Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\1727269807db8b68b2c9b1c9bdd42030655a5e439e971ba77503b2390bf7da0c0928072d74511.dat-decoded.exe
|
"C:\Users\user\Desktop\1727269807db8b68b2c9b1c9bdd42030655a5e439e971ba77503b2390bf7da0c0928072d74511.dat-decoded.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
135.224.23.113
|
|||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
135.224.23.113
|
unknown
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
A62000
|
unkown
|
page readonly
|
||
2E71000
|
trusted library allocation
|
page read and write
|
||
1BC1C000
|
stack
|
page read and write
|
||
1C33A000
|
stack
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
1BC20000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
1B2ED000
|
stack
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
1B914000
|
stack
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
12E78000
|
trusted library allocation
|
page read and write
|
||
EEC000
|
heap
|
page read and write
|
||
11DD000
|
stack
|
page read and write
|
||
1BE30000
|
heap
|
page read and write
|
||
10D5000
|
heap
|
page read and write
|
||
7FF848E34000
|
trusted library allocation
|
page read and write
|
||
F21000
|
heap
|
page read and write
|
||
1BB1C000
|
stack
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
1B81A000
|
stack
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
FA2000
|
heap
|
page read and write
|
||
BA4000
|
stack
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1B713000
|
heap
|
page read and write
|
||
2EB6000
|
trusted library allocation
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
12E7E000
|
trusted library allocation
|
page read and write
|
||
1BC7B000
|
heap
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page execute and read and write
|
||
EFF000
|
heap
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
1BC72000
|
heap
|
page read and write
|
||
1C43E000
|
stack
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
1093000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
1C23C000
|
stack
|
page read and write
|
||
1B710000
|
heap
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
7FF4EA510000
|
trusted library allocation
|
page execute and read and write
|
||
F13000
|
heap
|
page read and write
|
||
2C8E000
|
heap
|
page read and write
|
||
12E71000
|
trusted library allocation
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
1390000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
1BC35000
|
heap
|
page read and write
|
||
F24000
|
heap
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
1BC88000
|
heap
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
1C03C000
|
stack
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FC1000
|
trusted library allocation
|
page read and write
|
||
1AEA0000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
heap
|
page execute and read and write
|
||
FB9000
|
heap
|
page read and write
|
||
1BA1E000
|
stack
|
page read and write
|
||
1C13C000
|
stack
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
There are 75 hidden memdumps, click here to show them.