Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
87.120.113.179
|
|||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
87.120.113.179
|
unknown
|
Bulgaria
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B22000
|
unkown
|
page readonly
|
||
2FE1000
|
trusted library allocation
|
page read and write
|
||
1046000
|
heap
|
page read and write
|
||
12FF1000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
2E67000
|
heap
|
page read and write
|
||
10AD000
|
heap
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
1BD74000
|
stack
|
page read and write
|
||
1B45D000
|
stack
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
1C0F5000
|
heap
|
page read and write
|
||
1C112000
|
heap
|
page read and write
|
||
1C098000
|
heap
|
page read and write
|
||
1BF7E000
|
stack
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
7FF848D8C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
132C000
|
stack
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
1BB74000
|
stack
|
page read and write
|
||
1C119000
|
heap
|
page read and write
|
||
1C96C000
|
stack
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
1B840000
|
heap
|
page read and write
|
||
1153000
|
trusted library allocation
|
page read and write
|
||
7FF848D33000
|
trusted library allocation
|
page execute and read and write
|
||
1C115000
|
heap
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
1C36D000
|
stack
|
page read and write
|
||
1C07D000
|
stack
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DEC000
|
trusted library allocation
|
page execute and read and write
|
||
1225000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
1B995000
|
stack
|
page read and write
|
||
1B893000
|
heap
|
page read and write
|
||
1C080000
|
heap
|
page read and write
|
||
142F000
|
stack
|
page read and write
|
||
1B010000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
7FF848D34000
|
trusted library allocation
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page execute and read and write
|
||
B20000
|
unkown
|
page readonly
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
1C56F000
|
stack
|
page read and write
|
||
1B890000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
7FF848DE6000
|
trusted library allocation
|
page read and write
|
||
1585000
|
heap
|
page read and write
|
||
1C86C000
|
stack
|
page read and write
|
||
2FD0000
|
heap
|
page execute and read and write
|
||
1C11E000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
7FF848D5B000
|
trusted library allocation
|
page execute and read and write
|
||
1104000
|
heap
|
page read and write
|
||
1C0D4000
|
heap
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
12FE1000
|
trusted library allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
1BA70000
|
heap
|
page execute and read and write
|
||
7FF848E50000
|
trusted library allocation
|
page execute and read and write
|
||
FD0000
|
heap
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
||
1C121000
|
heap
|
page read and write
|
||
7FF848D3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
1B7DE000
|
stack
|
page read and write
|
||
EF1000
|
stack
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
1BC7A000
|
stack
|
page read and write
|
||
7FF488050000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
1BE7E000
|
stack
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page execute and read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
7FF848D42000
|
trusted library allocation
|
page read and write
|
||
1C134000
|
heap
|
page read and write
|
||
1081000
|
heap
|
page read and write
|
||
1C12B000
|
heap
|
page read and write
|
||
152B000
|
stack
|
page read and write
|
||
106C000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
1C76A000
|
stack
|
page read and write
|
There are 81 hidden memdumps, click here to show them.