Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\server_(3).exe
|
C:\Users\user\Desktop\server_(3).exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://62.173.142.81/drew/l9wdesHCBL/WcUH_2Fe6cEC19JMx/ojSec9BNMFM6/V8tDDFde77O/U9i1cqxDkO368R/9gNBIEzgy6mBOfdpOkxLi/yTSQzU5LkHeJ3ST8/wg2AtPFgVdoBaEt/6J4T7kNNoupXFHQTJc/6wx_2FfTi/ip9uaIqtLaRaENmKe5lk/gWcrKu3HuxIt5fBBNoX/csBNoK1ie3PBW5Bt5sLiYK/wkK58GrNqzGj0/jf15aQpx/17gepP_2BoXbW_2FEP_2BQC/qQ5KGV_2Fv/ErJyFWv8XjZRosjau/Q6z6usxdqA4/_2FeDY.jlk
|
62.173.142.81
|
||
http://62.173
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
checklist.skype.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
62.173.142.81
|
unknown
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2BC8000
|
heap
|
page read and write
|
||
2BC8000
|
heap
|
page read and write
|
||
2BC8000
|
heap
|
page read and write
|
||
2BC8000
|
heap
|
page read and write
|
||
2BC8000
|
heap
|
page read and write
|
||
2BC8000
|
heap
|
page read and write
|
||
2BC8000
|
heap
|
page read and write
|
||
2BC8000
|
heap
|
page read and write
|
||
2BC8000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
11E278F0000
|
trusted library allocation
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
2BCB000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
4D6000
|
heap
|
page execute and read and write
|
||
23B0000
|
heap
|
page read and write
|
||
11E277C5000
|
heap
|
page read and write
|
||
11E2783E000
|
heap
|
page read and write
|
||
361F000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
2180000
|
heap
|
page read and write
|
||
341D000
|
stack
|
page read and write
|
||
403000
|
unkown
|
page execute and read and write
|
||
11E27720000
|
heap
|
page read and write
|
||
5E9000
|
unclassified section
|
page readonly
|
||
1648CFF000
|
stack
|
page read and write
|
||
1648D79000
|
stack
|
page read and write
|
||
11E277B0000
|
trusted library allocation
|
page read and write
|
||
2729000
|
heap
|
page read and write
|
||
11E27800000
|
heap
|
page read and write
|
||
27A8000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
40F000
|
unkown
|
page write copy
|
||
331F000
|
stack
|
page read and write
|
||
11E27700000
|
heap
|
page read and write
|
||
5D0000
|
direct allocation
|
page read and write
|
||
11E277F8000
|
heap
|
page read and write
|
||
11E28670000
|
trusted library allocation
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
4CA000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
11E27837000
|
heap
|
page read and write
|
||
21CE000
|
stack
|
page read and write
|
||
11E28430000
|
trusted library allocation
|
page read and write
|
||
11E28660000
|
heap
|
page readonly
|
||
321F000
|
stack
|
page read and write
|
||
4E9000
|
heap
|
page read and write
|
||
365D000
|
stack
|
page read and write
|
||
375A000
|
stack
|
page read and write
|
||
11E277F0000
|
heap
|
page read and write
|
||
224E000
|
stack
|
page read and write
|
||
11E2783F000
|
heap
|
page read and write
|
||
11E28680000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
27D0000
|
heap
|
page read and write
|
||
1648C7E000
|
stack
|
page read and write
|
||
11E277C9000
|
heap
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
5E0000
|
unclassified section
|
page read and write
|
||
2130000
|
heap
|
page read and write
|
||
11E277A0000
|
trusted library allocation
|
page read and write
|
||
11E275D0000
|
trusted library allocation
|
page read and write
|
||
40D000
|
unkown
|
page write copy
|
||
405000
|
unkown
|
page execute and read and write
|
||
5E1000
|
unclassified section
|
page execute read
|
||
407000
|
unkown
|
page execute and read and write
|
||
11E27840000
|
heap
|
page read and write
|
||
11E277C0000
|
heap
|
page read and write
|
||
5C0000
|
direct allocation
|
page execute and read and write
|
||
49F000
|
unkown
|
page readonly
|
||
9D000
|
stack
|
page read and write
|
||
1648BF9000
|
stack
|
page read and write
|
||
11E27790000
|
trusted library allocation
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
1648AFE000
|
stack
|
page read and write
|
||
212C000
|
stack
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
1648A7B000
|
stack
|
page read and write
|
||
11E286D0000
|
trusted library allocation
|
page read and write
|
||
238C000
|
stack
|
page read and write
|
||
311F000
|
stack
|
page read and write
|
||
2BCB000
|
heap
|
page read and write
|
||
5EA000
|
unclassified section
|
page read and write
|
||
11E2783E000
|
heap
|
page read and write
|
||
11E277E0000
|
trusted library allocation
|
page read and write
|
||
220E000
|
stack
|
page read and write
|
||
49F000
|
unkown
|
page readonly
|
||
1648B7E000
|
stack
|
page read and write
|
||
11E275C0000
|
heap
|
page read and write
|
||
5EC000
|
unclassified section
|
page readonly
|
There are 85 hidden memdumps, click here to show them.