Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Implosions.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Implosions.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Implosions.exe
|
"C:\Users\user\Desktop\Implosions.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ipinfo.io/ip%appdata%
|
unknown
|
||
https://api.ipify.orgcookiesSaturnWalletWeb
|
unknown
|
||
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
792000
|
unkown
|
page readonly
|
||
5F10000
|
trusted library allocation
|
page execute and read and write
|
||
7BCE000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
107D000
|
trusted library allocation
|
page execute and read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
106F000
|
stack
|
page read and write
|
||
5FB0000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
10A2000
|
trusted library allocation
|
page read and write
|
||
3AD1000
|
trusted library allocation
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
B57000
|
stack
|
page read and write
|
||
5BBD000
|
heap
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
80D0000
|
trusted library allocation
|
page read and write
|
||
A36F000
|
stack
|
page read and write
|
||
1215000
|
heap
|
page read and write
|
||
10A7000
|
trusted library allocation
|
page execute and read and write
|
||
EB7000
|
heap
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
1074000
|
trusted library allocation
|
page read and write
|
||
5D20000
|
heap
|
page read and write
|
||
5BA0000
|
heap
|
page read and write
|
||
6078000
|
heap
|
page read and write
|
||
5071000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
545D000
|
stack
|
page read and write
|
||
6050000
|
trusted library allocation
|
page execute and read and write
|
||
4F81000
|
trusted library allocation
|
page read and write
|
||
3AE1000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
heap
|
page read and write
|
||
5D46000
|
heap
|
page read and write
|
||
F16000
|
heap
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
5BAA000
|
heap
|
page read and write
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
A46F000
|
stack
|
page read and write
|
||
7A8E000
|
stack
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
794E000
|
stack
|
page read and write
|
||
5358000
|
heap
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page execute and read and write
|
||
1073000
|
trusted library allocation
|
page execute and read and write
|
||
606C000
|
heap
|
page read and write
|
||
108D000
|
trusted library allocation
|
page execute and read and write
|
||
4F6B000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
E7E000
|
heap
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
508F000
|
trusted library allocation
|
page read and write
|
||
2B52000
|
trusted library allocation
|
page read and write
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
10AB000
|
trusted library allocation
|
page execute and read and write
|
||
2AEA000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
stack
|
page read and write
|
||
6040000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
trusted library section
|
page readonly
|
||
780E000
|
stack
|
page read and write
|
||
10D0000
|
heap
|
page execute and read and write
|
||
7A4F000
|
stack
|
page read and write
|
||
1096000
|
trusted library allocation
|
page execute and read and write
|
||
534C000
|
stack
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
4B0C000
|
stack
|
page read and write
|
||
1083000
|
trusted library allocation
|
page read and write
|
||
6030000
|
heap
|
page execute and read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
5023000
|
heap
|
page execute and read and write
|
||
7B8E000
|
stack
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
E78000
|
heap
|
page read and write
|
||
5180000
|
trusted library allocation
|
page execute and read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
heap
|
page read and write
|
||
5350000
|
heap
|
page read and write
|
||
5BC7000
|
heap
|
page read and write
|
||
4FFB000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
5020000
|
heap
|
page execute and read and write
|
||
6060000
|
heap
|
page read and write
|
||
7CF2000
|
trusted library allocation
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
EB2000
|
heap
|
page read and write
|
||
109A000
|
trusted library allocation
|
page execute and read and write
|
||
60A2000
|
heap
|
page read and write
|
||
790000
|
unkown
|
page readonly
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
F4B000
|
heap
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
1092000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page execute and read and write
|
||
C0E000
|
stack
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
7CCE000
|
stack
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page execute and read and write
|
||
50B3000
|
heap
|
page read and write
|
||
5280000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
790E000
|
stack
|
page read and write
|
||
A58000
|
stack
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
There are 112 hidden memdumps, click here to show them.