34.32
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.74.34.32
|
hicham157484.ddns.net
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
F62000
|
unkown
|
page readonly
|
||
5770000
|
heap
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
32E9000
|
trusted library allocation
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
4291000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
1464000
|
trusted library allocation
|
page read and write
|
||
1339000
|
stack
|
page read and write
|
||
155D000
|
heap
|
page read and write
|
||
5AEE000
|
stack
|
page read and write
|
||
58AE000
|
stack
|
page read and write
|
||
1660000
|
trusted library allocation
|
page read and write
|
||
542D000
|
stack
|
page read and write
|
||
32DB000
|
trusted library allocation
|
page read and write
|
||
1690000
|
trusted library allocation
|
page execute and read and write
|
||
13C0000
|
heap
|
page read and write
|
||
14B7000
|
heap
|
page read and write
|
||
5B2E000
|
stack
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page execute and read and write
|
||
16F0000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
1657000
|
trusted library allocation
|
page execute and read and write
|
||
5C2F000
|
stack
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
14BB000
|
heap
|
page read and write
|
||
F60000
|
unkown
|
page readonly
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1574000
|
heap
|
page read and write
|
||
166B000
|
trusted library allocation
|
page execute and read and write
|
||
1488000
|
heap
|
page read and write
|
||
1667000
|
trusted library allocation
|
page execute and read and write
|
||
32E3000
|
trusted library allocation
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
59EE000
|
stack
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
149E000
|
heap
|
page read and write
|
||
32EC000
|
trusted library allocation
|
page read and write
|
||
5784000
|
heap
|
page read and write
|
||
146D000
|
trusted library allocation
|
page execute and read and write
|
||
59AE000
|
stack
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
1463000
|
trusted library allocation
|
page execute and read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
14B5000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page execute and read and write
|
||
3280000
|
heap
|
page read and write
|
||
1652000
|
trusted library allocation
|
page read and write
|
||
13D5000
|
heap
|
page read and write
|
||
3291000
|
trusted library allocation
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
165A000
|
trusted library allocation
|
page execute and read and write
|
||
30DE000
|
stack
|
page read and write
|
There are 46 hidden memdumps, click here to show them.