Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\test2.exe
|
"C:\Users\user\Desktop\test2.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
158.247.200.45
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
158.247.200.45
|
unknown
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
DB2000
|
unkown
|
page readonly
|
||
12A0000
|
heap
|
page read and write
|
||
7FFB4AD93000
|
trusted library allocation
|
page execute and read and write
|
||
1280000
|
heap
|
page read and write
|
||
1523000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADBD000
|
trusted library allocation
|
page execute and read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
1BC75000
|
stack
|
page read and write
|
||
17B5000
|
heap
|
page read and write
|
||
1134000
|
stack
|
page read and write
|
||
136F000
|
heap
|
page read and write
|
||
1535000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
13153000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADA2000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
DB0000
|
unkown
|
page readonly
|
||
13D7000
|
heap
|
page read and write
|
||
7FFB4AE40000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADAD000
|
trusted library allocation
|
page execute and read and write
|
||
17B0000
|
heap
|
page read and write
|
||
7FF41AF10000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ADA0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ADEC000
|
trusted library allocation
|
page execute and read and write
|
||
13C1000
|
heap
|
page read and write
|
||
DB0000
|
unkown
|
page readonly
|
||
1BB1A000
|
stack
|
page read and write
|
||
1333000
|
heap
|
page read and write
|
||
1344000
|
heap
|
page read and write
|
||
1371000
|
heap
|
page read and write
|
||
1341000
|
heap
|
page read and write
|
||
1336000
|
heap
|
page read and write
|
||
132C000
|
heap
|
page read and write
|
||
13151000
|
trusted library allocation
|
page read and write
|
||
3151000
|
trusted library allocation
|
page read and write
|
||
1B6DD000
|
stack
|
page read and write
|
||
7FFB4AD94000
|
trusted library allocation
|
page read and write
|
||
130C000
|
heap
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
1306000
|
heap
|
page read and write
|
||
7FFB4AD9D000
|
trusted library allocation
|
page execute and read and write
|
||
1375000
|
heap
|
page read and write
|
||
7FFB4ADB0000
|
trusted library allocation
|
page read and write
|
||
1BB70000
|
heap
|
page execute and read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
7FFB4AE76000
|
trusted library allocation
|
page execute and read and write
|
||
13D5000
|
heap
|
page read and write
|
||
7FFB4AF30000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE4C000
|
trusted library allocation
|
page execute and read and write
|
||
1B180000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE50000
|
trusted library allocation
|
page execute and read and write
|
||
17A0000
|
heap
|
page read and write
|
||
1331000
|
heap
|
page read and write
|
||
13158000
|
trusted library allocation
|
page read and write
|
||
3040000
|
heap
|
page execute and read and write
|
||
1B4D4000
|
heap
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
There are 52 hidden memdumps, click here to show them.