Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\cqHMm0ykDG.exe
|
"C:\Users\user\Desktop\cqHMm0ykDG.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://mindhandru.buzz/pie
|
unknown
|
||
scentniej.buzz
|
|||
prisonyfork.buzz
|
|||
http://crl.micro
|
unknown
|
||
rebuildeso.buzz
|
|||
hummskitnj.buzz
|
|||
appliacnesot.buzz
|
|||
screwamusresz.buzz
|
|||
mindhandru.buzz
|
|||
https://mindhandru.buzz/
|
unknown
|
||
cashfuzysao.buzz
|
|||
inherineau.buzz
|
|||
https://mindhandru.buzz/api
|
104.21.11.101
|
||
https://mindhandru.buzz/apill
|
unknown
|
||
https://mindhandru.buzz/d
|
unknown
|
||
https://mindhandru.buzz:443/api
|
unknown
|
There are 6 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mindhandru.buzz
|
104.21.11.101
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.11.101
|
mindhandru.buzz
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5130000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
141F000
|
heap
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
13D3000
|
heap
|
page read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
50E0000
|
trusted library allocation
|
page read and write
|
||
1403000
|
heap
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
596D000
|
stack
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1422000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
136A000
|
heap
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
EAB000
|
stack
|
page read and write
|
||
13B3000
|
heap
|
page read and write
|
||
13A2000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
673000
|
unkown
|
page write copy
|
||
620000
|
unkown
|
page readonly
|
||
13CC000
|
heap
|
page read and write
|
||
57BE000
|
stack
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
1403000
|
heap
|
page read and write
|
||
919000
|
unkown
|
page execute and write copy
|
||
49FF000
|
stack
|
page read and write
|
||
5A6E000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
13AD000
|
heap
|
page read and write
|
||
1399000
|
heap
|
page read and write
|
||
909000
|
unkown
|
page execute and read and write
|
||
4B7E000
|
stack
|
page read and write
|
||
1403000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
1403000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
4B3F000
|
stack
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
13AA000
|
heap
|
page read and write
|
||
13D3000
|
heap
|
page read and write
|
||
13D3000
|
heap
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
1210000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
567F000
|
stack
|
page read and write
|
||
8DB000
|
unkown
|
page execute and read and write
|
||
582E000
|
stack
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
4CA2000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
5304000
|
trusted library allocation
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
675000
|
unkown
|
page execute and read and write
|
||
1254000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
1254000
|
heap
|
page read and write
|
||
526F000
|
stack
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
1347000
|
heap
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
919000
|
unkown
|
page execute and read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
2FFC000
|
stack
|
page read and write
|
||
50F0000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
621000
|
unkown
|
page execute and write copy
|
||
39BF000
|
stack
|
page read and write
|
||
13D6000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
592F000
|
stack
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
13D6000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
13AF000
|
heap
|
page read and write
|
||
56BE000
|
stack
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
13B3000
|
heap
|
page read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
53FD000
|
stack
|
page read and write
|
||
621000
|
unkown
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
463F000
|
stack
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
673000
|
unkown
|
page write copy
|
||
1254000
|
heap
|
page read and write
|
||
553D000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
ABA000
|
unkown
|
page execute and read and write
|
||
467E000
|
stack
|
page read and write
|
||
13CD000
|
heap
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CB0000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
48BF000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
57C0000
|
remote allocation
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
13B3000
|
heap
|
page read and write
|
||
52F0000
|
direct allocation
|
page execute and read and write
|
||
1254000
|
heap
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
516B000
|
stack
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
337F000
|
stack
|
page read and write
|
||
52BD000
|
stack
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
13D6000
|
heap
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
5130000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
5174000
|
direct allocation
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
FAC000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
159F000
|
stack
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
136E000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
5AF0000
|
heap
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
13D6000
|
heap
|
page read and write
|
||
39FE000
|
stack
|
page read and write
|
||
665000
|
unkown
|
page execute and read and write
|
||
327E000
|
stack
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
57C0000
|
remote allocation
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
1399000
|
heap
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
13AA000
|
heap
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
91A000
|
unkown
|
page execute and write copy
|
||
387F000
|
stack
|
page read and write
|
||
13A2000
|
heap
|
page read and write
|
||
13D3000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
902000
|
unkown
|
page execute and read and write
|
||
7F4000
|
unkown
|
page execute and read and write
|
||
34FE000
|
stack
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
543D000
|
stack
|
page read and write
|
||
5130000
|
direct allocation
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
4C7F000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
57C0000
|
remote allocation
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
There are 205 hidden memdumps, click here to show them.