Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\#Inv_PI29467018.pdf.vbs"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://41.216.183.13/Users_API/gavrels/file_splnzgmx.ozu.txt
|
41.216.183.13
|
||
http://41.216.183.
|
unknown
|
||
http://41.216.183.13/Users_APhO
|
unknown
|
||
http://41.216.183.13/Users_API/gavrels/file_splnzgmx.ozu.txt.
|
unknown
|
||
http://41.216.183.13/Users_API/gavrels/file_splnzgmx.ozu.txtssesROAMIN
|
unknown
|
||
http://41.216.183.13/Users_API/gavre
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
41.216.183.13
|
unknown
|
South Africa
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2107CD80000
|
heap
|
page read and write
|
||
2107CC4D000
|
heap
|
page read and write
|
||
2107AE5B000
|
heap
|
page read and write
|
||
2107CD92000
|
heap
|
page read and write
|
||
2107CC4D000
|
heap
|
page read and write
|
||
2107D703000
|
heap
|
page read and write
|
||
2107CC4D000
|
heap
|
page read and write
|
||
2107ADB0000
|
heap
|
page read and write
|
||
2107CC42000
|
heap
|
page read and write
|
||
2107AE5B000
|
heap
|
page read and write
|
||
2107ADF0000
|
heap
|
page read and write
|
||
2107D1B0000
|
heap
|
page read and write
|
||
F8DCCF5000
|
stack
|
page read and write
|
||
2107CC4D000
|
heap
|
page read and write
|
||
2107ADDF000
|
heap
|
page read and write
|
||
2107CC30000
|
heap
|
page read and write
|
||
2107D703000
|
heap
|
page read and write
|
||
2107D70B000
|
heap
|
page read and write
|
||
2107D090000
|
heap
|
page read and write
|
||
2107AE83000
|
heap
|
page read and write
|
||
2107AE43000
|
heap
|
page read and write
|
||
2107D718000
|
heap
|
page read and write
|
||
2107D2A0000
|
heap
|
page read and write
|
||
2107AE94000
|
heap
|
page read and write
|
||
2107D6FC000
|
heap
|
page read and write
|
||
2107CC3A000
|
heap
|
page read and write
|
||
2107AE93000
|
heap
|
page read and write
|
||
2107B055000
|
heap
|
page read and write
|
||
2107D700000
|
heap
|
page read and write
|
||
2107CC4E000
|
heap
|
page read and write
|
||
2107AE8D000
|
heap
|
page read and write
|
||
2107CD90000
|
heap
|
page read and write
|
||
2107D020000
|
heap
|
page read and write
|
||
2107CEF3000
|
heap
|
page read and write
|
||
2107CC49000
|
heap
|
page read and write
|
||
2107D100000
|
heap
|
page read and write
|
||
2107ADEE000
|
heap
|
page read and write
|
||
2107AE5D000
|
heap
|
page read and write
|
||
2107D704000
|
heap
|
page read and write
|
||
2107ADE0000
|
heap
|
page read and write
|
||
2107CC4D000
|
heap
|
page read and write
|
||
2107CC32000
|
heap
|
page read and write
|
||
2107CC4F000
|
heap
|
page read and write
|
||
2107AE20000
|
heap
|
page read and write
|
||
2107CC5E000
|
heap
|
page read and write
|
||
2107D6D1000
|
heap
|
page read and write
|
||
2107AE3E000
|
heap
|
page read and write
|
||
F8DD0FE000
|
stack
|
page read and write
|
||
2107AE2D000
|
heap
|
page read and write
|
||
2107AE89000
|
heap
|
page read and write
|
||
F8DD1FF000
|
stack
|
page read and write
|
||
2107F010000
|
trusted library allocation
|
page read and write
|
||
2107D6F3000
|
heap
|
page read and write
|
||
2107CEF5000
|
heap
|
page read and write
|
||
2107AE0E000
|
heap
|
page read and write
|
||
2107ADF9000
|
heap
|
page read and write
|
||
2107AE5D000
|
heap
|
page read and write
|
||
2107AE20000
|
heap
|
page read and write
|
||
2107ADDA000
|
heap
|
page read and write
|
||
2107AD30000
|
heap
|
page read and write
|
||
2107CD9A000
|
heap
|
page read and write
|
||
2107AE2F000
|
heap
|
page read and write
|
||
F8DCDFE000
|
stack
|
page read and write
|
||
2107AE20000
|
heap
|
page read and write
|
||
2107CC3E000
|
heap
|
page read and write
|
||
2107AE3D000
|
heap
|
page read and write
|
||
2107AE05000
|
heap
|
page read and write
|
||
2107AE43000
|
heap
|
page read and write
|
||
2107AE9B000
|
heap
|
page read and write
|
||
2107AE84000
|
heap
|
page read and write
|
||
2107D2B0000
|
trusted library allocation
|
page read and write
|
||
2107D105000
|
heap
|
page read and write
|
||
2107AE20000
|
heap
|
page read and write
|
||
2107CC39000
|
heap
|
page read and write
|
||
2107CC5E000
|
heap
|
page read and write
|
||
2107D6B0000
|
heap
|
page read and write
|
||
2107D700000
|
heap
|
page read and write
|
||
2107D705000
|
heap
|
page read and write
|
||
2107CC31000
|
heap
|
page read and write
|
||
2107CEEE000
|
heap
|
page read and write
|
||
2107AE5B000
|
heap
|
page read and write
|
||
2107ADF9000
|
heap
|
page read and write
|
||
2107CC4D000
|
heap
|
page read and write
|
||
2107AFC0000
|
heap
|
page read and write
|
||
2107D70B000
|
heap
|
page read and write
|
||
2107AE5D000
|
heap
|
page read and write
|
||
2107AD40000
|
heap
|
page read and write
|
||
2107AE2C000
|
heap
|
page read and write
|
||
F8DD4FB000
|
stack
|
page read and write
|
||
2107AE88000
|
heap
|
page read and write
|
||
2107AE3D000
|
heap
|
page read and write
|
||
2107AE34000
|
heap
|
page read and write
|
||
2107CC34000
|
heap
|
page read and write
|
||
2107AE05000
|
heap
|
page read and write
|
||
2107AE3C000
|
heap
|
page read and write
|
||
2107CEE0000
|
heap
|
page read and write
|
||
2107ADF9000
|
heap
|
page read and write
|
||
2107ADB7000
|
heap
|
page read and write
|
||
2107AE43000
|
heap
|
page read and write
|
||
2107CC32000
|
heap
|
page read and write
|
||
2107AE83000
|
heap
|
page read and write
|
||
2107AD60000
|
heap
|
page read and write
|
||
2107D703000
|
heap
|
page read and write
|
||
2107D6F9000
|
heap
|
page read and write
|
||
2107D70A000
|
heap
|
page read and write
|
||
F8DD2FE000
|
stack
|
page read and write
|
||
2107AE5B000
|
heap
|
page read and write
|
||
2107B050000
|
heap
|
page read and write
|
||
2107CC45000
|
heap
|
page read and write
|
||
2107AE88000
|
heap
|
page read and write
|
||
F8DCEFE000
|
stack
|
page read and write
|
||
2107AE83000
|
heap
|
page read and write
|
||
2107AE96000
|
heap
|
page read and write
|
||
2107ADD9000
|
heap
|
page read and write
|
||
2107AE83000
|
heap
|
page read and write
|
||
2107AE5D000
|
heap
|
page read and write
|
||
F8DD3FE000
|
stack
|
page read and write
|
||
2107AE83000
|
heap
|
page read and write
|
||
2107AFC4000
|
heap
|
page read and write
|
||
2107D110000
|
heap
|
page read and write
|
||
2107CC3E000
|
heap
|
page read and write
|
||
F8DD5FE000
|
stack
|
page read and write
|
||
2107D030000
|
heap
|
page read and write
|
||
2107CC4D000
|
heap
|
page read and write
|
||
2107CC36000
|
heap
|
page read and write
|
||
2107AE90000
|
heap
|
page read and write
|
||
2107ADEC000
|
heap
|
page read and write
|
||
2107B000000
|
heap
|
page read and write
|
||
2107AE8F000
|
heap
|
page read and write
|
||
2107CC33000
|
heap
|
page read and write
|
||
2107D6CB000
|
heap
|
page read and write
|
||
2107CC3E000
|
heap
|
page read and write
|
||
F8DD6FE000
|
stack
|
page read and write
|
||
2107AE83000
|
heap
|
page read and write
|
||
2107D6F3000
|
heap
|
page read and write
|
||
2107CC4D000
|
heap
|
page read and write
|
There are 126 hidden memdumps, click here to show them.