Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\7R4CQlalZQ.exe
|
"C:\Users\user\Desktop\7R4CQlalZQ.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
193.233.255.34
|
|||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.233.255.34
|
unknown
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D32000
|
unkown
|
page readonly
|
||
3241000
|
trusted library allocation
|
page read and write
|
||
12C3000
|
heap
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
133F000
|
heap
|
page read and write
|
||
1C004000
|
heap
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
stack
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
DC0000
|
heap
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
1BD9E000
|
stack
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
7FF848D72000
|
trusted library allocation
|
page read and write
|
||
1C48C000
|
stack
|
page read and write
|
||
13241000
|
trusted library allocation
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
1C032000
|
heap
|
page read and write
|
||
1C58C000
|
stack
|
page read and write
|
||
1C03D000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
1BF9D000
|
stack
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
1620000
|
heap
|
page read and write
|
||
176B000
|
stack
|
page read and write
|
||
12EF000
|
heap
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
1BFA0000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
1273000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
1324E000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
D30000
|
unkown
|
page readonly
|
||
309F000
|
heap
|
page read and write
|
||
12ED000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
1286000
|
heap
|
page read and write
|
||
1C68A000
|
stack
|
page read and write
|
||
1BAFA000
|
stack
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
157D000
|
stack
|
page read and write
|
||
1B270000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
1C018000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
13248000
|
trusted library allocation
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
12AB000
|
heap
|
page read and write
|
||
1665000
|
heap
|
page read and write
|
||
7FF848E1C000
|
trusted library allocation
|
page execute and read and write
|
||
1BB90000
|
heap
|
page read and write
|
||
1BB93000
|
heap
|
page read and write
|
||
7FF848F11000
|
trusted library allocation
|
page read and write
|
||
7FF49B180000
|
trusted library allocation
|
page execute and read and write
|
||
1BFCD000
|
heap
|
page read and write
|
||
3230000
|
heap
|
page execute and read and write
|
||
1BFB4000
|
heap
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
D30000
|
unkown
|
page readonly
|
||
1C021000
|
heap
|
page read and write
|
||
7FF848D84000
|
trusted library allocation
|
page read and write
|
||
12B2000
|
heap
|
page read and write
|
||
1C043000
|
heap
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
1B6BD000
|
stack
|
page read and write
|
||
1BC94000
|
stack
|
page read and write
|
||
1610000
|
heap
|
page execute and read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
There are 71 hidden memdumps, click here to show them.