Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.324.4623.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.324.4623.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C000076000
|
direct allocation
|
page read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
1490000
|
unkown
|
page write copy
|
||
807B7FE000
|
stack
|
page read and write
|
||
1491000
|
unkown
|
page readonly
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
C000082000
|
direct allocation
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
807B9FE000
|
stack
|
page read and write
|
||
EB1000
|
unkown
|
page execute read
|
||
C000002000
|
direct allocation
|
page read and write
|
||
C000031000
|
direct allocation
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
22316809000
|
direct allocation
|
page read and write
|
||
22316864000
|
direct allocation
|
page read and write
|
||
1424000
|
unkown
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
1485000
|
unkown
|
page read and write
|
||
223168C0000
|
heap
|
page read and write
|
||
C000036000
|
direct allocation
|
page read and write
|
||
C0000B2000
|
direct allocation
|
page read and write
|
||
22316880000
|
direct allocation
|
page read and write
|
||
C00004E000
|
direct allocation
|
page read and write
|
||
22316AE5000
|
heap
|
page read and write
|
||
1452000
|
unkown
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
C0000B0000
|
direct allocation
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
22316800000
|
direct allocation
|
page read and write
|
||
1413000
|
unkown
|
page write copy
|
||
C000012000
|
direct allocation
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
13D0000
|
unkown
|
page read and write
|
||
1420000
|
unkown
|
page write copy
|
||
C0000E8000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
C0000C0000
|
direct allocation
|
page read and write
|
||
C0000E4000
|
direct allocation
|
page read and write
|
||
C00008E000
|
direct allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
C0000C4000
|
direct allocation
|
page read and write
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
13D0000
|
unkown
|
page write copy
|
||
C000088000
|
direct allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
807B5FE000
|
stack
|
page read and write
|
||
223167E0000
|
heap
|
page read and write
|
||
C0000EA000
|
direct allocation
|
page read and write
|
||
1425000
|
unkown
|
page write copy
|
||
C000092000
|
direct allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
C0000EE000
|
direct allocation
|
page read and write
|
||
2233BBF3000
|
direct allocation
|
page read and write
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
C0000A2000
|
direct allocation
|
page read and write
|
||
C000023000
|
direct allocation
|
page read and write
|
||
C0000D6000
|
direct allocation
|
page read and write
|
||
EB0000
|
unkown
|
page readonly
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
C0000AE000
|
direct allocation
|
page read and write
|
||
223168CC000
|
heap
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C000038000
|
direct allocation
|
page read and write
|
||
2233BBF0000
|
direct allocation
|
page read and write
|
||
C000021000
|
direct allocation
|
page read and write
|
||
1153000
|
unkown
|
page readonly
|
||
223166E0000
|
heap
|
page read and write
|
||
2231680B000
|
direct allocation
|
page read and write
|
||
223167C0000
|
heap
|
page read and write
|
||
22316890000
|
direct allocation
|
page read and write
|
||
807BBFE000
|
stack
|
page read and write
|
||
22316860000
|
direct allocation
|
page read and write
|
||
1458000
|
unkown
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
EB0000
|
unkown
|
page readonly
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
1490000
|
unkown
|
page write copy
|
||
C0000C2000
|
direct allocation
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
1427000
|
unkown
|
page read and write
|
||
807B1FF000
|
stack
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
EB1000
|
unkown
|
page execute read
|
||
C00009E000
|
direct allocation
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
C000033000
|
direct allocation
|
page read and write
|
||
13DB000
|
unkown
|
page write copy
|
||
1413000
|
unkown
|
page write copy
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
1491000
|
unkown
|
page readonly
|
||
1480000
|
unkown
|
page read and write
|
||
1153000
|
unkown
|
page readonly
|
||
C000014000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
22316AE0000
|
heap
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
C0000BE000
|
direct allocation
|
page read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
807B3FF000
|
stack
|
page read and write
|
||
C0000DC000
|
direct allocation
|
page read and write
|
||
141E000
|
unkown
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
223168C9000
|
heap
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
807AFFD000
|
stack
|
page read and write
|
||
22316804000
|
direct allocation
|
page read and write
|
There are 106 hidden memdumps, click here to show them.