Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\wr.exe
|
"C:\Users\user\Desktop\wr.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.dblikes.top/winconsistent
|
unknown
|
||
https://www.sysinternals.com0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ghs.googlehosted.com
|
173.194.209.121
|
||
www.dblikes.top
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C000410000
|
direct allocation
|
page read and write
|
||
C1439FD000
|
stack
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
C0000DA000
|
direct allocation
|
page read and write
|
||
2685E193000
|
heap
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
C0005D0000
|
direct allocation
|
page read and write
|
||
C0000FA000
|
direct allocation
|
page read and write
|
||
2685E193000
|
heap
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
C000146000
|
direct allocation
|
page read and write
|
||
2685DFA0000
|
heap
|
page read and write
|
||
2685E17E000
|
heap
|
page read and write
|
||
C00003E000
|
direct allocation
|
page read and write
|
||
C000500000
|
direct allocation
|
page read and write
|
||
D9A000
|
unkown
|
page execute and write copy
|
||
C000230000
|
direct allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
26863C73000
|
direct allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
C000550000
|
direct allocation
|
page read and write
|
||
C1435FE000
|
stack
|
page read and write
|
||
C000430000
|
direct allocation
|
page read and write
|
||
26863CB0000
|
direct allocation
|
page read and write
|
||
C000172000
|
direct allocation
|
page read and write
|
||
26863C70000
|
direct allocation
|
page read and write
|
||
C0005B0000
|
direct allocation
|
page read and write
|
||
960000
|
unkown
|
page execute and write copy
|
||
C000352000
|
direct allocation
|
page read and write
|
||
C000580000
|
direct allocation
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
2685E0D5000
|
heap
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
C000188000
|
direct allocation
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
26863C7B000
|
direct allocation
|
page read and write
|
||
C000029000
|
direct allocation
|
page read and write
|
||
C000275000
|
direct allocation
|
page read and write
|
||
91C000
|
unkown
|
page execute and read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
C000043000
|
direct allocation
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
2685E17A000
|
heap
|
page read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
C000210000
|
direct allocation
|
page read and write
|
||
B1A000
|
unkown
|
page execute and read and write
|
||
C0000E4000
|
direct allocation
|
page read and write
|
||
2685E17E000
|
heap
|
page read and write
|
||
C0000F2000
|
direct allocation
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
C0000C4000
|
direct allocation
|
page read and write
|
||
C000530000
|
direct allocation
|
page read and write
|
||
2685E080000
|
heap
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
C0003D6000
|
direct allocation
|
page read and write
|
||
C142DFD000
|
stack
|
page read and write
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
C000142000
|
direct allocation
|
page read and write
|
||
C0000F4000
|
direct allocation
|
page read and write
|
||
C000490000
|
direct allocation
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
C000520000
|
direct allocation
|
page read and write
|
||
C000570000
|
direct allocation
|
page read and write
|
||
2685E140000
|
direct allocation
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
C0004E0000
|
direct allocation
|
page read and write
|
||
2685E193000
|
heap
|
page read and write
|
||
C0000EA000
|
direct allocation
|
page read and write
|
||
C0000C0000
|
direct allocation
|
page read and write
|
||
2685E15C000
|
heap
|
page read and write
|
||
C000220000
|
direct allocation
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
C000279000
|
direct allocation
|
page read and write
|
||
C0003FE000
|
direct allocation
|
page read and write
|
||
C0000EC000
|
direct allocation
|
page read and write
|
||
C1433FF000
|
stack
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
C00005A000
|
direct allocation
|
page read and write
|
||
C0003B0000
|
direct allocation
|
page read and write
|
||
C0000CC000
|
direct allocation
|
page read and write
|
||
C0000E2000
|
direct allocation
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
C0000E8000
|
direct allocation
|
page read and write
|
||
C143DFE000
|
stack
|
page read and write
|
||
C000166000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
C000440000
|
direct allocation
|
page read and write
|
||
C000027000
|
direct allocation
|
page read and write
|
||
C00019A000
|
direct allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
2685E0C0000
|
direct allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
C000168000
|
direct allocation
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
2685E0D0000
|
heap
|
page read and write
|
||
C1437FE000
|
stack
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
AF2000
|
unkown
|
page execute and read and write
|
||
26863B50000
|
direct allocation
|
page read and write
|
||
BA2000
|
unkown
|
page execute and read and write
|
||
C143BFE000
|
stack
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
C00037A000
|
direct allocation
|
page read and write
|
||
C000380000
|
direct allocation
|
page read and write
|
||
2685E0E9000
|
direct allocation
|
page read and write
|
||
C00027D000
|
direct allocation
|
page read and write
|
||
C000058000
|
direct allocation
|
page read and write
|
||
B21000
|
unkown
|
page execute and read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
C000470000
|
direct allocation
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
2685E193000
|
heap
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
2685E0E4000
|
direct allocation
|
page read and write
|
||
C000460000
|
direct allocation
|
page read and write
|
||
C1431FF000
|
stack
|
page read and write
|
||
2685E0E0000
|
direct allocation
|
page read and write
|
||
2685E184000
|
heap
|
page read and write
|
||
2685E193000
|
heap
|
page read and write
|
||
C0004C0000
|
direct allocation
|
page read and write
|
||
C000047000
|
direct allocation
|
page read and write
|
||
C000271000
|
direct allocation
|
page read and write
|
||
C000273000
|
direct allocation
|
page read and write
|
||
C000240000
|
direct allocation
|
page read and write
|
||
26863E90000
|
direct allocation
|
page read and write
|
||
C0000DC000
|
direct allocation
|
page read and write
|
||
C0003FC000
|
direct allocation
|
page read and write
|
||
2685E150000
|
heap
|
page read and write
|
||
D9B000
|
unkown
|
page write copy
|
||
C142FFE000
|
stack
|
page read and write
|
||
C000310000
|
direct allocation
|
page read and write
|
||
B1E000
|
unkown
|
page execute and read and write
|
||
C0000D2000
|
direct allocation
|
page read and write
|
||
C0000E0000
|
direct allocation
|
page read and write
|
||
D35000
|
unkown
|
page execute and read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
C00037C000
|
direct allocation
|
page read and write
|
||
C000590000
|
direct allocation
|
page read and write
|
||
D9B000
|
unkown
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
C0000DE000
|
direct allocation
|
page read and write
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
C00004E000
|
direct allocation
|
page read and write
|
||
C000420000
|
direct allocation
|
page read and write
|
||
C0000AE000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
AEC000
|
unkown
|
page execute and read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
C0003C0000
|
direct allocation
|
page read and write
|
||
5B1000
|
unkown
|
page execute and read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C0000D0000
|
direct allocation
|
page read and write
|
||
C0000A2000
|
direct allocation
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
26863E80000
|
direct allocation
|
page read and write
|
||
C0003D8000
|
direct allocation
|
page read and write
|
||
26863B60000
|
direct allocation
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
C000260000
|
direct allocation
|
page read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
2685E177000
|
heap
|
page read and write
|
||
2685E0A0000
|
heap
|
page read and write
|
||
26863B55000
|
direct allocation
|
page read and write
|
||
C000250000
|
direct allocation
|
page read and write
|
||
26863ECB000
|
direct allocation
|
page read and write
|
||
C0005A0000
|
direct allocation
|
page read and write
|
There are 166 hidden memdumps, click here to show them.