Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ujsvTrVlol.exe
|
"C:\Users\user\Desktop\ujsvTrVlol.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://enigmaprotector.com/taggant/spv.crl0
|
unknown
|
||
https://enigmaprotector.com/taggant/user.crl0
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1E800CF0000
|
heap
|
page read and write
|
||
270B9FF000
|
stack
|
page read and write
|
||
7FF7F5A16000
|
unkown
|
page execute and read and write
|
||
1E802AC9000
|
heap
|
page read and write
|
||
7FF7F59E0000
|
unkown
|
page readonly
|
||
270DDFE000
|
stack
|
page read and write
|
||
7FF7F63A7000
|
unkown
|
page execute and read and write
|
||
270D5FF000
|
stack
|
page read and write
|
||
1E802A60000
|
heap
|
page read and write
|
||
1E80316D000
|
heap
|
page read and write
|
||
1E802AC4000
|
heap
|
page read and write
|
||
1E803486000
|
heap
|
page read and write
|
||
1E8031C3000
|
heap
|
page read and write
|
||
1E8027B0000
|
trusted library allocation
|
page read and write
|
||
1E8029A0000
|
heap
|
page read and write
|
||
7FF7F66F3000
|
unkown
|
page execute and write copy
|
||
270ADFE000
|
stack
|
page read and write
|
||
7FFE22010000
|
direct allocation
|
page execute and read and write
|
||
270CDFE000
|
stack
|
page read and write
|
||
1E802BEF000
|
heap
|
page read and write
|
||
7FF7F5A04000
|
unkown
|
page execute and write copy
|
||
1E802A92000
|
heap
|
page read and write
|
||
1E8031BA000
|
heap
|
page read and write
|
||
7FF7F5A11000
|
unkown
|
page execute and write copy
|
||
1E800CC0000
|
heap
|
page read and write
|
||
1E800C10000
|
heap
|
page read and write
|
||
1E8031BC000
|
heap
|
page read and write
|
||
1E800D06000
|
heap
|
page read and write
|
||
1E802CA0000
|
heap
|
page read and write
|
||
7FF402950000
|
direct allocation
|
page execute and read and write
|
||
270D9FF000
|
stack
|
page read and write
|
||
1E803070000
|
heap
|
page read and write
|
||
1E802BEC000
|
heap
|
page read and write
|
||
1E802B2D000
|
heap
|
page read and write
|
||
1E800D00000
|
heap
|
page read and write
|
||
1E800B30000
|
heap
|
page read and write
|
||
7FF7F5A02000
|
unkown
|
page execute and write copy
|
||
1E802BFB000
|
heap
|
page read and write
|
||
7FF7F5A0D000
|
unkown
|
page execute and write copy
|
||
1E802990000
|
heap
|
page read and write
|
||
270BDFE000
|
stack
|
page read and write
|
||
7FF7F66F6000
|
unkown
|
page execute and read and write
|
||
7FF7F59E0000
|
unkown
|
page readonly
|
||
270E1FF000
|
stack
|
page read and write
|
||
1E803176000
|
heap
|
page read and write
|
||
1E8027B0000
|
trusted library allocation
|
page read and write
|
||
1E800C50000
|
heap
|
page read and write
|
||
270C9FF000
|
stack
|
page read and write
|
||
270D1FF000
|
stack
|
page read and write
|
||
1E8026A0000
|
heap
|
page read and write
|
||
7FF7F5A04000
|
unkown
|
page readonly
|
||
1E802BF8000
|
heap
|
page read and write
|
||
7FF7F5EF1000
|
unkown
|
page execute and read and write
|
||
7FF7F5A0D000
|
unkown
|
page readonly
|
||
1E802B15000
|
heap
|
page read and write
|
||
270B1FE000
|
stack
|
page read and write
|
||
270C5FE000
|
stack
|
page read and write
|
||
270B5FE000
|
stack
|
page read and write
|
||
270A1FE000
|
stack
|
page read and write
|
||
1E8031CE000
|
heap
|
page read and write
|
||
1E800C40000
|
heap
|
page read and write
|
||
7FF7F5DF0000
|
unkown
|
page execute and read and write
|
||
1E802BF5000
|
heap
|
page read and write
|
||
7FF7F5A15000
|
unkown
|
page readonly
|
||
1E8027E3000
|
heap
|
page read and write
|
||
270A9FE000
|
stack
|
page read and write
|
||
1E802BF4000
|
heap
|
page read and write
|
||
7FF7F5A10000
|
unkown
|
page read and write
|
||
1E8028E0000
|
trusted library allocation
|
page read and write
|
||
270E5FF000
|
stack
|
page read and write
|
||
1E802A20000
|
heap
|
page read and write
|
||
7FF7F59E1000
|
unkown
|
page execute and write copy
|
||
7FF7F5EF3000
|
unkown
|
page execute and read and write
|
||
1E800C45000
|
heap
|
page read and write
|
||
1E8027E0000
|
heap
|
page read and write
|
||
1E802B65000
|
heap
|
page read and write
|
||
1E8029B0000
|
heap
|
page read and write
|
||
2709DF7000
|
stack
|
page read and write
|
||
270A5FE000
|
stack
|
page read and write
|
||
1E803165000
|
heap
|
page read and write
|
||
1E8031D4000
|
heap
|
page read and write
|
||
7FF7F5A15000
|
unkown
|
page execute and write copy
|
||
1E802B65000
|
heap
|
page read and write
|
||
270C1FF000
|
stack
|
page read and write
|
||
7FF7F5D8A000
|
unkown
|
page execute and read and write
|
||
1E803170000
|
heap
|
page read and write
|
||
7FF7F5D9E000
|
unkown
|
page execute and read and write
|
||
1E8031DE000
|
heap
|
page read and write
|
||
7FF7F59E1000
|
unkown
|
page execute read
|
||
1E802B15000
|
heap
|
page read and write
|
||
7FF7F66F6000
|
unkown
|
page execute and write copy
|
||
7FF7F5DC8000
|
unkown
|
page execute and read and write
|
||
7FF7F5D9A000
|
unkown
|
page execute and read and write
|
||
7FF7F5A02000
|
unkown
|
page read and write
|
||
1E802920000
|
trusted library allocation
|
page read and write
|
There are 85 hidden memdumps, click here to show them.