Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exe
|
"C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
goodies.dynamic-dns.net
|
|||
https://github.com/syohex/java-simple-mine-sweeperC:
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\ActiveMovie\devenum
|
Version
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2910000
|
direct allocation
|
page execute and read and write
|
||
B7F000
|
direct allocation
|
page readonly
|
||
A44000
|
direct allocation
|
page readonly
|
||
688D8F7000
|
stack
|
page read and write
|
||
21734F93000
|
heap
|
page read and write
|
||
21734429000
|
heap
|
page read and write
|
||
1000FE000
|
stack
|
page read and write
|
||
1710B856000
|
heap
|
page read and write
|
||
23457471000
|
heap
|
page read and write
|
||
217344B4000
|
heap
|
page read and write
|
||
1BA8DA02000
|
trusted library allocation
|
page read and write
|
||
21734F85000
|
heap
|
page read and write
|
||
217343F0000
|
remote allocation
|
page read and write
|
||
21734F7E000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
1BBF4B8D000
|
heap
|
page read and write
|
||
21734FD7000
|
heap
|
page read and write
|
||
22106629000
|
heap
|
page read and write
|
||
10DD000
|
unkown
|
page execute read
|
||
21734F89000
|
heap
|
page read and write
|
||
217343F0000
|
remote allocation
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
167319EB000
|
heap
|
page read and write
|
||
23DC15C000
|
stack
|
page read and write
|
||
973000
|
heap
|
page read and write
|
||
21734F23000
|
heap
|
page read and write
|
||
21734F89000
|
heap
|
page read and write
|
||
1BA8D081000
|
heap
|
page read and write
|
||
21734FAF000
|
heap
|
page read and write
|
||
21734F91000
|
heap
|
page read and write
|
||
21735400000
|
heap
|
page read and write
|
||
10DD000
|
unkown
|
page execute read
|
||
21734F85000
|
heap
|
page read and write
|
||
A31000
|
direct allocation
|
page execute read
|
||
133F000
|
unkown
|
page readonly
|
||
2345748A000
|
heap
|
page read and write
|
||
21734455000
|
heap
|
page read and write
|
||
9CD60FC000
|
stack
|
page read and write
|
||
16731860000
|
heap
|
page read and write
|
||
167319A0000
|
heap
|
page read and write
|
||
16731BB0000
|
heap
|
page read and write
|
||
21735403000
|
heap
|
page read and write
|
||
21734F5F000
|
heap
|
page read and write
|
||
390E000
|
trusted library allocation
|
page read and write
|
||
10D1000
|
unkown
|
page execute read
|
||
1BFA7F9000
|
stack
|
page read and write
|
||
21734F61000
|
heap
|
page read and write
|
||
21734F85000
|
heap
|
page read and write
|
||
688DAF8000
|
stack
|
page read and write
|
||
21734F9A000
|
heap
|
page read and write
|
||
21734F85000
|
heap
|
page read and write
|
||
1710B888000
|
heap
|
page read and write
|
||
217344A9000
|
heap
|
page read and write
|
||
1BA8D052000
|
heap
|
page read and write
|
||
1BBF4BAE000
|
heap
|
page read and write
|
||
21734F83000
|
heap
|
page read and write
|
||
259A4FE000
|
stack
|
page read and write
|
||
22106400000
|
heap
|
page read and write
|
||
21734F77000
|
heap
|
page read and write
|
||
1BA8D013000
|
heap
|
page read and write
|
||
1005FB000
|
stack
|
page read and write
|
||
23457513000
|
heap
|
page read and write
|
||
1BA8D113000
|
heap
|
page read and write
|
||
21734F6F000
|
heap
|
page read and write
|
||
21734F83000
|
heap
|
page read and write
|
||
23DC777000
|
stack
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
1BFA77E000
|
stack
|
page read and write
|
||
9CD5BAA000
|
stack
|
page read and write
|
||
1BBF4BA6000
|
heap
|
page read and write
|
||
22106670000
|
heap
|
page read and write
|
||
21735402000
|
heap
|
page read and write
|
||
21735402000
|
heap
|
page read and write
|
||
259AAFF000
|
stack
|
page read and write
|
||
21734F9F000
|
heap
|
page read and write
|
||
1BFA47C000
|
stack
|
page read and write
|
||
1710B88F000
|
heap
|
page read and write
|
||
21734FFE000
|
heap
|
page read and write
|
||
1BA8D047000
|
heap
|
page read and write
|
||
1BBF4BAE000
|
heap
|
page read and write
|
||
1BBF4BBA000
|
heap
|
page read and write
|
||
21734F7E000
|
heap
|
page read and write
|
||
21734F89000
|
heap
|
page read and write
|
||
384B000
|
trusted library allocation
|
page read and write
|
||
21734F94000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
1BBF4B80000
|
heap
|
page read and write
|
||
23457C02000
|
trusted library allocation
|
page read and write
|
||
22106E02000
|
trusted library allocation
|
page read and write
|
||
2173444E000
|
heap
|
page read and write
|
||
21734F86000
|
heap
|
page read and write
|
||
21734F83000
|
heap
|
page read and write
|
||
1710B800000
|
heap
|
page read and write
|
||
6DC167F000
|
stack
|
page read and write
|
||
285F000
|
stack
|
page read and write
|
||
2345743C000
|
heap
|
page read and write
|
||
1BBF4B97000
|
heap
|
page read and write
|
||
21734F87000
|
heap
|
page read and write
|
||
16732920000
|
trusted library allocation
|
page read and write
|
||
217344F9000
|
heap
|
page read and write
|
||
1BA8D102000
|
heap
|
page read and write
|
||
10D9000
|
unkown
|
page execute read
|
||
221063A0000
|
heap
|
page read and write
|
||
21734458000
|
heap
|
page read and write
|
||
23457502000
|
heap
|
page read and write
|
||
1BBF4AB0000
|
heap
|
page read and write
|
||
21734F91000
|
heap
|
page read and write
|
||
6DC1477000
|
stack
|
page read and write
|
||
1BA8CF70000
|
trusted library allocation
|
page read and write
|
||
1BBF4BBE000
|
heap
|
page read and write
|
||
21734F22000
|
heap
|
page read and write
|
||
1BBF4B97000
|
heap
|
page read and write
|
||
1BFA6FC000
|
stack
|
page read and write
|
||
1BA8D000000
|
heap
|
page read and write
|
||
1007FE000
|
stack
|
page read and write
|
||
21734FB4000
|
heap
|
page read and write
|
||
21734F87000
|
heap
|
page read and write
|
||
21734F8D000
|
heap
|
page read and write
|
||
21734F87000
|
heap
|
page read and write
|
||
21734FA1000
|
heap
|
page read and write
|
||
21734FB4000
|
heap
|
page read and write
|
||
21734F9F000
|
heap
|
page read and write
|
||
3847000
|
trusted library allocation
|
page read and write
|
||
1BBF4BA7000
|
heap
|
page read and write
|
||
21734FAF000
|
heap
|
page read and write
|
||
2210664B000
|
heap
|
page read and write
|
||
21734F87000
|
heap
|
page read and write
|
||
23457466000
|
heap
|
page read and write
|
||
1BA8D060000
|
heap
|
page read and write
|
||
217342E0000
|
heap
|
page read and write
|
||
688DD78000
|
stack
|
page read and write
|
||
21734F96000
|
heap
|
page read and write
|
||
2345745D000
|
heap
|
page read and write
|
||
23457220000
|
heap
|
page read and write
|
||
21734F8D000
|
heap
|
page read and write
|
||
21734F6F000
|
heap
|
page read and write
|
||
9CD5FF9000
|
stack
|
page read and write
|
||
21734F7E000
|
heap
|
page read and write
|
||
1710B852000
|
heap
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
2173445D000
|
heap
|
page read and write
|
||
688D2EB000
|
stack
|
page read and write
|
||
1BFA679000
|
stack
|
page read and write
|
||
1710B5C0000
|
heap
|
page read and write
|
||
259A9FE000
|
stack
|
page read and write
|
||
21734F95000
|
heap
|
page read and write
|
||
21734F75000
|
heap
|
page read and write
|
||
16731870000
|
trusted library allocation
|
page read and write
|
||
1710B87E000
|
heap
|
page read and write
|
||
21734F96000
|
heap
|
page read and write
|
||
259A57E000
|
stack
|
page read and write
|
||
23DC67B000
|
stack
|
page read and write
|
||
22106700000
|
heap
|
page read and write
|
||
3AC000
|
stack
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
21734F8B000
|
heap
|
page read and write
|
||
23457230000
|
heap
|
page read and write
|
||
1BA8CF40000
|
heap
|
page read and write
|
||
21734380000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
21734F77000
|
heap
|
page read and write
|
||
23457400000
|
heap
|
page read and write
|
||
217344C0000
|
heap
|
page read and write
|
||
21734F9E000
|
heap
|
page read and write
|
||
1BBF4B8B000
|
heap
|
page read and write
|
||
21734F9E000
|
heap
|
page read and write
|
||
23DC47F000
|
stack
|
page read and write
|
||
259A8F7000
|
stack
|
page read and write
|
||
16731BC0000
|
trusted library allocation
|
page read and write
|
||
21734F8D000
|
heap
|
page read and write
|
||
1710B902000
|
heap
|
page read and write
|
||
217344AA000
|
heap
|
page read and write
|
||
1BA8D05F000
|
heap
|
page read and write
|
||
A49000
|
direct allocation
|
page read and write
|
||
16731AC0000
|
heap
|
page read and write
|
||
1BA8D108000
|
heap
|
page read and write
|
||
22106713000
|
heap
|
page read and write
|
||
10D0000
|
unkown
|
page readonly
|
||
3500000
|
heap
|
page read and write
|
||
23457508000
|
heap
|
page read and write
|
||
23457466000
|
heap
|
page read and write
|
||
21734F75000
|
heap
|
page read and write
|
||
21734F85000
|
heap
|
page read and write
|
||
119F000
|
unkown
|
page execute read
|
||
1710B5B0000
|
heap
|
page read and write
|
||
1BBF4E25000
|
heap
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
21735402000
|
heap
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
2210663C000
|
heap
|
page read and write
|
||
16732900000
|
heap
|
page readonly
|
||
16731B30000
|
trusted library allocation
|
page read and write
|
||
688DB7F000
|
unkown
|
page read and write
|
||
21734F85000
|
heap
|
page read and write
|
||
B7D000
|
direct allocation
|
page read and write
|
||
6DC157F000
|
stack
|
page read and write
|
||
22106650000
|
heap
|
page read and write
|
||
133B000
|
unkown
|
page readonly
|
||
217343F0000
|
remote allocation
|
page read and write
|
||
217344FB000
|
heap
|
page read and write
|
||
11D2000
|
unkown
|
page write copy
|
||
688DC78000
|
stack
|
page read and write
|
||
23DC87F000
|
stack
|
page read and write
|
||
22106602000
|
heap
|
page read and write
|
||
10007C000
|
stack
|
page read and write
|
||
1BBF4BAE000
|
heap
|
page read and write
|
||
1BBF4B92000
|
heap
|
page read and write
|
||
21735403000
|
heap
|
page read and write
|
||
9CD5E7F000
|
stack
|
page read and write
|
||
1BA8D05D000
|
heap
|
page read and write
|
||
21734F20000
|
heap
|
page read and write
|
||
1BBF4BC6000
|
heap
|
page read and write
|
||
96C000
|
heap
|
page read and write
|
||
22106702000
|
heap
|
page read and write
|
||
21734F75000
|
heap
|
page read and write
|
||
21734FFF000
|
heap
|
page read and write
|
||
1BA8CED0000
|
heap
|
page read and write
|
||
21734FAB000
|
heap
|
page read and write
|
||
21734F7E000
|
heap
|
page read and write
|
||
1710B871000
|
heap
|
page read and write
|
||
1336000
|
unkown
|
page read and write
|
||
21734513000
|
heap
|
page read and write
|
||
1BA8D029000
|
heap
|
page read and write
|
||
21734F80000
|
heap
|
page read and write
|
||
21734F9E000
|
heap
|
page read and write
|
||
21734471000
|
heap
|
page read and write
|
||
21734502000
|
heap
|
page read and write
|
||
6DC127B000
|
stack
|
page read and write
|
||
1BBF4960000
|
heap
|
page read and write
|
||
22106688000
|
heap
|
page read and write
|
||
16731BA0000
|
trusted library allocation
|
page read and write
|
||
3F0000
|
trusted library allocation
|
page read and write
|
||
167319EB000
|
heap
|
page read and write
|
||
688D9FE000
|
stack
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
21734FA0000
|
heap
|
page read and write
|
||
11A3000
|
unkown
|
page readonly
|
||
21734F87000
|
heap
|
page read and write
|
||
956000
|
heap
|
page read and write
|
||
23457390000
|
trusted library allocation
|
page read and write
|
||
16731B40000
|
trusted library allocation
|
page read and write
|
||
21734F96000
|
heap
|
page read and write
|
||
11A3000
|
unkown
|
page readonly
|
||
11D2000
|
unkown
|
page write copy
|
||
16731BB9000
|
heap
|
page read and write
|
||
23DC97E000
|
stack
|
page read and write
|
||
10D0000
|
unkown
|
page readonly
|
||
1710B720000
|
trusted library allocation
|
page read and write
|
||
21734F9C000
|
heap
|
page read and write
|
||
3AA3000
|
trusted library allocation
|
page read and write
|
||
21734FFF000
|
heap
|
page read and write
|
||
21734F87000
|
heap
|
page read and write
|
||
21735462000
|
heap
|
page read and write
|
||
1BBF4BC4000
|
heap
|
page read and write
|
||
167319E3000
|
heap
|
page read and write
|
||
21734FA0000
|
heap
|
page read and write
|
||
1710B913000
|
heap
|
page read and write
|
||
259A47B000
|
stack
|
page read and write
|
||
217344E3000
|
heap
|
page read and write
|
||
21734400000
|
heap
|
page read and write
|
||
259A6FF000
|
stack
|
page read and write
|
||
16731BB5000
|
heap
|
page read and write
|
||
1710B82A000
|
heap
|
page read and write
|
||
1336000
|
unkown
|
page write copy
|
||
23457453000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
21734350000
|
heap
|
page read and write
|
||
217342F0000
|
heap
|
page read and write
|
||
956000
|
heap
|
page read and write
|
||
6DC107B000
|
stack
|
page read and write
|
||
1BBF4A90000
|
heap
|
page read and write
|
||
21735402000
|
heap
|
page read and write
|
||
2345747E000
|
heap
|
page read and write
|
||
1710B908000
|
heap
|
page read and write
|
||
21734F78000
|
heap
|
page read and write
|
||
167319A7000
|
heap
|
page read and write
|
||
259A7FB000
|
stack
|
page read and write
|
||
21734F75000
|
heap
|
page read and write
|
||
21734FFF000
|
heap
|
page read and write
|
||
2345744D000
|
heap
|
page read and write
|
||
688D3EE000
|
stack
|
page read and write
|
||
1BBF4E20000
|
heap
|
page read and write
|
||
1710B84D000
|
heap
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
21734F75000
|
heap
|
page read and write
|
||
1710B87C000
|
heap
|
page read and write
|
||
2903000
|
heap
|
page read and write
|
||
21734F9E000
|
heap
|
page read and write
|
||
688D36F000
|
stack
|
page read and write
|
||
21734F00000
|
heap
|
page read and write
|
||
1008FF000
|
stack
|
page read and write
|
||
340C000
|
stack
|
page read and write
|
||
1BA8D100000
|
heap
|
page read and write
|
||
22106500000
|
trusted library allocation
|
page read and write
|
||
21734FA0000
|
heap
|
page read and write
|
||
21734FAF000
|
heap
|
page read and write
|
||
21734F9E000
|
heap
|
page read and write
|
||
16731AA0000
|
heap
|
page read and write
|
||
21734F17000
|
heap
|
page read and write
|
||
1BBF4BA4000
|
heap
|
page read and write
|
||
22106652000
|
heap
|
page read and write
|
||
10017E000
|
stack
|
page read and write
|
||
21734F75000
|
heap
|
page read and write
|
||
21734FD7000
|
heap
|
page read and write
|
||
22106613000
|
heap
|
page read and write
|
||
10D1000
|
unkown
|
page execute read
|
||
2173443C000
|
heap
|
page read and write
|
||
1BA8D002000
|
heap
|
page read and write
|
||
21734FC4000
|
heap
|
page read and write
|
||
21734F83000
|
heap
|
page read and write
|
||
21734508000
|
heap
|
page read and write
|
||
2173444C000
|
heap
|
page read and write
|
||
23457402000
|
heap
|
page read and write
|
||
23457413000
|
heap
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
21734F89000
|
heap
|
page read and write
|
||
1BA8D08D000
|
heap
|
page read and write
|
||
21734F81000
|
heap
|
page read and write
|
||
21734F8B000
|
heap
|
page read and write
|
||
2210664D000
|
heap
|
page read and write
|
||
1BBF4BBA000
|
heap
|
page read and write
|
||
1BBF4BBA000
|
heap
|
page read and write
|
||
21735402000
|
heap
|
page read and write
|
||
21734F87000
|
heap
|
page read and write
|
||
1BA8CEE0000
|
heap
|
page read and write
|
||
943000
|
heap
|
page read and write
|
||
1006F7000
|
stack
|
page read and write
|
||
21734F9E000
|
heap
|
page read and write
|
||
2210667D000
|
heap
|
page read and write
|
||
6DC10FD000
|
stack
|
page read and write
|
||
21734FAE000
|
heap
|
page read and write
|
||
133B000
|
unkown
|
page readonly
|
||
21734FFF000
|
heap
|
page read and write
|
||
23457290000
|
heap
|
page read and write
|
||
956000
|
heap
|
page read and write
|
||
2173444D000
|
heap
|
page read and write
|
||
21734F8B000
|
heap
|
page read and write
|
||
167328F0000
|
trusted library allocation
|
page read and write
|
||
688D7F7000
|
stack
|
page read and write
|
||
217344C7000
|
heap
|
page read and write
|
||
167319EB000
|
heap
|
page read and write
|
||
9CD5F79000
|
stack
|
page read and write
|
||
A30000
|
direct allocation
|
page read and write
|
||
21734FC0000
|
heap
|
page read and write
|
||
6DC117E000
|
stack
|
page read and write
|
||
10BF000
|
stack
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
21734F8B000
|
heap
|
page read and write
|
||
21734F81000
|
heap
|
page read and write
|
||
21734516000
|
heap
|
page read and write
|
||
21734F8F000
|
heap
|
page read and write
|
||
21734F8D000
|
heap
|
page read and write
|
||
2345742A000
|
heap
|
page read and write
|
||
167326B0000
|
trusted library allocation
|
page read and write
|
||
21734413000
|
heap
|
page read and write
|
||
2173445C000
|
heap
|
page read and write
|
||
1BA8D03C000
|
heap
|
page read and write
|
||
1710B900000
|
heap
|
page read and write
|
||
21734E02000
|
heap
|
page read and write
|
||
16732910000
|
trusted library allocation
|
page read and write
|
||
119F000
|
unkown
|
page execute read
|
||
22106600000
|
heap
|
page read and write
|
||
21734489000
|
heap
|
page read and write
|
||
2173541A000
|
heap
|
page read and write
|
||
21734FFF000
|
heap
|
page read and write
|
||
1BBF4BC0000
|
heap
|
page read and write
|
||
21734456000
|
heap
|
page read and write
|
||
962000
|
heap
|
page read and write
|
||
21734459000
|
heap
|
page read and write
|
||
21734450000
|
heap
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
1BBF4BA2000
|
heap
|
page read and write
|
||
21734F50000
|
heap
|
page read and write
|
||
9CD5EFF000
|
stack
|
page read and write
|
||
23457500000
|
heap
|
page read and write
|
||
10D9000
|
unkown
|
page execute read
|
||
1BA8D062000
|
heap
|
page read and write
|
||
1BA8D05B000
|
heap
|
page read and write
|
||
2210667B000
|
heap
|
page read and write
|
||
21734F78000
|
heap
|
page read and write
|
||
1710B813000
|
heap
|
page read and write
|
||
1710C002000
|
trusted library allocation
|
page read and write
|
||
1710B83C000
|
heap
|
page read and write
|
||
21734F7E000
|
heap
|
page read and write
|
||
21735402000
|
heap
|
page read and write
|
||
2345745D000
|
heap
|
page read and write
|
||
9CD607F000
|
stack
|
page read and write
|
||
21735421000
|
heap
|
page read and write
|
||
1710B620000
|
heap
|
page read and write
|
||
21734F9F000
|
heap
|
page read and write
|
||
22106708000
|
heap
|
page read and write
|
||
6DC137B000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
2173445B000
|
heap
|
page read and write
|
||
383F000
|
trusted library allocation
|
page read and write
|
||
93E000
|
heap
|
page read and write
|
||
21735402000
|
heap
|
page read and write
|
||
133F000
|
unkown
|
page readonly
|
||
16732970000
|
trusted library allocation
|
page read and write
|
||
22106390000
|
heap
|
page read and write
|
||
23DC1DF000
|
stack
|
page read and write
|
There are 393 hidden memdumps, click here to show them.