Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\P2jWhX7B3B.exe
|
"C:\Users\user\Desktop\P2jWhX7B3B.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://enigmaprotector.com/taggant/spv.crl0
|
unknown
|
||
https://enigmaprotector.com/taggant/user.crl0
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
56F2BFE000
|
stack
|
page read and write
|
||
7FF788885000
|
unkown
|
page execute and write copy
|
||
21CBA301000
|
heap
|
page read and write
|
||
56F23FE000
|
stack
|
page read and write
|
||
21CB8520000
|
heap
|
page read and write
|
||
56F1BFF000
|
stack
|
page read and write
|
||
21CBA5B0000
|
heap
|
page read and write
|
||
21CBA38D000
|
heap
|
page read and write
|
||
21CB8500000
|
heap
|
page read and write
|
||
21CBAA5C000
|
heap
|
page read and write
|
||
56F3BFE000
|
stack
|
page read and write
|
||
56F2FFF000
|
stack
|
page read and write
|
||
21CBA050000
|
heap
|
page read and write
|
||
56F03FE000
|
stack
|
page read and write
|
||
21CBAAC2000
|
heap
|
page read and write
|
||
21CBA344000
|
heap
|
page read and write
|
||
56F27FF000
|
stack
|
page read and write
|
||
21CBA090000
|
heap
|
page read and write
|
||
7FF787B94000
|
unkown
|
page readonly
|
||
21CBA150000
|
heap
|
page read and write
|
||
56F0BFE000
|
stack
|
page read and write
|
||
21CB8526000
|
heap
|
page read and write
|
||
7FF787BA0000
|
unkown
|
page read and write
|
||
21CBA053000
|
heap
|
page read and write
|
||
21CBA355000
|
heap
|
page read and write
|
||
21CBAA6C000
|
heap
|
page read and write
|
||
21CBA0D0000
|
trusted library allocation
|
page read and write
|
||
21CBA0D0000
|
trusted library allocation
|
page read and write
|
||
7FF787BA1000
|
unkown
|
page execute and write copy
|
||
21CBAAC7000
|
heap
|
page read and write
|
||
21CBA550000
|
trusted library allocation
|
page read and write
|
||
7FF787BA5000
|
unkown
|
page execute and write copy
|
||
7FF787B94000
|
unkown
|
page execute and write copy
|
||
21CBA415000
|
heap
|
page read and write
|
||
21CBAD96000
|
heap
|
page read and write
|
||
21CB9FC0000
|
heap
|
page read and write
|
||
21CBA418000
|
heap
|
page read and write
|
||
56EFFFE000
|
stack
|
page read and write
|
||
7FF787F1A000
|
unkown
|
page execute and read and write
|
||
56F1FFE000
|
stack
|
page read and write
|
||
7FF787B92000
|
unkown
|
page read and write
|
||
56F17FF000
|
stack
|
page read and write
|
||
7FF787F2A000
|
unkown
|
page execute and read and write
|
||
56F3FFF000
|
stack
|
page read and write
|
||
21CBAA57000
|
heap
|
page read and write
|
||
56F37FF000
|
stack
|
page read and write
|
||
56F0FFE000
|
stack
|
page read and write
|
||
21CBAA57000
|
heap
|
page read and write
|
||
56EFBFE000
|
stack
|
page read and write
|
||
21CB84D0000
|
heap
|
page read and write
|
||
7FF787B71000
|
unkown
|
page execute and write copy
|
||
56F13FE000
|
stack
|
page read and write
|
||
21CBA160000
|
heap
|
page read and write
|
||
21CBA415000
|
heap
|
page read and write
|
||
7FF788083000
|
unkown
|
page execute and read and write
|
||
7FF787F2E000
|
unkown
|
page execute and read and write
|
||
56EF7F7000
|
stack
|
page read and write
|
||
7FF787B70000
|
unkown
|
page readonly
|
||
21CBA070000
|
heap
|
page read and write
|
||
7FF788536000
|
unkown
|
page execute and read and write
|
||
7FF787F58000
|
unkown
|
page execute and read and write
|
||
7FFE22010000
|
direct allocation
|
page execute and read and write
|
||
21CBAAB9000
|
heap
|
page read and write
|
||
21CBA420000
|
heap
|
page read and write
|
||
21CBA0D0000
|
trusted library allocation
|
page read and write
|
||
7FF788882000
|
unkown
|
page execute and write copy
|
||
21CBAA51000
|
heap
|
page read and write
|
||
7FF787B9D000
|
unkown
|
page readonly
|
||
21CBA344000
|
heap
|
page read and write
|
||
7FF787BA6000
|
unkown
|
page execute and read and write
|
||
7FF787BA5000
|
unkown
|
page readonly
|
||
21CBAA4F000
|
heap
|
page read and write
|
||
21CBA2D2000
|
heap
|
page read and write
|
||
21CBAAB5000
|
heap
|
page read and write
|
||
21CBAA5C000
|
heap
|
page read and write
|
||
21CBA260000
|
heap
|
page read and write
|
||
7FF787B9D000
|
unkown
|
page execute and write copy
|
||
21CBA2A0000
|
heap
|
page read and write
|
||
7FF787B92000
|
unkown
|
page execute and write copy
|
||
21CBA41B000
|
heap
|
page read and write
|
||
21CB84C0000
|
heap
|
page read and write
|
||
7FF787B70000
|
unkown
|
page readonly
|
||
21CBA980000
|
heap
|
page read and write
|
||
21CBA423000
|
heap
|
page read and write
|
||
21CBA155000
|
heap
|
page read and write
|
||
21CB9FB0000
|
heap
|
page read and write
|
||
7FF787B71000
|
unkown
|
page execute read
|
||
7FF787F80000
|
unkown
|
page execute and read and write
|
||
21CBAA63000
|
heap
|
page read and write
|
||
56F33FE000
|
stack
|
page read and write
|
||
21CBA2FC000
|
heap
|
page read and write
|
||
21CBA417000
|
heap
|
page read and write
|
||
21CBA38D000
|
heap
|
page read and write
|
||
21CBAA60000
|
heap
|
page read and write
|
||
56F07FF000
|
stack
|
page read and write
|
||
21CBA41C000
|
heap
|
page read and write
|
||
7FF40F620000
|
direct allocation
|
page execute and read and write
|
||
21CBAAB8000
|
heap
|
page read and write
|
||
21CBAAD0000
|
heap
|
page read and write
|
||
7FF788885000
|
unkown
|
page execute and read and write
|
There are 90 hidden memdumps, click here to show them.