Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\52B9Zcz8vg.exe
|
"C:\Users\user\Desktop\52B9Zcz8vg.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ipinfo.io/country
|
unknown
|
||
http://xilloolli.com/api.phpEhttp://xilloolli.com/api-debug.php
|
unknown
|
||
http://foo/bar/mainwindow.baml
|
unknown
|
||
http://foo/MainWindow.xaml
|
unknown
|
||
http://defaultcontainer/MainWindow.xaml
|
unknown
|
||
http://xilloolli.com/api-debug.php
|
unknown
|
||
http://xilloolli.com/api.php
|
unknown
|
||
https://oklibed.com
|
unknown
|
||
https://github.com/reproteq/DiffPatchWpf3Copyright
|
unknown
|
||
https://ipinfo.io/ip
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2392D142000
|
unkown
|
page readonly
|
||
2392D570000
|
heap
|
page read and write
|
||
23947AB0000
|
heap
|
page read and write
|
||
2392EDF0000
|
heap
|
page execute and read and write
|
||
239478BA000
|
heap
|
page read and write
|
||
7FFB67877000
|
trusted library allocation
|
page read and write
|
||
2392D312000
|
heap
|
page read and write
|
||
7FFB67862000
|
trusted library allocation
|
page read and write
|
||
23947B6F000
|
heap
|
page read and write
|
||
7FFB67872000
|
trusted library allocation
|
page read and write
|
||
7FFB67980000
|
trusted library allocation
|
page execute and read and write
|
||
8760FFE000
|
stack
|
page read and write
|
||
875EFF4000
|
stack
|
page read and write
|
||
23947B76000
|
heap
|
page read and write
|
||
23947800000
|
heap
|
page read and write
|
||
2392D4E0000
|
heap
|
page read and write
|
||
23947D90000
|
heap
|
page read and write
|
||
23947B79000
|
heap
|
page read and write
|
||
7FFB67A10000
|
trusted library allocation
|
page read and write
|
||
7FFB6788D000
|
trusted library allocation
|
page execute and read and write
|
||
8761FFE000
|
stack
|
page read and write
|
||
7FFB67920000
|
trusted library allocation
|
page execute and read and write
|
||
23947933000
|
heap
|
page execute and read and write
|
||
2392EF4E000
|
trusted library allocation
|
page read and write
|
||
23947940000
|
heap
|
page read and write
|
||
2393EE61000
|
trusted library allocation
|
page read and write
|
||
2392EE61000
|
trusted library allocation
|
page read and write
|
||
7FFB67A40000
|
trusted library allocation
|
page read and write
|
||
23947D01000
|
heap
|
page read and write
|
||
23947C40000
|
heap
|
page read and write
|
||
7FFB6788B000
|
trusted library allocation
|
page execute and read and write
|
||
2392D2DC000
|
heap
|
page read and write
|
||
2392D4E5000
|
heap
|
page read and write
|
||
2392D2FB000
|
heap
|
page read and write
|
||
7FFB67910000
|
trusted library allocation
|
page read and write
|
||
23947862000
|
heap
|
page read and write
|
||
2393EE81000
|
trusted library allocation
|
page read and write
|
||
2392D440000
|
heap
|
page read and write
|
||
2392ED20000
|
trusted library allocation
|
page read and write
|
||
23947870000
|
heap
|
page read and write
|
||
87603FD000
|
stack
|
page read and write
|
||
2394788B000
|
heap
|
page read and write
|
||
2392ED40000
|
trusted library allocation
|
page read and write
|
||
7FFB6791C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB67A00000
|
trusted library allocation
|
page read and write
|
||
239479C0000
|
heap
|
page read and write
|
||
23947808000
|
heap
|
page read and write
|
||
23947E0A000
|
heap
|
page read and write
|
||
8761BF2000
|
stack
|
page read and write
|
||
23947C65000
|
heap
|
page read and write
|
||
2392D3D0000
|
heap
|
page read and write
|
||
87623FE000
|
stack
|
page read and write
|
||
2392D2D0000
|
heap
|
page read and write
|
||
7FFB67870000
|
trusted library allocation
|
page read and write
|
||
23947893000
|
heap
|
page read and write
|
||
7FF4A0530000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB67863000
|
trusted library allocation
|
page execute and read and write
|
||
2392D180000
|
heap
|
page read and write
|
||
23947B4F000
|
heap
|
page read and write
|
||
23947C92000
|
heap
|
page read and write
|
||
23947DA4000
|
heap
|
page read and write
|
||
7FFB67916000
|
trusted library allocation
|
page read and write
|
||
7FFB67864000
|
trusted library allocation
|
page read and write
|
||
7FFB6787D000
|
trusted library allocation
|
page execute and read and write
|
||
23947BAF000
|
heap
|
page read and write
|
||
2392D164000
|
unkown
|
page readonly
|
||
2394DF70000
|
trusted library allocation
|
page read and write
|
||
7FFB67880000
|
trusted library allocation
|
page read and write
|
||
2392EF52000
|
trusted library allocation
|
page read and write
|
||
2392D140000
|
unkown
|
page readonly
|
||
2392D575000
|
heap
|
page read and write
|
||
2392ED50000
|
trusted library allocation
|
page read and write
|
||
2392EDE0000
|
trusted library allocation
|
page read and write
|
||
23947820000
|
heap
|
page read and write
|
||
239479C7000
|
heap
|
page read and write
|
||
2392D33D000
|
heap
|
page read and write
|
||
23947B47000
|
heap
|
page read and write
|
||
2392D310000
|
heap
|
page read and write
|
||
7FFB67A36000
|
trusted library allocation
|
page read and write
|
||
23947F0B000
|
heap
|
page read and write
|
||
7FFB6787A000
|
trusted library allocation
|
page read and write
|
||
7FFB67946000
|
trusted library allocation
|
page execute and read and write
|
||
23947866000
|
heap
|
page read and write
|
||
2394BB92000
|
trusted library allocation
|
page read and write
|
||
7FFB67A38000
|
trusted library allocation
|
page read and write
|
||
7FFB67860000
|
trusted library allocation
|
page read and write
|
||
239480B0000
|
heap
|
page execute and read and write
|
||
2392D344000
|
heap
|
page read and write
|
||
87613FE000
|
stack
|
page read and write
|
||
239479E4000
|
heap
|
page read and write
|
||
23947D1C000
|
heap
|
page read and write
|
||
239479FF000
|
heap
|
page read and write
|
||
23947DC2000
|
heap
|
page read and write
|
||
23947B55000
|
heap
|
page read and write
|
||
23947780000
|
heap
|
page read and write
|
||
23947DFF000
|
heap
|
page read and write
|
||
23947783000
|
heap
|
page read and write
|
||
7FFB67A08000
|
trusted library allocation
|
page read and write
|
||
7FFB67A30000
|
trusted library allocation
|
page read and write
|
||
875FFFE000
|
stack
|
page read and write
|
||
23947CA0000
|
heap
|
page read and write
|
||
7FFB67884000
|
trusted library allocation
|
page read and write
|
||
23947842000
|
heap
|
page read and write
|
||
7FFB678BC000
|
trusted library allocation
|
page execute and read and write
|
||
2392D33F000
|
heap
|
page read and write
|
||
23947CD5000
|
heap
|
page read and write
|
||
23947DE3000
|
heap
|
page read and write
|
||
23947CB0000
|
heap
|
page read and write
|
||
23947826000
|
heap
|
page read and write
|
||
23947CD0000
|
heap
|
page read and write
|
||
23947D30000
|
heap
|
page read and write
|
||
23947CBA000
|
heap
|
page read and write
|
||
23947887000
|
heap
|
page read and write
|
||
7FFB67A20000
|
trusted library allocation
|
page execute and read and write
|
||
23947B68000
|
heap
|
page read and write
|
||
239478E3000
|
heap
|
page read and write
|
||
23947D84000
|
heap
|
page read and write
|
||
23947A06000
|
heap
|
page read and write
|
||
7FFB6786D000
|
trusted library allocation
|
page execute and read and write
|
||
23947CAE000
|
heap
|
page read and write
|
||
23947D2B000
|
heap
|
page read and write
|
||
2392EE50000
|
heap
|
page read and write
|
||
2392D4F0000
|
heap
|
page read and write
|
||
239479B0000
|
heap
|
page read and write
|
||
23947930000
|
heap
|
page execute and read and write
|
||
2392ED53000
|
trusted library allocation
|
page read and write
|
||
87607FB000
|
stack
|
page read and write
|
||
2392D3A1000
|
heap
|
page read and write
|
||
23947C5B000
|
heap
|
page read and write
|
||
23947E0E000
|
heap
|
page read and write
|
||
23947B9D000
|
heap
|
page read and write
|
There are 121 hidden memdumps, click here to show them.