Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Wo0CkmOz64.exe
|
"C:\Users\user\Desktop\Wo0CkmOz64.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
80.76.49.148
|
unknown
|
Bulgaria
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
12F41000
|
trusted library allocation
|
page read and write
|
||
13171000
|
trusted library allocation
|
page read and write
|
||
1BBA0000
|
trusted library section
|
page read and write
|
||
1B690000
|
trusted library section
|
page read and write
|
||
2C11000
|
trusted library allocation
|
page read and write
|
||
1B5DD000
|
stack
|
page read and write
|
||
1BB13000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
3051000
|
trusted library allocation
|
page read and write
|
||
30F7000
|
trusted library allocation
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
E0C000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
30C1000
|
trusted library allocation
|
page read and write
|
||
2E31000
|
trusted library allocation
|
page read and write
|
||
30CF000
|
trusted library allocation
|
page read and write
|
||
3111000
|
trusted library allocation
|
page read and write
|
||
EFB000
|
heap
|
page read and write
|
||
2E05000
|
trusted library allocation
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
31C9000
|
trusted library allocation
|
page read and write
|
||
1BB19000
|
heap
|
page read and write
|
||
2DE5000
|
trusted library allocation
|
page read and write
|
||
7FFD3456D000
|
trusted library allocation
|
page execute and read and write
|
||
2DA1000
|
trusted library allocation
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
316B000
|
trusted library allocation
|
page read and write
|
||
7FFD34606000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
3173000
|
trusted library allocation
|
page read and write
|
||
B81000
|
stack
|
page read and write
|
||
3159000
|
trusted library allocation
|
page read and write
|
||
30B5000
|
trusted library allocation
|
page read and write
|
||
2E39000
|
trusted library allocation
|
page read and write
|
||
3147000
|
trusted library allocation
|
page read and write
|
||
2DA5000
|
trusted library allocation
|
page read and write
|
||
1AF97000
|
heap
|
page read and write
|
||
303D000
|
trusted library allocation
|
page read and write
|
||
31DD000
|
trusted library allocation
|
page read and write
|
||
3163000
|
trusted library allocation
|
page read and write
|
||
3044000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
E3F000
|
heap
|
page read and write
|
||
30F3000
|
trusted library allocation
|
page read and write
|
||
1C77D000
|
stack
|
page read and write
|
||
3167000
|
trusted library allocation
|
page read and write
|
||
1BA9E000
|
stack
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page execute and read and write
|
||
2E21000
|
trusted library allocation
|
page read and write
|
||
1BE7B000
|
stack
|
page read and write
|
||
2DC7000
|
trusted library allocation
|
page read and write
|
||
3015000
|
trusted library allocation
|
page read and write
|
||
2DD1000
|
trusted library allocation
|
page read and write
|
||
2DDD000
|
trusted library allocation
|
page read and write
|
||
E41000
|
heap
|
page read and write
|
||
318B000
|
trusted library allocation
|
page read and write
|
||
30AD000
|
trusted library allocation
|
page read and write
|
||
31E1000
|
trusted library allocation
|
page read and write
|
||
7FFD34574000
|
trusted library allocation
|
page read and write
|
||
30D3000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
1BADC000
|
heap
|
page read and write
|
||
1C27C000
|
stack
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
1BAC0000
|
heap
|
page read and write
|
||
2E13000
|
trusted library allocation
|
page read and write
|
||
1BACB000
|
heap
|
page read and write
|
||
1BAAA000
|
heap
|
page read and write
|
||
7FFD345AC000
|
trusted library allocation
|
page execute and read and write
|
||
2E25000
|
trusted library allocation
|
page read and write
|
||
30A1000
|
trusted library allocation
|
page read and write
|
||
E6B000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
30A9000
|
trusted library allocation
|
page read and write
|
||
30FF000
|
trusted library allocation
|
page read and write
|
||
1C37D000
|
stack
|
page read and write
|
||
303F000
|
trusted library allocation
|
page read and write
|
||
3177000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
3127000
|
trusted library allocation
|
page read and write
|
||
1BB1F000
|
heap
|
page read and write
|
||
A54000
|
unkown
|
page readonly
|
||
30BD000
|
trusted library allocation
|
page read and write
|
||
313B000
|
trusted library allocation
|
page read and write
|
||
2E2D000
|
trusted library allocation
|
page read and write
|
||
3075000
|
trusted library allocation
|
page read and write
|
||
314F000
|
trusted library allocation
|
page read and write
|
||
1C897000
|
heap
|
page read and write
|
||
310D000
|
trusted library allocation
|
page read and write
|
||
31B7000
|
trusted library allocation
|
page read and write
|
||
2E3D000
|
trusted library allocation
|
page read and write
|
||
2DF5000
|
trusted library allocation
|
page read and write
|
||
31A9000
|
trusted library allocation
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
319D000
|
trusted library allocation
|
page read and write
|
||
30EF000
|
trusted library allocation
|
page read and write
|
||
1BAA2000
|
heap
|
page read and write
|
||
7FFD3460C000
|
trusted library allocation
|
page execute and read and write
|
||
3137000
|
trusted library allocation
|
page read and write
|
||
1C07D000
|
stack
|
page read and write
|
||
311F000
|
trusted library allocation
|
page read and write
|
||
3031000
|
trusted library allocation
|
page read and write
|
||
3123000
|
trusted library allocation
|
page read and write
|
||
306F000
|
trusted library allocation
|
page read and write
|
||
7FFD34553000
|
trusted library allocation
|
page execute and read and write
|
||
10EF000
|
stack
|
page read and write
|
||
2DCD000
|
trusted library allocation
|
page read and write
|
||
2E29000
|
trusted library allocation
|
page read and write
|
||
318F000
|
trusted library allocation
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
31CD000
|
trusted library allocation
|
page read and write
|
||
1C880000
|
heap
|
page read and write
|
||
2DF9000
|
trusted library allocation
|
page read and write
|
||
2DE1000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
2DED000
|
trusted library allocation
|
page read and write
|
||
303B000
|
trusted library allocation
|
page read and write
|
||
305D000
|
trusted library allocation
|
page read and write
|
||
30B9000
|
trusted library allocation
|
page read and write
|
||
1BAF7000
|
heap
|
page read and write
|
||
2DAF000
|
trusted library allocation
|
page read and write
|
||
30EB000
|
trusted library allocation
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
2E41000
|
trusted library allocation
|
page read and write
|
||
1BD3A000
|
stack
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
2DC3000
|
trusted library allocation
|
page read and write
|
||
7FFD3457B000
|
trusted library allocation
|
page execute and read and write
|
||
306B000
|
trusted library allocation
|
page read and write
|
||
2E0B000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
313F000
|
trusted library allocation
|
page read and write
|
||
317B000
|
trusted library allocation
|
page read and write
|
||
1B19D000
|
stack
|
page read and write
|
||
7FFD34554000
|
trusted library allocation
|
page read and write
|
||
2E0F000
|
trusted library allocation
|
page read and write
|
||
1C893000
|
heap
|
page read and write
|
||
3089000
|
trusted library allocation
|
page read and write
|
||
3115000
|
trusted library allocation
|
page read and write
|
||
11EA000
|
stack
|
page read and write
|
||
2DFD000
|
trusted library allocation
|
page read and write
|
||
2DD5000
|
trusted library allocation
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
12C11000
|
trusted library allocation
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
3018000
|
trusted library allocation
|
page read and write
|
||
31D1000
|
trusted library allocation
|
page read and write
|
||
3099000
|
trusted library allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
30DF000
|
trusted library allocation
|
page read and write
|
||
315F000
|
trusted library allocation
|
page read and write
|
||
3119000
|
trusted library allocation
|
page read and write
|
||
E75000
|
heap
|
page read and write
|
||
2BB0000
|
trusted library section
|
page read and write
|
||
30E3000
|
trusted library allocation
|
page read and write
|
||
3199000
|
trusted library allocation
|
page read and write
|
||
31AD000
|
trusted library allocation
|
page read and write
|
||
3083000
|
trusted library allocation
|
page read and write
|
||
31B3000
|
trusted library allocation
|
page read and write
|
||
307D000
|
trusted library allocation
|
page read and write
|
||
2DB7000
|
trusted library allocation
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
12DC0000
|
trusted library allocation
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
982000
|
unkown
|
page readonly
|
||
30D7000
|
trusted library allocation
|
page read and write
|
||
3061000
|
trusted library allocation
|
page read and write
|
||
3143000
|
trusted library allocation
|
page read and write
|
||
3109000
|
trusted library allocation
|
page read and write
|
||
E2A000
|
heap
|
page read and write
|
||
1083000
|
trusted library allocation
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD34636000
|
trusted library allocation
|
page execute and read and write
|
||
31BF000
|
trusted library allocation
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
31C5000
|
trusted library allocation
|
page read and write
|
||
2DD9000
|
trusted library allocation
|
page read and write
|
||
1B789000
|
trusted library section
|
page read and write
|
||
1C88D000
|
heap
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
3195000
|
trusted library allocation
|
page read and write
|
||
3133000
|
trusted library allocation
|
page read and write
|
||
3187000
|
trusted library allocation
|
page read and write
|
||
2DE9000
|
trusted library allocation
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
31A1000
|
trusted library allocation
|
page read and write
|
||
1B680000
|
heap
|
page execute and read and write
|
||
E7B000
|
heap
|
page read and write
|
||
1C887000
|
heap
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
1BAFC000
|
heap
|
page read and write
|
||
7FFD34562000
|
trusted library allocation
|
page read and write
|
||
30DB000
|
trusted library allocation
|
page read and write
|
||
309D000
|
trusted library allocation
|
page read and write
|
||
7FF43AA10000
|
trusted library allocation
|
page execute and read and write
|
||
E06000
|
heap
|
page read and write
|
||
3067000
|
trusted library allocation
|
page read and write
|
||
E6D000
|
heap
|
page read and write
|
||
1BF7A000
|
stack
|
page read and write
|
||
1336B000
|
trusted library allocation
|
page read and write
|
||
1BB28000
|
heap
|
page read and write
|
||
2E35000
|
trusted library allocation
|
page read and write
|
||
317F000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page execute and read and write
|
||
3012000
|
trusted library allocation
|
page read and write
|
||
312F000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
2E1D000
|
trusted library allocation
|
page read and write
|
||
3095000
|
trusted library allocation
|
page read and write
|
||
31D9000
|
trusted library allocation
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
30A5000
|
trusted library allocation
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
3183000
|
trusted library allocation
|
page read and write
|
||
1AC40000
|
trusted library allocation
|
page read and write
|
||
7FFD3455D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
1C67D000
|
stack
|
page read and write
|
||
3059000
|
trusted library allocation
|
page read and write
|
||
3103000
|
trusted library allocation
|
page read and write
|
||
308D000
|
trusted library allocation
|
page read and write
|
||
30FB000
|
trusted library allocation
|
page read and write
|
||
31C3000
|
trusted library allocation
|
page read and write
|
||
1BB0F000
|
heap
|
page read and write
|
||
1C47D000
|
stack
|
page read and write
|
||
3055000
|
trusted library allocation
|
page read and write
|
||
312B000
|
trusted library allocation
|
page read and write
|
||
7FFD34769000
|
trusted library allocation
|
page read and write
|
||
3079000
|
trusted library allocation
|
page read and write
|
||
2C00000
|
heap
|
page execute and read and write
|
||
1BAF2000
|
heap
|
page read and write
|
||
1BB08000
|
heap
|
page read and write
|
||
30C9000
|
trusted library allocation
|
page read and write
|
||
7FFD3478A000
|
trusted library allocation
|
page read and write
|
||
1C57D000
|
stack
|
page read and write
|
||
1B89F000
|
stack
|
page read and write
|
||
2E19000
|
trusted library allocation
|
page read and write
|
||
30B1000
|
trusted library allocation
|
page read and write
|
||
7FFD3479E000
|
trusted library allocation
|
page read and write
|
||
316F000
|
trusted library allocation
|
page read and write
|
||
1C87D000
|
stack
|
page read and write
|
||
31BB000
|
trusted library allocation
|
page read and write
|
||
31D5000
|
trusted library allocation
|
page read and write
|
||
30E7000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
2DAC000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
1BAFA000
|
heap
|
page read and write
|
||
1B99E000
|
stack
|
page read and write
|
||
2E01000
|
trusted library allocation
|
page read and write
|
||
2DF1000
|
trusted library allocation
|
page read and write
|
||
314B000
|
trusted library allocation
|
page read and write
|
||
3091000
|
trusted library allocation
|
page read and write
|
||
2DBD000
|
trusted library allocation
|
page read and write
|
||
31A5000
|
trusted library allocation
|
page read and write
|
||
1BAA0000
|
heap
|
page read and write
|
||
1C17D000
|
stack
|
page read and write
|
||
3153000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
There are 253 hidden memdumps, click here to show them.