Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,JfUksQmDGYQRSQfC
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,MVeMOgOlu
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,OnqcowdLVOpj
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",JfUksQmDGYQRSQfC
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",MVeMOgOlu
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",OnqcowdLVOpj
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",aXXRQNg
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",agetCYHzlW
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\y2D56.tmp.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",#1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
alexbionka.com
|
|||
http://alexbionka.com/QpkO
|
unknown
|
||
http://alexbionka.com/
|
64.227.108.27
|
||
http://alexbionka.com/UN
|
unknown
|
||
http://alexbionka.com:80/h
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
alexbionka.com
|
64.227.108.27
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
64.227.108.27
|
alexbionka.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
212820D0000
|
heap
|
page read and write
|
||
212802D9000
|
heap
|
page read and write
|
||
24B54615000
|
heap
|
page read and write
|
||
2E958910000
|
heap
|
page read and write
|
||
D5B87C000
|
stack
|
page read and write
|
||
21282104000
|
heap
|
page read and write
|
||
1FA56649000
|
heap
|
page read and write
|
||
2261E3C0000
|
heap
|
page read and write
|
||
E43DB9F000
|
stack
|
page read and write
|
||
8BD03FC000
|
stack
|
page read and write
|
||
21281D00000
|
unclassified section
|
page execute and read and write
|
||
2261E280000
|
heap
|
page read and write
|
||
24B54370000
|
heap
|
page read and write
|
||
D5B8FE000
|
stack
|
page read and write
|
||
21280250000
|
heap
|
page read and write
|
||
212803BA000
|
heap
|
page read and write
|
||
21280255000
|
heap
|
page read and write
|
||
1F590C00000
|
heap
|
page read and write
|
||
26C54510000
|
heap
|
page read and write
|
||
1FA56950000
|
heap
|
page read and write
|
||
AF6257F000
|
stack
|
page read and write
|
||
2261E435000
|
heap
|
page read and write
|
||
257E2BD0000
|
heap
|
page read and write
|
||
257E2C25000
|
heap
|
page read and write
|
||
1CA96D80000
|
heap
|
page read and write
|
||
180006000
|
direct allocation
|
page readonly
|
||
2261E469000
|
heap
|
page read and write
|
||
20499E30000
|
heap
|
page read and write
|
||
FEF73FE000
|
stack
|
page read and write
|
||
257E2C20000
|
heap
|
page read and write
|
||
24B542E0000
|
heap
|
page read and write
|
||
24B55FA0000
|
heap
|
page read and write
|
||
26C54580000
|
heap
|
page read and write
|
||
1FA56610000
|
heap
|
page read and write
|
||
1F35F7C000
|
stack
|
page read and write
|
||
2E9589BD000
|
heap
|
page read and write
|
||
1F590F00000
|
heap
|
page read and write
|
||
1CA97045000
|
heap
|
page read and write
|
||
FEF74FF000
|
stack
|
page read and write
|
||
26C5432A000
|
heap
|
page read and write
|
||
AF624FE000
|
stack
|
page read and write
|
||
24B54378000
|
heap
|
page read and write
|
||
1CA96FF0000
|
heap
|
page read and write
|
||
DCB2E7F000
|
stack
|
page read and write
|
||
2E958990000
|
heap
|
page read and write
|
||
2049BA30000
|
heap
|
page read and write
|
||
1FA565A0000
|
heap
|
page read and write
|
||
1F35FFC000
|
stack
|
page read and write
|
||
AF6247C000
|
stack
|
page read and write
|
||
E43DA9C000
|
stack
|
page read and write
|
||
257E2A00000
|
heap
|
page read and write
|
||
257E28B0000
|
heap
|
page read and write
|
||
24B542C0000
|
heap
|
page read and write
|
||
71D26FF000
|
stack
|
page read and write
|
||
852FEFF000
|
stack
|
page read and write
|
||
21281D30000
|
remote allocation
|
page read and write
|
||
1F35B3C000
|
stack
|
page read and write
|
||
20499EE0000
|
heap
|
page read and write
|
||
21280260000
|
heap
|
page read and write
|
||
852FE7C000
|
stack
|
page read and write
|
||
20499ED0000
|
heap
|
page read and write
|
||
21281D30000
|
remote allocation
|
page read and write
|
||
1F590DA9000
|
heap
|
page read and write
|
||
180004000
|
direct allocation
|
page readonly
|
||
1F35BBE000
|
stack
|
page read and write
|
||
7FFA65C50000
|
unkown
|
page readonly
|
||
7FFA65CA9000
|
unkown
|
page readonly
|
||
D5B97E000
|
stack
|
page read and write
|
||
180008000
|
direct allocation
|
page read and write
|
||
26C542B0000
|
heap
|
page read and write
|
||
1FA56920000
|
heap
|
page read and write
|
||
20499ED5000
|
heap
|
page read and write
|
||
1F590D40000
|
heap
|
page read and write
|
||
212801B0000
|
heap
|
page read and write
|
||
24B54250000
|
heap
|
page read and write
|
||
257E2B20000
|
heap
|
page read and write
|
||
21280220000
|
heap
|
page read and write
|
||
2261E430000
|
heap
|
page read and write
|
||
1CA96E09000
|
heap
|
page read and write
|
||
1FA56955000
|
heap
|
page read and write
|
||
2E9589C3000
|
heap
|
page read and write
|
||
1CA97040000
|
heap
|
page read and write
|
||
212802D0000
|
heap
|
page read and write
|
||
21281D80000
|
heap
|
page read and write
|
||
8BD06FF000
|
stack
|
page read and write
|
||
24B54610000
|
heap
|
page read and write
|
||
2E958940000
|
heap
|
page read and write
|
||
1FA56640000
|
heap
|
page read and write
|
||
2261E3E0000
|
heap
|
page read and write
|
||
DCB2BCE000
|
stack
|
page read and write
|
||
FEF72FD000
|
stack
|
page read and write
|
||
E43DB1E000
|
stack
|
page read and write
|
||
71D267C000
|
stack
|
page read and write
|
||
1F590D60000
|
heap
|
page read and write
|
||
2E9589B0000
|
heap
|
page read and write
|
||
A804EAC000
|
stack
|
page read and write
|
||
257E2A08000
|
heap
|
page read and write
|
||
1FA56810000
|
heap
|
page read and write
|
||
2261E460000
|
heap
|
page read and write
|
||
26C54585000
|
heap
|
page read and write
|
||
26C544F0000
|
heap
|
page read and write
|
||
212803B4000
|
heap
|
page read and write
|
||
1F590DA0000
|
heap
|
page read and write
|
||
2261FE70000
|
heap
|
page read and write
|
||
20499F60000
|
heap
|
page read and write
|
||
7FFA65C51000
|
unkown
|
page execute read
|
||
2E9587D0000
|
heap
|
page read and write
|
||
1F592890000
|
heap
|
page read and write
|
||
26C55DA0000
|
heap
|
page read and write
|
||
852FF7E000
|
stack
|
page read and write
|
||
1F35E7F000
|
stack
|
page read and write
|
||
DCB2B4C000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
71D277F000
|
stack
|
page read and write
|
||
A804F2F000
|
stack
|
page read and write
|
||
1CA96FD0000
|
heap
|
page read and write
|
||
21281D30000
|
remote allocation
|
page read and write
|
||
1CA96E00000
|
heap
|
page read and write
|
||
257E2B00000
|
heap
|
page read and write
|
||
8BD067F000
|
stack
|
page read and write
|
||
E43DE7F000
|
stack
|
page read and write
|
||
26C54320000
|
heap
|
page read and write
|
||
20499F69000
|
heap
|
page read and write
|
||
1CA98940000
|
heap
|
page read and write
|
||
20499EA0000
|
heap
|
page read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
1F590F05000
|
heap
|
page read and write
|
There are 117 hidden memdumps, click here to show them.