Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\fTq2vadDnr.exe
|
"C:\Users\user\Desktop\fTq2vadDnr.exe"
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1F1000
|
unkown
|
page execute and read and write
|
||
600000
|
direct allocation
|
page read and write
|
||
A5F000
|
heap
|
page read and write
|
||
EE1000
|
direct allocation
|
page execute and read and write
|
||
8A1000
|
heap
|
page read and write
|
||
8AB000
|
heap
|
page read and write
|
||
37E000
|
stack
|
page read and write
|
||
33D000
|
stack
|
page read and write
|
||
67F000
|
heap
|
page read and write
|
||
3C0000
|
direct allocation
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
9CE000
|
heap
|
page read and write
|
||
67F000
|
heap
|
page read and write
|
||
DAE000
|
direct allocation
|
page execute and read and write
|
||
1A0000
|
heap
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
67F000
|
heap
|
page read and write
|
||
66E000
|
heap
|
page read and write
|
||
67B000
|
heap
|
page read and write
|
||
3C0000
|
direct allocation
|
page read and write
|
||
340000
|
direct allocation
|
page read and write
|
||
A9F000
|
stack
|
page read and write
|
||
C10000
|
direct allocation
|
page execute and read and write
|
||
3C0000
|
direct allocation
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
66A000
|
heap
|
page read and write
|
||
3BE000
|
stack
|
page read and write
|
||
3C0000
|
direct allocation
|
page read and write
|
||
1F0000
|
unkown
|
page readonly
|
||
8A0000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
B8C000
|
heap
|
page read and write
|
||
3C0000
|
direct allocation
|
page read and write
|
||
1F1000
|
unkown
|
page execute read
|
||
7C4000
|
heap
|
page read and write
|
||
676000
|
heap
|
page read and write
|
||
8A1000
|
heap
|
page read and write
|
||
D39000
|
direct allocation
|
page execute and read and write
|
||
67F000
|
heap
|
page read and write
|
||
67F000
|
heap
|
page read and write
|
||
1F0000
|
unkown
|
page readonly
|
||
67F000
|
heap
|
page read and write
|
||
B9F000
|
stack
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
3C0000
|
direct allocation
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
F52000
|
direct allocation
|
page execute and read and write
|
||
EDD000
|
direct allocation
|
page execute and read and write
|
||
7C0000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
D3D000
|
direct allocation
|
page execute and read and write
|
||
B88000
|
heap
|
page read and write
|
||
14D000
|
stack
|
page read and write
|
There are 47 hidden memdumps, click here to show them.