Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\apprun.exe
|
"C:\Users\user\Desktop\apprun.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.google.com
|
unknown
|
||
http://www.google.comUninstallUninstall
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1D065B87000
|
heap
|
page read and write
|
||
1D06524A000
|
heap
|
page read and write
|
||
1D065B87000
|
heap
|
page read and write
|
||
22F54320000
|
heap
|
page read and write
|
||
1D066020000
|
heap
|
page read and write
|
||
20BC4880000
|
trusted library allocation
|
page read and write
|
||
1120000
|
unkown
|
page readonly
|
||
22F5432B000
|
heap
|
page read and write
|
||
1D91A575000
|
heap
|
page read and write
|
||
20BC460F000
|
heap
|
page read and write
|
||
1D065B10000
|
heap
|
page read and write
|
||
115A000
|
unkown
|
page write copy
|
||
20BBF902000
|
heap
|
page read and write
|
||
1D8D2390000
|
heap
|
page read and write
|
||
1D065200000
|
heap
|
page read and write
|
||
20BBEE29000
|
heap
|
page read and write
|
||
1D065B87000
|
heap
|
page read and write
|
||
22F54337000
|
heap
|
page read and write
|
||
1D065150000
|
trusted library allocation
|
page read and write
|
||
233ED113000
|
heap
|
page read and write
|
||
1121000
|
unkown
|
page execute read
|
||
1D065B97000
|
heap
|
page read and write
|
||
1D06524D000
|
heap
|
page read and write
|
||
20BC46A6000
|
heap
|
page read and write
|
||
1D065B93000
|
heap
|
page read and write
|
||
270E4613000
|
heap
|
page read and write
|
||
20BC43A0000
|
trusted library allocation
|
page read and write
|
||
233ECF20000
|
heap
|
page read and write
|
||
20BC4620000
|
heap
|
page read and write
|
||
C7E27FE000
|
stack
|
page read and write
|
||
270E4629000
|
heap
|
page read and write
|
||
20BC4584000
|
trusted library allocation
|
page read and write
|
||
233ED102000
|
heap
|
page read and write
|
||
C7E267E000
|
stack
|
page read and write
|
||
115C000
|
unkown
|
page readonly
|
||
20BBEF02000
|
heap
|
page read and write
|
||
1D065261000
|
heap
|
page read and write
|
||
1D065B97000
|
heap
|
page read and write
|
||
C7E2D78000
|
stack
|
page read and write
|
||
1CC52280000
|
trusted library allocation
|
page read and write
|
||
1120000
|
unkown
|
page readonly
|
||
20BC4570000
|
trusted library allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
1D065B4D000
|
heap
|
page read and write
|
||
1D0652B4000
|
heap
|
page read and write
|
||
1CC51A00000
|
heap
|
page read and write
|
||
1D91A570000
|
heap
|
page read and write
|
||
22F5435F000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
20BC46FA000
|
heap
|
page read and write
|
||
1D065B95000
|
heap
|
page read and write
|
||
C7E28FA000
|
stack
|
page read and write
|
||
20BC46F0000
|
heap
|
page read and write
|
||
1D065213000
|
heap
|
page read and write
|
||
1D91B2C0000
|
trusted library allocation
|
page read and write
|
||
20BC46A0000
|
trusted library allocation
|
page read and write
|
||
20BC4600000
|
heap
|
page read and write
|
||
20BC4641000
|
heap
|
page read and write
|
||
1D065B95000
|
heap
|
page read and write
|
||
B5A429B000
|
stack
|
page read and write
|
||
1D8D2380000
|
heap
|
page read and write
|
||
1D91A2A8000
|
heap
|
page read and write
|
||
4A8117B000
|
stack
|
page read and write
|
||
1D065B87000
|
heap
|
page read and write
|
||
1D8D2508000
|
heap
|
page read and write
|
||
20BBEF13000
|
heap
|
page read and write
|
||
20BBFFE0000
|
trusted library section
|
page readonly
|
||
93E000
|
stack
|
page read and write
|
||
20BBED40000
|
heap
|
page read and write
|
||
1D065BAE000
|
heap
|
page read and write
|
||
1D91A550000
|
trusted library allocation
|
page read and write
|
||
20BC4693000
|
heap
|
page read and write
|
||
20BC4560000
|
trusted library allocation
|
page read and write
|
||
1CC51A62000
|
heap
|
page read and write
|
||
1CC51A60000
|
heap
|
page read and write
|
||
1D91A480000
|
trusted library allocation
|
page read and write
|
||
1D066002000
|
heap
|
page read and write
|
||
20BC48A0000
|
remote allocation
|
page read and write
|
||
270E4651000
|
heap
|
page read and write
|
||
1D0659B0000
|
remote allocation
|
page read and write
|
||
1D8D2488000
|
heap
|
page read and write
|
||
1CC52402000
|
trusted library allocation
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
1D91A29B000
|
heap
|
page read and write
|
||
22F546B0000
|
heap
|
page read and write
|
||
233ED000000
|
heap
|
page read and write
|
||
1D064FE0000
|
heap
|
page read and write
|
||
1D066000000
|
heap
|
page read and write
|
||
1D91A240000
|
heap
|
page read and write
|
||
1D065BDC000
|
heap
|
page read and write
|
||
C7E234C000
|
stack
|
page read and write
|
||
1D065B97000
|
heap
|
page read and write
|
||
4A81779000
|
stack
|
page read and write
|
||
4A81A7B000
|
stack
|
page read and write
|
||
1D065B98000
|
heap
|
page read and write
|
||
1CC51A5F000
|
heap
|
page read and write
|
||
1D8D23F0000
|
heap
|
page read and write
|
||
20BBEE7A000
|
heap
|
page read and write
|
||
98A000
|
heap
|
page read and write
|
||
20BC4870000
|
trusted library allocation
|
page read and write
|
||
1D065B9B000
|
heap
|
page read and write
|
||
1D91B070000
|
trusted library allocation
|
page read and write
|
||
114B000
|
unkown
|
page read and write
|
||
1D065313000
|
heap
|
page read and write
|
||
1D065BBA000
|
heap
|
page read and write
|
||
94C8AF9000
|
stack
|
page read and write
|
||
270E464A000
|
heap
|
page read and write
|
||
20BC4570000
|
trusted library allocation
|
page read and write
|
||
40BAC7E000
|
stack
|
page read and write
|
||
20BBF918000
|
heap
|
page read and write
|
||
4A81CFF000
|
stack
|
page read and write
|
||
1CC519E0000
|
heap
|
page read and write
|
||
1D91A1C0000
|
trusted library allocation
|
page read and write
|
||
1D065B95000
|
heap
|
page read and write
|
||
270E4470000
|
heap
|
page read and write
|
||
1D91A2BC000
|
heap
|
page read and write
|
||
20BC4700000
|
heap
|
page read and write
|
||
22F54345000
|
heap
|
page read and write
|
||
B5A49FB000
|
stack
|
page read and write
|
||
40BADFC000
|
stack
|
page read and write
|
||
1D065BA5000
|
heap
|
page read and write
|
||
1D065246000
|
heap
|
page read and write
|
||
1CC51A29000
|
heap
|
page read and write
|
||
1CC51A3C000
|
heap
|
page read and write
|
||
1D065265000
|
heap
|
page read and write
|
||
233ED002000
|
heap
|
page read and write
|
||
20BBF918000
|
heap
|
page read and write
|
||
1D065050000
|
heap
|
page read and write
|
||
1D065316000
|
heap
|
page read and write
|
||
B005FF7000
|
stack
|
page read and write
|
||
1D8D2E02000
|
trusted library allocation
|
page read and write
|
||
115C000
|
unkown
|
page readonly
|
||
20BC46F9000
|
heap
|
page read and write
|
||
1D0652B1000
|
heap
|
page read and write
|
||
270E4713000
|
heap
|
page read and write
|
||
270E4708000
|
heap
|
page read and write
|
||
270E45E0000
|
trusted library allocation
|
page read and write
|
||
94C8A7A000
|
stack
|
page read and write
|
||
4A81EFD000
|
stack
|
page read and write
|
||
1D8D243C000
|
heap
|
page read and write
|
||
94C8B7F000
|
stack
|
page read and write
|
||
20BC43B0000
|
trusted library allocation
|
page read and write
|
||
22F54351000
|
heap
|
page read and write
|
||
70A809B000
|
stack
|
page read and write
|
||
1D065A02000
|
heap
|
page read and write
|
||
1D06523C000
|
heap
|
page read and write
|
||
1121000
|
unkown
|
page execute read
|
||
70A88FF000
|
stack
|
page read and write
|
||
270E4E02000
|
trusted library allocation
|
page read and write
|
||
1D065B9E000
|
heap
|
page read and write
|
||
1D066002000
|
heap
|
page read and write
|
||
1D065B87000
|
heap
|
page read and write
|
||
20BC4540000
|
trusted library allocation
|
page read and write
|
||
22F54344000
|
heap
|
page read and write
|
||
1D8D2464000
|
heap
|
page read and write
|
||
1D8D2429000
|
heap
|
page read and write
|
||
1D8D2C90000
|
trusted library allocation
|
page read and write
|
||
20BC4564000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
114B000
|
unkown
|
page readonly
|
||
20BBF913000
|
heap
|
page read and write
|
||
1D065B99000
|
heap
|
page read and write
|
||
B005DFC000
|
stack
|
page read and write
|
||
20BC0000000
|
trusted library section
|
page readonly
|
||
233ED100000
|
heap
|
page read and write
|
||
1D065B97000
|
heap
|
page read and write
|
||
1D065B9B000
|
heap
|
page read and write
|
||
20BBEE3F000
|
heap
|
page read and write
|
||
20BBFEF0000
|
trusted library allocation
|
page read and write
|
||
22F54346000
|
heap
|
page read and write
|
||
20BC4540000
|
trusted library allocation
|
page read and write
|
||
1D065B70000
|
heap
|
page read and write
|
||
1CC51A5A000
|
heap
|
page read and write
|
||
1CC51A69000
|
heap
|
page read and write
|
||
1D91A220000
|
heap
|
page read and write
|
||
233ED7C0000
|
trusted library allocation
|
page read and write
|
||
20BC4700000
|
heap
|
page read and write
|
||
1D065249000
|
heap
|
page read and write
|
||
1D065B88000
|
heap
|
page read and write
|
||
233ED076000
|
heap
|
page read and write
|
||
B7F000
|
stack
|
page read and write
|
||
1D8D2455000
|
heap
|
page read and write
|
||
B5A4AFE000
|
stack
|
page read and write
|
||
22F54332000
|
heap
|
page read and write
|
||
1D065BD2000
|
heap
|
page read and write
|
||
114C000
|
unkown
|
page readonly
|
||
1D91A260000
|
heap
|
page read and write
|
||
1D0652E1000
|
heap
|
page read and write
|
||
1D8D2513000
|
heap
|
page read and write
|
||
1D91A2BC000
|
heap
|
page read and write
|
||
C7E277C000
|
stack
|
page read and write
|
||
270E44E0000
|
heap
|
page read and write
|
||
20BBEDE0000
|
trusted library section
|
page read and write
|
||
2EA177E000
|
stack
|
page read and write
|
||
20BBEE00000
|
heap
|
page read and write
|
||
1D065BB6000
|
heap
|
page read and write
|
||
1D065B9B000
|
heap
|
page read and write
|
||
1D91A580000
|
trusted library allocation
|
page read and write
|
||
4A81679000
|
stack
|
page read and write
|
||
1D8D2402000
|
heap
|
page read and write
|
||
20BBF815000
|
heap
|
page read and write
|
||
1D065B72000
|
heap
|
page read and write
|
||
40BA99A000
|
stack
|
page read and write
|
||
1D066002000
|
heap
|
page read and write
|
||
40BACFF000
|
stack
|
page read and write
|
||
270E4700000
|
heap
|
page read and write
|
||
4A81DFF000
|
stack
|
page read and write
|
||
1D065BD2000
|
heap
|
page read and write
|
||
B005CFF000
|
stack
|
page read and write
|
||
20BC4850000
|
trusted library allocation
|
page read and write
|
||
270E4600000
|
heap
|
page read and write
|
||
C7E2C7F000
|
unkown
|
page read and write
|
||
1D065263000
|
heap
|
page read and write
|
||
1CC51A59000
|
heap
|
page read and write
|
||
20BBEDA0000
|
heap
|
page read and write
|
||
22F54351000
|
heap
|
page read and write
|
||
233ECEB0000
|
heap
|
page read and write
|
||
1D065B13000
|
heap
|
page read and write
|
||
22F542E0000
|
heap
|
page read and write
|
||
40BAF7E000
|
stack
|
page read and write
|
||
1D066003000
|
heap
|
page read and write
|
||
20BC464E000
|
heap
|
page read and write
|
||
40BAE78000
|
stack
|
page read and write
|
||
4A8187E000
|
stack
|
page read and write
|
||
1CC51B13000
|
heap
|
page read and write
|
||
22F546B5000
|
heap
|
page read and write
|
||
20BBF958000
|
heap
|
page read and write
|
||
1CC51A53000
|
heap
|
page read and write
|
||
1D91A1B0000
|
heap
|
page read and write
|
||
1D065308000
|
heap
|
page read and write
|
||
1CC51A13000
|
heap
|
page read and write
|
||
1D066002000
|
heap
|
page read and write
|
||
94C87DD000
|
stack
|
page read and write
|
||
1CC51B08000
|
heap
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
1D91B280000
|
trusted library allocation
|
page read and write
|
||
22F5435E000
|
heap
|
page read and write
|
||
94C875D000
|
stack
|
page read and write
|
||
20BBFFF0000
|
trusted library section
|
page readonly
|
||
20BC4580000
|
trusted library allocation
|
page read and write
|
||
20BBF900000
|
heap
|
page read and write
|
||
20BC465F000
|
heap
|
page read and write
|
||
1D065B87000
|
heap
|
page read and write
|
||
20BC4548000
|
trusted library allocation
|
page read and write
|
||
22F5432D000
|
heap
|
page read and write
|
||
1D91A269000
|
heap
|
page read and write
|
||
233ECEC0000
|
heap
|
page read and write
|
||
40BAEFE000
|
stack
|
page read and write
|
||
1D8D2500000
|
heap
|
page read and write
|
||
C7E29F7000
|
stack
|
page read and write
|
||
22F54300000
|
heap
|
page read and write
|
||
1D065302000
|
heap
|
page read and write
|
||
1D065B9B000
|
heap
|
page read and write
|
||
1CC51A65000
|
heap
|
page read and write
|
||
1D065B9D000
|
heap
|
page read and write
|
||
233ED013000
|
heap
|
page read and write
|
||
20BC46AF000
|
heap
|
page read and write
|
||
20BC4810000
|
trusted library allocation
|
page read and write
|
||
77C000
|
stack
|
page read and write
|
||
20BC4702000
|
heap
|
page read and write
|
||
1D065B9F000
|
heap
|
page read and write
|
||
20BBEE13000
|
heap
|
page read and write
|
||
1D91A4F0000
|
trusted library allocation
|
page read and write
|
||
270E464E000
|
heap
|
page read and write
|
||
B0059DB000
|
stack
|
page read and write
|
||
2EA127B000
|
stack
|
page read and write
|
||
1D0652BE000
|
heap
|
page read and write
|
||
1D0652D9000
|
heap
|
page read and write
|
||
1D0652C5000
|
heap
|
page read and write
|
||
20BBEE8C000
|
heap
|
page read and write
|
||
1D065B97000
|
heap
|
page read and write
|
||
C7E23CE000
|
stack
|
page read and write
|
||
22F54280000
|
heap
|
page read and write
|
||
1CC51A5C000
|
heap
|
page read and write
|
||
1D065B0E000
|
heap
|
page read and write
|
||
233ED029000
|
heap
|
page read and write
|
||
1D065BC6000
|
heap
|
page read and write
|
||
20BC462E000
|
heap
|
page read and write
|
||
1D065B93000
|
heap
|
page read and write
|
||
1D065B93000
|
heap
|
page read and write
|
||
270E464F000
|
heap
|
page read and write
|
||
70A85FB000
|
stack
|
page read and write
|
||
22F54351000
|
heap
|
page read and write
|
||
20BC0010000
|
trusted library section
|
page readonly
|
||
1CC51980000
|
heap
|
page read and write
|
||
B5A48FE000
|
stack
|
page read and write
|
||
20BC46F3000
|
heap
|
page read and write
|
||
270E46A1000
|
heap
|
page read and write
|
||
70A819F000
|
stack
|
page read and write
|
||
1D065BAE000
|
heap
|
page read and write
|
||
270E4649000
|
heap
|
page read and write
|
||
20BC4430000
|
trusted library allocation
|
page read and write
|
||
22F54348000
|
heap
|
page read and write
|
||
C7F000
|
stack
|
page read and write
|
||
1D0652F2000
|
heap
|
page read and write
|
||
4A81BFF000
|
stack
|
page read and write
|
||
20BC4702000
|
heap
|
page read and write
|
||
1D065B95000
|
heap
|
page read and write
|
||
1D065229000
|
heap
|
page read and write
|
||
20BC4561000
|
trusted library allocation
|
page read and write
|
||
4A820FF000
|
stack
|
page read and write
|
||
C7E2BFB000
|
stack
|
page read and write
|
||
20BBF802000
|
heap
|
page read and write
|
||
C7E2AFF000
|
stack
|
page read and write
|
||
1CC51B00000
|
heap
|
page read and write
|
||
22F54337000
|
heap
|
page read and write
|
||
1CC51A27000
|
heap
|
page read and write
|
||
1D06524E000
|
heap
|
page read and write
|
||
94C8C79000
|
stack
|
page read and write
|
||
1D91A2BE000
|
heap
|
page read and write
|
||
1CC51A63000
|
heap
|
page read and write
|
||
1D8D2469000
|
heap
|
page read and write
|
||
20BBF959000
|
heap
|
page read and write
|
||
20BBED30000
|
heap
|
page read and write
|
||
1D065B99000
|
heap
|
page read and write
|
||
20BBFFD0000
|
trusted library section
|
page readonly
|
||
2EA157B000
|
stack
|
page read and write
|
||
70A84FC000
|
stack
|
page read and write
|
||
4A8197B000
|
stack
|
page read and write
|
||
1D8D2400000
|
heap
|
page read and write
|
||
20BC46E2000
|
heap
|
page read and write
|
||
67D000
|
stack
|
page read and write
|
||
20BBEE95000
|
heap
|
page read and write
|
||
270E464B000
|
heap
|
page read and write
|
||
1D065B93000
|
heap
|
page read and write
|
||
1D8D2502000
|
heap
|
page read and write
|
||
4A81578000
|
stack
|
page read and write
|
||
1D0659B0000
|
remote allocation
|
page read and write
|
||
1D91A540000
|
heap
|
page readonly
|
||
B5A47FB000
|
stack
|
page read and write
|
||
20BBEE90000
|
heap
|
page read and write
|
||
1D065221000
|
heap
|
page read and write
|
||
20BC48A0000
|
remote allocation
|
page read and write
|
||
70A86F7000
|
stack
|
page read and write
|
||
20BBEE59000
|
heap
|
page read and write
|
||
20BC0020000
|
trusted library section
|
page readonly
|
||
270E463C000
|
heap
|
page read and write
|
||
270E4480000
|
heap
|
page read and write
|
||
1CC51970000
|
heap
|
page read and write
|
||
20BC0371000
|
trusted library allocation
|
page read and write
|
||
2EA187E000
|
stack
|
page read and write
|
||
1D066002000
|
heap
|
page read and write
|
||
1CC51A5D000
|
heap
|
page read and write
|
||
20BBEEA0000
|
heap
|
page read and write
|
||
20BBEE76000
|
heap
|
page read and write
|
||
2EA1677000
|
stack
|
page read and write
|
||
20BBEEFE000
|
heap
|
page read and write
|
||
40BAD7F000
|
stack
|
page read and write
|
||
97D000
|
stack
|
page read and write
|
||
1D065B00000
|
heap
|
page read and write
|
||
1D91A490000
|
trusted library allocation
|
page read and write
|
||
1D0652A3000
|
heap
|
page read and write
|
||
1D065BC6000
|
heap
|
page read and write
|
||
70A87FF000
|
stack
|
page read and write
|
||
1CC51A6A000
|
heap
|
page read and write
|
||
270E4702000
|
heap
|
page read and write
|
||
94C86DB000
|
stack
|
page read and write
|
||
1CC51A5B000
|
heap
|
page read and write
|
||
1D91A579000
|
heap
|
page read and write
|
||
270E466F000
|
heap
|
page read and write
|
||
20BC4860000
|
trusted library allocation
|
page read and write
|
||
270E467D000
|
heap
|
page read and write
|
||
B0061FF000
|
stack
|
page read and write
|
||
1D066002000
|
heap
|
page read and write
|
||
270E4699000
|
heap
|
page read and write
|
||
20BBF800000
|
heap
|
page read and write
|
||
1D91A530000
|
trusted library allocation
|
page read and write
|
||
1D8D2413000
|
heap
|
page read and write
|
||
20BC46DE000
|
heap
|
page read and write
|
||
270E464C000
|
heap
|
page read and write
|
||
1D066002000
|
heap
|
page read and write
|
||
1D065B9B000
|
heap
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
4A81D7F000
|
stack
|
page read and write
|
||
4A81AFE000
|
stack
|
page read and write
|
||
1D0652AA000
|
heap
|
page read and write
|
||
20BBEDD0000
|
trusted library allocation
|
page read and write
|
||
20BC03A0000
|
trusted library allocation
|
page read and write
|
||
22F54362000
|
heap
|
page read and write
|
||
20BC4420000
|
trusted library allocation
|
page read and write
|
||
233ED802000
|
trusted library allocation
|
page read and write
|
||
1D91A2BC000
|
heap
|
page read and write
|
||
B005EFB000
|
stack
|
page read and write
|
||
115A000
|
unkown
|
page read and write
|
||
2EA12FF000
|
stack
|
page read and write
|
||
94C8BFF000
|
stack
|
page read and write
|
||
1CC51B02000
|
heap
|
page read and write
|
||
B005C7E000
|
stack
|
page read and write
|
||
1CC51A8A000
|
heap
|
page read and write
|
||
4A81B7E000
|
stack
|
page read and write
|
||
1D0659B0000
|
remote allocation
|
page read and write
|
||
20BC46D7000
|
heap
|
page read and write
|
||
1D0652EA000
|
heap
|
page read and write
|
||
233ED03C000
|
heap
|
page read and write
|
||
1D06524B000
|
heap
|
page read and write
|
||
20BBEE70000
|
heap
|
page read and write
|
||
20BC4690000
|
trusted library allocation
|
page read and write
|
||
2EA137E000
|
stack
|
page read and write
|
||
1D064FF0000
|
heap
|
page read and write
|
||
1D065289000
|
heap
|
page read and write
|
||
B0060FE000
|
stack
|
page read and write
|
||
20BC454E000
|
trusted library allocation
|
page read and write
|
||
1D8D247D000
|
heap
|
page read and write
|
||
233ED053000
|
heap
|
page read and write
|
||
1D065B94000
|
heap
|
page read and write
|
||
20BC48A0000
|
remote allocation
|
page read and write
|
||
1D065BD8000
|
heap
|
page read and write
|
||
1CC51A66000
|
heap
|
page read and write
|
||
1D065247000
|
heap
|
page read and write
|
||
22F54363000
|
heap
|
page read and write
|
||
70A811E000
|
stack
|
page read and write
|
There are 401 hidden memdumps, click here to show them.