Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen6.38594.5893.10844.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen6.38594.5893.10844.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://%s/coretokencryptkeyregsvr32.exeff_updff_mincr_precr_mancr_updcr_mincr_con.dat.exerunas/c
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6636000
|
heap
|
page read and write
|
||
6646000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
666D000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
68A6000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
417000
|
unkown
|
page write copy
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
42F000
|
unkown
|
page readonly
|
||
68A4000
|
heap
|
page read and write
|
||
703F000
|
stack
|
page read and write
|
||
47DB000
|
heap
|
page read and write
|
||
664F000
|
heap
|
page read and write
|
||
6872000
|
heap
|
page read and write
|
||
66C8000
|
heap
|
page read and write
|
||
6618000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4740000
|
heap
|
page read and write
|
||
411000
|
unkown
|
page readonly
|
||
4794000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
422000
|
unkown
|
page write copy
|
||
61F0000
|
trusted library allocation
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
416000
|
unkown
|
page write copy
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
61A0000
|
heap
|
page read and write
|
||
47C1000
|
heap
|
page read and write
|
||
68AE000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6887000
|
heap
|
page read and write
|
||
6658000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4841000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
47D5000
|
heap
|
page read and write
|
||
660C000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6609000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
47B6000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6649000
|
heap
|
page read and write
|
||
68C0000
|
heap
|
page read and write
|
||
66BF000
|
heap
|
page read and write
|
||
6450000
|
trusted library allocation
|
page read and write
|
||
66B9000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4799000
|
heap
|
page read and write
|
||
68A1000
|
heap
|
page read and write
|
||
6E3F000
|
stack
|
page read and write
|
||
6664000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
422000
|
unkown
|
page write copy
|
||
4610000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6450000
|
trusted library allocation
|
page read and write
|
||
4774000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
474A000
|
heap
|
page read and write
|
||
68B7000
|
heap
|
page read and write
|
||
6655000
|
heap
|
page read and write
|
||
416000
|
unkown
|
page read and write
|
||
6899000
|
heap
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
47AD000
|
heap
|
page read and write
|
||
6630000
|
heap
|
page read and write
|
||
479D000
|
heap
|
page read and write
|
||
6679000
|
heap
|
page read and write
|
||
665B000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
66B6000
|
heap
|
page read and write
|
||
6300000
|
heap
|
page read and write
|
||
66A6000
|
heap
|
page read and write
|
||
64E0000
|
heap
|
page read and write
|
||
66E3000
|
heap
|
page read and write
|
||
684F000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4590000
|
heap
|
page read and write
|
||
66B0000
|
heap
|
page read and write
|
||
6639000
|
heap
|
page read and write
|
||
661E000
|
heap
|
page read and write
|
||
47E7000
|
heap
|
page read and write
|
||
40F000
|
unkown
|
page execute read
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
47EE000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4540000
|
heap
|
page read and write
|
||
6696000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6661000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
10010000
|
direct allocation
|
page readonly
|
||
667C000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
10014000
|
direct allocation
|
page readonly
|
||
68B1000
|
heap
|
page read and write
|
||
9E000
|
stack
|
page read and write
|
||
66B3000
|
heap
|
page read and write
|
||
689C000
|
heap
|
page read and write
|
||
68D1000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6250000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6685000
|
heap
|
page read and write
|
||
66C2000
|
heap
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
41F000
|
unkown
|
page read and write
|
||
4790000
|
heap
|
page read and write
|
||
6280000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4530000
|
heap
|
page readonly
|
||
660F000
|
heap
|
page read and write
|
||
66E0000
|
heap
|
page read and write
|
||
47CF000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4840000
|
heap
|
page read and write
|
||
47A5000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
10001000
|
direct allocation
|
page execute read
|
||
4778000
|
heap
|
page read and write
|
||
6800000
|
heap
|
page read and write
|
||
4780000
|
heap
|
page read and write
|
||
6603000
|
heap
|
page read and write
|
||
662A000
|
heap
|
page read and write
|
||
68CE000
|
heap
|
page read and write
|
||
4784000
|
heap
|
page read and write
|
||
6642000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
664C000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
61EC000
|
stack
|
page read and write
|
||
6633000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
474E000
|
heap
|
page read and write
|
||
67FC000
|
stack
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
640D000
|
stack
|
page read and write
|
||
4637000
|
heap
|
page read and write
|
||
6652000
|
heap
|
page read and write
|
||
66DD000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
10013000
|
direct allocation
|
page read and write
|
||
66C5000
|
heap
|
page read and write
|
||
66DA000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
47C9000
|
heap
|
page read and write
|
||
66CB000
|
heap
|
page read and write
|
||
66BC000
|
heap
|
page read and write
|
||
61A6000
|
heap
|
page read and write
|
||
47DE000
|
heap
|
page read and write
|
||
6612000
|
heap
|
page read and write
|
||
6676000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
667F000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6606000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6848000
|
heap
|
page read and write
|
||
477C000
|
heap
|
page read and write
|
||
65D3000
|
heap
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6673000
|
heap
|
page read and write
|
||
662D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
619C000
|
stack
|
page read and write
|
||
47F6000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
66E9000
|
heap
|
page read and write
|
||
622E000
|
stack
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
661B000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
65D0000
|
heap
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
411000
|
unkown
|
page readonly
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
47EC000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6600000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6879000
|
heap
|
page read and write
|
||
68C2000
|
heap
|
page read and write
|
||
483A000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6615000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
42F000
|
unkown
|
page readonly
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6627000
|
heap
|
page read and write
|
||
478C000
|
heap
|
page read and write
|
||
47E9000
|
heap
|
page read and write
|
||
66AA000
|
heap
|
page read and write
|
||
6670000
|
heap
|
page read and write
|
||
6624000
|
heap
|
page read and write
|
||
666A000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
682F000
|
heap
|
page read and write
|
||
4788000
|
heap
|
page read and write
|
||
6667000
|
heap
|
page read and write
|
||
66D4000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
66D7000
|
heap
|
page read and write
|
||
6699000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
6450000
|
trusted library allocation
|
page read and write
|
||
4637000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
47C5000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
403000
|
unkown
|
page execute and read and write
|
||
66AD000
|
heap
|
page read and write
|
||
644E000
|
stack
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
688E000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4630000
|
heap
|
page read and write
|
||
66CE000
|
heap
|
page read and write
|
||
47D2000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6EE0D000
|
unkown
|
page read and write
|
||
47D8000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
663C000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4450000
|
heap
|
page read and write
|
||
665E000
|
heap
|
page read and write
|
||
47A9000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
19F000
|
stack
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
47FA000
|
heap
|
page read and write
|
||
6621000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
||
47CC000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
4636000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page execute and read and write
|
There are 264 hidden memdumps, click here to show them.