Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PH5N7O0v0i.exe
|
"C:\Users\user\Desktop\PH5N7O0v0i.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ipinfo.io/country
|
unknown
|
||
https://github.com/reproteq/DiffPatchWpf3Copyright
|
unknown
|
||
https://ipinfo.io/ip
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
202E5220000
|
trusted library allocation
|
page read and write
|
||
202E6B60000
|
heap
|
page read and write
|
||
7FFB4A9D6000
|
trusted library allocation
|
page execute and read and write
|
||
202FF579000
|
heap
|
page read and write
|
||
54225FB000
|
stack
|
page read and write
|
||
7FFB4AA90000
|
trusted library allocation
|
page read and write
|
||
202FF5AA000
|
heap
|
page read and write
|
||
202FF7FA000
|
heap
|
page read and write
|
||
202E516D000
|
heap
|
page read and write
|
||
202E5285000
|
heap
|
page read and write
|
||
7FF49BFB4000
|
trusted library allocation
|
page readonly
|
||
7FF49BFC2000
|
trusted library allocation
|
page readonly
|
||
2028392E000
|
heap
|
page read and write
|
||
7FF49BFC1000
|
trusted library allocation
|
page execute read
|
||
202839C0000
|
heap
|
page read and write
|
||
20283962000
|
heap
|
page read and write
|
||
202FF7E6000
|
heap
|
page read and write
|
||
202FF7EC000
|
heap
|
page read and write
|
||
202E537D000
|
heap
|
page read and write
|
||
202E5233000
|
trusted library allocation
|
page read and write
|
||
5421DF4000
|
stack
|
page read and write
|
||
54221FB000
|
stack
|
page read and write
|
||
7FFB4AAE0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAA2000
|
trusted library allocation
|
page read and write
|
||
202E532F000
|
heap
|
page read and write
|
||
54209FB000
|
stack
|
page read and write
|
||
202FF560000
|
heap
|
page read and write
|
||
7FFB4AAC6000
|
trusted library allocation
|
page read and write
|
||
7FFB4A907000
|
trusted library allocation
|
page read and write
|
||
7FF49BFB1000
|
trusted library allocation
|
page execute read
|
||
202FF977000
|
heap
|
page read and write
|
||
202FF82F000
|
heap
|
page read and write
|
||
202E531D000
|
heap
|
page read and write
|
||
202E531F000
|
heap
|
page read and write
|
||
202FF493000
|
heap
|
page execute and read and write
|
||
7FFB4A902000
|
trusted library allocation
|
page read and write
|
||
202E5350000
|
heap
|
page read and write
|
||
20283960000
|
heap
|
page read and write
|
||
202FF83B000
|
heap
|
page read and write
|
||
202E6C91000
|
trusted library allocation
|
page read and write
|
||
54211FF000
|
stack
|
page read and write
|
||
54215FE000
|
stack
|
page read and write
|
||
202FFB92000
|
trusted library allocation
|
page read and write
|
||
202E52EA000
|
heap
|
page read and write
|
||
7FFB4A900000
|
trusted library allocation
|
page read and write
|
||
202E52D0000
|
heap
|
page read and write
|
||
20283AE6000
|
heap
|
page read and write
|
||
202E51D9000
|
heap
|
page read and write
|
||
202E4ED2000
|
unkown
|
page readonly
|
||
202FF470000
|
heap
|
page execute and read and write
|
||
202E52AF000
|
heap
|
page read and write
|
||
7FFB4A914000
|
trusted library allocation
|
page read and write
|
||
7FFB4A90D000
|
trusted library allocation
|
page execute and read and write
|
||
202839C2000
|
heap
|
page read and write
|
||
202FF440000
|
heap
|
page read and write
|
||
7FFB4AAA0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AA98000
|
trusted library allocation
|
page read and write
|
||
202FF490000
|
heap
|
page execute and read and write
|
||
7FFB4A9A0000
|
trusted library allocation
|
page read and write
|
||
202F6C91000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAB0000
|
trusted library allocation
|
page execute and read and write
|
||
202FF7DC000
|
heap
|
page read and write
|
||
202839B7000
|
heap
|
page read and write
|
||
20283E60000
|
trusted library allocation
|
page read and write
|
||
202FF4E0000
|
heap
|
page read and write
|
||
7FFB4AAD0000
|
trusted library allocation
|
page read and write
|
||
202FF580000
|
heap
|
page read and write
|
||
7FF49BFCA000
|
trusted library allocation
|
page readonly
|
||
7FFB4A9A6000
|
trusted library allocation
|
page read and write
|
||
202E5120000
|
heap
|
page read and write
|
||
202FF96F000
|
heap
|
page read and write
|
||
20283EB0000
|
trusted library allocation
|
page read and write
|
||
5420DFE000
|
stack
|
page read and write
|
||
7FFB4A9AC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4A91B000
|
trusted library allocation
|
page execute and read and write
|
||
202E5070000
|
heap
|
page read and write
|
||
202E5385000
|
heap
|
page read and write
|
||
202FF839000
|
heap
|
page read and write
|
||
202839B0000
|
heap
|
page read and write
|
||
202FF4E3000
|
heap
|
page read and write
|
||
20283974000
|
heap
|
page read and write
|
||
7FF49BFC7000
|
trusted library allocation
|
page execute read
|
||
7FFB4AAC0000
|
trusted library allocation
|
page read and write
|
||
7FF49BFB5000
|
trusted library allocation
|
page execute read
|
||
202E52BF000
|
heap
|
page read and write
|
||
202FF9F0000
|
trusted library allocation
|
page read and write
|
||
202E516B000
|
heap
|
page read and write
|
||
20283EA0000
|
trusted library allocation
|
page read and write
|
||
202E6C80000
|
heap
|
page execute and read and write
|
||
20283D50000
|
trusted library allocation
|
page read and write
|
||
541F1F4000
|
stack
|
page read and write
|
||
7FF49BFCF000
|
trusted library allocation
|
page execute read
|
||
202E52AD000
|
heap
|
page read and write
|
||
202FF968000
|
heap
|
page read and write
|
||
202E5378000
|
heap
|
page read and write
|
||
202E538E000
|
heap
|
page read and write
|
||
7FFB4A9B0000
|
trusted library allocation
|
page execute and read and write
|
||
202E5151000
|
heap
|
page read and write
|
||
7FFB4A8F4000
|
trusted library allocation
|
page read and write
|
||
202E50E0000
|
heap
|
page read and write
|
||
7FF49BFCE000
|
trusted library allocation
|
page readonly
|
||
202E5200000
|
trusted library allocation
|
page read and write
|
||
202FF92A000
|
heap
|
page read and write
|
||
202E5290000
|
heap
|
page read and write
|
||
202E52B7000
|
heap
|
page read and write
|
||
202E5123000
|
heap
|
page read and write
|
||
202FFA90000
|
trusted library allocation
|
page read and write
|
||
7FFB4A8F3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4A910000
|
trusted library allocation
|
page read and write
|
||
20283E70000
|
trusted library allocation
|
page read and write
|
||
202E5382000
|
heap
|
page read and write
|
||
202E5090000
|
heap
|
page read and write
|
||
202FF8D7000
|
heap
|
page read and write
|
||
202FF7E0000
|
heap
|
page read and write
|
||
202FF8CB000
|
heap
|
page read and write
|
||
202FF843000
|
heap
|
page read and write
|
||
20283964000
|
heap
|
page read and write
|
||
202E53B0000
|
heap
|
page read and write
|
||
202FF85F000
|
heap
|
page read and write
|
||
7FFB4A8F0000
|
trusted library allocation
|
page read and write
|
||
202E70E6000
|
trusted library allocation
|
page read and write
|
||
2028397E000
|
heap
|
page read and write
|
||
202E5230000
|
trusted library allocation
|
page read and write
|
||
54201FE000
|
stack
|
page read and write
|
||
7FFB4A8F2000
|
trusted library allocation
|
page read and write
|
||
202E4F90000
|
heap
|
page read and write
|
||
202E5328000
|
heap
|
page read and write
|
||
20283924000
|
heap
|
page read and write
|
||
202E52E4000
|
heap
|
page read and write
|
||
2028398A000
|
heap
|
page read and write
|
||
20283A1D000
|
heap
|
page read and write
|
||
202E5390000
|
heap
|
page read and write
|
||
7FFB4AAC8000
|
trusted library allocation
|
page read and write
|
||
20283ED0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A8FD000
|
trusted library allocation
|
page execute and read and write
|
||
20283995000
|
heap
|
page read and write
|
||
202FF89A000
|
heap
|
page read and write
|
||
20283EC0000
|
trusted library allocation
|
page read and write
|
||
20283E80000
|
trusted library allocation
|
page read and write
|
||
20283E90000
|
trusted library allocation
|
page read and write
|
||
202839A7000
|
heap
|
page read and write
|
||
202FF9C7000
|
heap
|
page read and write
|
||
7FFB4AA10000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4A90A000
|
trusted library allocation
|
page read and write
|
||
202E534B000
|
heap
|
page read and write
|
||
7FF49BFB2000
|
trusted library allocation
|
page readonly
|
||
202E5280000
|
heap
|
page read and write
|
||
7FF49BFC6000
|
trusted library allocation
|
page readonly
|
||
202FF816000
|
heap
|
page read and write
|
||
7FF49BFB0000
|
trusted library allocation
|
page readonly
|
||
202839B2000
|
heap
|
page read and write
|
||
2028395C000
|
heap
|
page read and write
|
||
202E5175000
|
heap
|
page read and write
|
||
202E4EF4000
|
unkown
|
page readonly
|
||
202839DB000
|
heap
|
page read and write
|
||
20283D60000
|
trusted library allocation
|
page read and write
|
||
54205FC000
|
stack
|
page read and write
|
||
202FF7D4000
|
heap
|
page read and write
|
||
202FF9AB000
|
heap
|
page read and write
|
||
202FECC0000
|
trusted library allocation
|
page read and write
|
||
7FF49BFB3000
|
trusted library allocation
|
page execute read
|
||
202E53B5000
|
heap
|
page read and write
|
||
202838F0000
|
heap
|
page read and write
|
||
202839CA000
|
heap
|
page read and write
|
||
202839C4000
|
heap
|
page read and write
|
||
202E50E6000
|
heap
|
page read and write
|
||
202F6CB1000
|
trusted library allocation
|
page read and write
|
||
7FF49BFC4000
|
trusted library allocation
|
page readonly
|
||
202E537F000
|
heap
|
page read and write
|
||
202E50B0000
|
heap
|
page read and write
|
||
202FF4A0000
|
trusted library allocation
|
page read and write
|
||
202FF570000
|
heap
|
page read and write
|
||
2028399C000
|
heap
|
page read and write
|
||
7FF49BFCB000
|
trusted library allocation
|
page execute read
|
||
20283AB1000
|
heap
|
page read and write
|
||
54229FE000
|
stack
|
page read and write
|
||
7FFB4A91D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF49BFC5000
|
trusted library allocation
|
page execute read
|
||
7FF49BFD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4A94C000
|
trusted library allocation
|
page execute and read and write
|
||
202E50EC000
|
heap
|
page read and write
|
||
202FF7D0000
|
heap
|
page read and write
|
||
20283936000
|
heap
|
page read and write
|
||
202E5364000
|
heap
|
page read and write
|
||
202E4ED0000
|
unkown
|
page readonly
|
||
202E510B000
|
heap
|
page read and write
|
||
7FF49BFC3000
|
trusted library allocation
|
page execute read
|
||
202839E6000
|
heap
|
page read and write
|
There are 178 hidden memdumps, click here to show them.