Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.11946.22825.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.11946.22825.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.11946.22825.dll,_main
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.11946.22825.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.11946.22825.dll,
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.11946.22825.dll,
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.kaikuoyun.com/list-127-1.htmll)
|
unknown
|
||
http://www.kaikuoyun.com/list-127-1.htmlDVarFileInfo$
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
14B0000
|
heap
|
page read and write
|
||
1021B000
|
unkown
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
100BE000
|
unkown
|
page readonly
|
||
10210000
|
unkown
|
page read and write
|
||
1021F000
|
unkown
|
page read and write
|
||
10235000
|
unkown
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
10237000
|
unkown
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
1021B000
|
unkown
|
page read and write
|
||
3FC000
|
stack
|
page read and write
|
||
2FB9000
|
stack
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
10239000
|
unkown
|
page readonly
|
||
3390000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
10235000
|
unkown
|
page read and write
|
||
10237000
|
unkown
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
10000000
|
unkown
|
page readonly
|
||
5FC000
|
stack
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
10237000
|
unkown
|
page read and write
|
||
10210000
|
unkown
|
page read and write
|
||
1020E000
|
unkown
|
page write copy
|
||
10210000
|
unkown
|
page read and write
|
||
4FA4000
|
heap
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
4624000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
3040000
|
heap
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
10211000
|
unkown
|
page write copy
|
||
10235000
|
unkown
|
page read and write
|
||
101CD000
|
unkown
|
page readonly
|
||
940000
|
heap
|
page read and write
|
||
10239000
|
unkown
|
page readonly
|
||
B2A000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
345A000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
101CD000
|
unkown
|
page readonly
|
||
10210000
|
unkown
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
10237000
|
unkown
|
page read and write
|
||
79C000
|
stack
|
page read and write
|
||
1021F000
|
unkown
|
page read and write
|
||
1021B000
|
unkown
|
page read and write
|
||
100BE000
|
unkown
|
page readonly
|
||
4654000
|
heap
|
page read and write
|
||
10211000
|
unkown
|
page write copy
|
||
45A0000
|
heap
|
page read and write
|
||
101CD000
|
unkown
|
page readonly
|
||
502F000
|
stack
|
page read and write
|
||
1020E000
|
unkown
|
page write copy
|
||
10000000
|
unkown
|
page readonly
|
||
740000
|
heap
|
page read and write
|
||
10210000
|
unkown
|
page read and write
|
||
13AF000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
43C4000
|
heap
|
page read and write
|
||
47A0000
|
heap
|
page read and write
|
||
98A000
|
heap
|
page read and write
|
||
101CD000
|
unkown
|
page readonly
|
||
1020E000
|
unkown
|
page write copy
|
||
13BD000
|
heap
|
page read and write
|
||
10239000
|
unkown
|
page readonly
|
||
1022B000
|
unkown
|
page read and write
|
||
101CD000
|
unkown
|
page readonly
|
||
1021F000
|
unkown
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
2F1F000
|
stack
|
page read and write
|
||
2FFC000
|
stack
|
page read and write
|
||
10211000
|
unkown
|
page write copy
|
||
10237000
|
unkown
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
1020E000
|
unkown
|
page write copy
|
||
43E0000
|
heap
|
page read and write
|
||
10211000
|
unkown
|
page write copy
|
||
10001000
|
unkown
|
page execute read
|
||
10000000
|
unkown
|
page readonly
|
||
D2F000
|
stack
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
3070000
|
heap
|
page read and write
|