Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\server.exe
|
C:\Users\user\Desktop\server.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://62.173.142.51/drew/HAyCvnAuEOt2F7C/qtqWyxm4JAodLmr2fA/5rIXi6c7a/A8VZuoBaw9m9tdhD88nR/7GG7oRWMVub4oY7_2BO/OtqOu0B56I1LS_2FdHx85_/2FJqjErmgnBnc/fR5wyLVd/zR03KdsDmrJhOpNTELG8Ap7/tRbeA0rm1D/Ahqeb_2B_2Fx66NAH/sAJz2fkfv30m/_2B2yXv1C0u/OTAlb_2Bjz3Xu9/n7nMr5QIveWoLOKJgWpZZ/FZTPBpvOXNqs9vrA/ayBpSg1Jbp3hq/vUJdeVU7/u.jlk
|
62.173.142.51
|
||
http://94.103
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
checklist.skype.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
62.173.142.51
|
unknown
|
Russian Federation
|
||
94.103.183.153
|
unknown
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2190000
|
direct allocation
|
page execute and read and write
|
||
35B8000
|
heap
|
page read and write
|
||
35B8000
|
heap
|
page read and write
|
||
2F3CDBD0000
|
trusted library allocation
|
page read and write
|
||
F9F7B7F000
|
stack
|
page read and write
|
||
2F3CDC5F000
|
heap
|
page read and write
|
||
21EC000
|
stack
|
page read and write
|
||
2F3CDD10000
|
trusted library allocation
|
page read and write
|
||
35BB000
|
heap
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
2BDC000
|
unclassified section
|
page readonly
|
||
6A4000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
2F3CDB40000
|
heap
|
page read and write
|
||
2200000
|
direct allocation
|
page read and write
|
||
2153000
|
heap
|
page read and write
|
||
21F6000
|
heap
|
page read and write
|
||
2F3CEA60000
|
unclassified section
|
page read and write
|
||
2F3CDC00000
|
trusted library allocation
|
page read and write
|
||
47A000
|
unkown
|
page write copy
|
||
394F000
|
stack
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
20F0000
|
direct allocation
|
page execute and read and write
|
||
63A000
|
heap
|
page read and write
|
||
F9F7C79000
|
stack
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
31BC000
|
stack
|
page read and write
|
||
3029000
|
heap
|
page read and write
|
||
2F3CDC77000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
405000
|
unkown
|
page execute and read and write
|
||
F9F7A7B000
|
stack
|
page read and write
|
||
35BB000
|
heap
|
page read and write
|
||
2BD9000
|
unclassified section
|
page readonly
|
||
2F3CEA80000
|
heap
|
page readonly
|
||
2F3CDB75000
|
heap
|
page read and write
|
||
403000
|
unkown
|
page execute and read and write
|
||
293F000
|
stack
|
page read and write
|
||
F9F7D79000
|
stack
|
page read and write
|
||
2F3CEAA0000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
27FC000
|
stack
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
2F3CD9E0000
|
heap
|
page read and write
|
||
2F3CDB70000
|
heap
|
page read and write
|
||
30A8000
|
heap
|
page read and write
|
||
6AF000
|
heap
|
page read and write
|
||
2F3CE850000
|
trusted library allocation
|
page read and write
|
||
6BE000
|
heap
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
2F3CDC5F000
|
heap
|
page read and write
|
||
2C7D000
|
stack
|
page read and write
|
||
F9F7BFA000
|
stack
|
page read and write
|
||
36CA000
|
stack
|
page read and write
|
||
2F3CDC5F000
|
heap
|
page read and write
|
||
2180000
|
heap
|
page read and write
|
||
2BDA000
|
unclassified section
|
page read and write
|
||
694000
|
heap
|
page read and write
|
||
F9F7CFF000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2F3CDC10000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page execute and read and write
|
||
65E000
|
heap
|
page read and write
|
||
F9F7DFF000
|
stack
|
page read and write
|
||
20E0000
|
heap
|
page read and write
|
||
2F3CEA90000
|
trusted library allocation
|
page read and write
|
||
2F3CDB20000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2F3CDC57000
|
heap
|
page read and write
|
||
2F3CDBE0000
|
trusted library allocation
|
page read and write
|
||
2F3CDC18000
|
heap
|
page read and write
|
||
477000
|
unkown
|
page write copy
|
||
2F3CDBC0000
|
trusted library allocation
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page execute and read and write
|
||
19C000
|
stack
|
page read and write
|
||
2F3CDB79000
|
heap
|
page read and write
|
||
2150000
|
heap
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
30A8000
|
heap
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
F9F7AFF000
|
stack
|
page read and write
|
||
2F3CD9F0000
|
trusted library allocation
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21A0000
|
direct allocation
|
page execute and read and write
|
||
2BD1000
|
unclassified section
|
page execute read
|
||
47F000
|
unkown
|
page readonly
|
||
6B7000
|
heap
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
2BD0000
|
unclassified section
|
page read and write
|
||
477000
|
unkown
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
2F3CEAF0000
|
trusted library allocation
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
There are 89 hidden memdumps, click here to show them.