Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\5U5ouw7ryf.exe
|
"C:\Users\user\Desktop\5U5ouw7ryf.exe"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
141.11.93.195
|
unknown
|
United Kingdom
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
10C000
|
system
|
page execute and read and write
|
||
1A6000
|
unkown
|
page write copy
|
||
1A6000
|
unkown
|
page write copy
|
||
F1000
|
system
|
page readonly
|
||
3486000
|
direct allocation
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
108000
|
system
|
page readonly
|
||
1620000
|
direct allocation
|
page read and write
|
||
10B000
|
system
|
page readonly
|
||
1A0000
|
unkown
|
page readonly
|
||
33D6000
|
direct allocation
|
page read and write
|
||
1E8CD220000
|
heap
|
page read and write
|
||
1E8CD213000
|
heap
|
page read and write
|
||
1E8CD302000
|
heap
|
page read and write
|
||
1620000
|
direct allocation
|
page read and write
|
||
33C2000
|
direct allocation
|
page read and write
|
||
107000
|
system
|
page read and write
|
||
1620000
|
direct allocation
|
page read and write
|
||
1620000
|
direct allocation
|
page read and write
|
||
34A6000
|
direct allocation
|
page read and write
|
||
1E8CD202000
|
heap
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
190000
|
remote allocation
|
page execute and read and write
|
||
1E8CD22F000
|
heap
|
page read and write
|
||
1E8CD200000
|
heap
|
page read and write
|
||
33B6000
|
direct allocation
|
page read and write
|
||
33BC000
|
direct allocation
|
page read and write
|
||
3447000
|
direct allocation
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
348C000
|
direct allocation
|
page read and write
|
||
3447000
|
direct allocation
|
page read and write
|
||
34A6000
|
direct allocation
|
page read and write
|
||
33C2000
|
direct allocation
|
page read and write
|
||
33C2000
|
direct allocation
|
page read and write
|
||
3492000
|
direct allocation
|
page read and write
|
||
33BC000
|
direct allocation
|
page read and write
|
||
3486000
|
direct allocation
|
page read and write
|
||
3492000
|
direct allocation
|
page read and write
|
||
3447000
|
direct allocation
|
page read and write
|
||
33C2000
|
direct allocation
|
page read and write
|
||
DEF217F000
|
stack
|
page read and write
|
||
33C2000
|
direct allocation
|
page read and write
|
||
33D6000
|
direct allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
34A6000
|
direct allocation
|
page read and write
|
||
348C000
|
direct allocation
|
page read and write
|
||
33D6000
|
direct allocation
|
page read and write
|
||
DEF227F000
|
stack
|
page read and write
|
||
DEF1D0C000
|
stack
|
page read and write
|
||
1620000
|
direct allocation
|
page read and write
|
||
1620000
|
direct allocation
|
page read and write
|
||
1E8CD150000
|
heap
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
228000
|
unkown
|
page readonly
|
||
1620000
|
direct allocation
|
page read and write
|
||
DEF21FF000
|
stack
|
page read and write
|
||
3486000
|
direct allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
3517000
|
direct allocation
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
228000
|
unkown
|
page readonly
|
||
1E8CEE02000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
33B6000
|
direct allocation
|
page read and write
|
||
1E8CD160000
|
heap
|
page read and write
|
||
227000
|
unkown
|
page read and write
|
||
3517000
|
direct allocation
|
page read and write
|
||
33B6000
|
direct allocation
|
page read and write
|
||
33D6000
|
direct allocation
|
page read and write
|
||
134A000
|
heap
|
page read and write
|
||
1A1000
|
unkown
|
page execute read
|
||
33D6000
|
direct allocation
|
page read and write
|
||
1E8CD130000
|
heap
|
page read and write
|
||
12FD000
|
stack
|
page read and write
|
||
33C2000
|
direct allocation
|
page read and write
|
||
3447000
|
direct allocation
|
page read and write
|
||
FE000
|
system
|
page read and write
|
||
3447000
|
direct allocation
|
page read and write
|
||
1E8CD20B000
|
heap
|
page read and write
|
||
348C000
|
direct allocation
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
134E000
|
heap
|
page read and write
|
||
1E8CD231000
|
heap
|
page read and write
|
||
1620000
|
direct allocation
|
page read and write
|
||
1A1000
|
unkown
|
page execute read
|
||
1620000
|
direct allocation
|
page read and write
|
||
3447000
|
direct allocation
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
33BC000
|
direct allocation
|
page read and write
|
||
33BC000
|
direct allocation
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
1A5000
|
unkown
|
page readonly
|
||
C0000
|
system
|
page read and write
|
||
33BC000
|
direct allocation
|
page read and write
|
||
F2C000
|
stack
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
33BC000
|
direct allocation
|
page read and write
|
||
1E8CD190000
|
heap
|
page read and write
|
||
1A5000
|
unkown
|
page readonly
|
||
1A0000
|
unkown
|
page readonly
|
||
3492000
|
direct allocation
|
page read and write
|
||
33D6000
|
direct allocation
|
page read and write
|
||
33B6000
|
direct allocation
|
page read and write
|
||
33B6000
|
direct allocation
|
page read and write
|
||
3517000
|
direct allocation
|
page read and write
|
||
33B6000
|
direct allocation
|
page read and write
|
||
C1000
|
system
|
page execute read
|
There are 99 hidden memdumps, click here to show them.