Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\download.exe
|
"C:\Users\user\Desktop\download.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
https://jrsoftware.org/ishelp/index.php?topic=setupcmdline
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
23CA9802000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
23CA8F60000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2261000
|
direct allocation
|
page read and write
|
||
2252000
|
direct allocation
|
page read and write
|
||
23CA908F000
|
heap
|
page read and write
|
||
23CA9064000
|
heap
|
page read and write
|
||
24C0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3CF4000
|
heap
|
page read and write
|
||
6BB000
|
heap
|
page read and write
|
||
3CD0000
|
trusted library allocation
|
page read and write
|
||
698000
|
heap
|
page read and write
|
||
4C6000
|
unkown
|
page readonly
|
||
6B0000
|
heap
|
page read and write
|
||
A9BCC7C000
|
stack
|
page read and write
|
||
4B7000
|
unkown
|
page read and write
|
||
23CA9052000
|
heap
|
page read and write
|
||
23CA8F70000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
23CA905C000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
30000
|
heap
|
page read and write
|
||
4C4000
|
unkown
|
page readonly
|
||
4B7000
|
unkown
|
page write copy
|
||
9B000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
23CA8FD0000
|
heap
|
page read and write
|
||
23CA9085000
|
heap
|
page read and write
|
||
2268000
|
direct allocation
|
page read and write
|
||
227F000
|
direct allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
23CA905F000
|
heap
|
page read and write
|
||
23CA9000000
|
heap
|
page read and write
|
||
88C000
|
stack
|
page read and write
|
||
6B8000
|
heap
|
page read and write
|
||
23CA9108000
|
heap
|
page read and write
|
||
229C000
|
direct allocation
|
page read and write
|
||
A9BCEFE000
|
stack
|
page read and write
|
||
23CA9730000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6BB000
|
heap
|
page read and write
|
||
23CA9029000
|
heap
|
page read and write
|
||
225A000
|
direct allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
23CA906D000
|
heap
|
page read and write
|
||
630000
|
trusted library allocation
|
page read and write
|
||
A9BD0F7000
|
stack
|
page read and write
|
||
22B8000
|
direct allocation
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
23CA9102000
|
heap
|
page read and write
|
||
2294000
|
direct allocation
|
page read and write
|
||
23CA903C000
|
heap
|
page read and write
|
||
4C4000
|
unkown
|
page readonly
|
||
22AA000
|
direct allocation
|
page read and write
|
||
23CA9059000
|
heap
|
page read and write
|
||
2286000
|
direct allocation
|
page read and write
|
||
A9BCE7B000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
23CA9100000
|
heap
|
page read and write
|
||
23CA906D000
|
heap
|
page read and write
|
||
2278000
|
direct allocation
|
page read and write
|
||
24B0000
|
trusted library allocation
|
page read and write
|
||
B65000
|
heap
|
page read and write
|
||
22A3000
|
direct allocation
|
page read and write
|
||
4C2000
|
unkown
|
page write copy
|
||
6B1000
|
heap
|
page read and write
|
||
4C6000
|
unkown
|
page readonly
|
||
23CA9113000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
23CA9079000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
A9BCD7D000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
A9BD1FF000
|
stack
|
page read and write
|
||
A9BCCFE000
|
stack
|
page read and write
|
||
3CF0000
|
heap
|
page read and write
|
||
A9BD2FF000
|
stack
|
page read and write
|
||
6BE000
|
heap
|
page read and write
|
||
A9BCFFB000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
B69000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
6AC000
|
heap
|
page read and write
|
||
23CA9013000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
23CA9027000
|
heap
|
page read and write
|
||
22B1000
|
direct allocation
|
page read and write
|
||
6AC000
|
heap
|
page read and write
|
||
98F000
|
stack
|
page read and write
|
||
62E000
|
stack
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
There are 85 hidden memdumps, click here to show them.