Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\gozi_loader.bin.exe
|
C:\Users\user\Desktop\gozi_loader.bin.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://checklist.skype.com/drew/YJnT5wK9lbi_2FYe8Kf5y/QYTs_2B6r_2FF8l0/fLw2xZG1XgX5PrO/q_2Bnf6Otc_2F
|
unknown
|
||
http://62.173.141.252/drew/y3O_2BnUepUaUzeF4C/FRcN_2F0g/JenmUZWHq05STtkRb5sf/OjHYpR2L_2F2jEOkrjw/2V_
|
unknown
|
||
http://62.173
|
unknown
|
||
http://ctldl.windowsup-k
|
unknown
|
||
http://62.173.141.252/t
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
checklist.skype.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
62.173.141.252
|
unknown
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1348000
|
heap
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
129DD654000
|
heap
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
129DE023000
|
heap
|
page read and write
|
||
403000
|
unkown
|
page readonly
|
||
129DD7B9000
|
heap
|
page read and write
|
||
32CD000
|
stack
|
page read and write
|
||
1B0C2FF000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
1EED5C90000
|
trusted library allocation
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
2DAC7713000
|
heap
|
page read and write
|
||
1EED5D00000
|
trusted library allocation
|
page read and write
|
||
24704C3E000
|
heap
|
page read and write
|
||
8CA68FE000
|
stack
|
page read and write
|
||
24704C13000
|
heap
|
page read and write
|
||
8CA66FB000
|
stack
|
page read and write
|
||
1CA1A445000
|
heap
|
page read and write
|
||
1CA1A474000
|
heap
|
page read and write
|
||
D8983FE000
|
stack
|
page read and write
|
||
2CA6F45C000
|
heap
|
page read and write
|
||
2DAC7662000
|
heap
|
page read and write
|
||
1F5B5E40000
|
heap
|
page read and write
|
||
FEC31FE000
|
stack
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
129DDF94000
|
heap
|
page read and write
|
||
1EED4160000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
D38000
|
heap
|
page read and write
|
||
1EED426D000
|
heap
|
page read and write
|
||
1F5B5EB0000
|
heap
|
page read and write
|
||
1CA1A442000
|
heap
|
page read and write
|
||
24704C66000
|
heap
|
page read and write
|
||
2DAC7600000
|
heap
|
page read and write
|
||
1B0BEF9000
|
stack
|
page read and write
|
||
129DDE02000
|
heap
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
1EED431B000
|
heap
|
page read and write
|
||
D89827F000
|
stack
|
page read and write
|
||
1CA1A464000
|
heap
|
page read and write
|
||
1CA1A47D000
|
heap
|
page read and write
|
||
1A6F863E000
|
heap
|
page read and write
|
||
2DAC74B0000
|
heap
|
page read and write
|
||
2DAC7676000
|
heap
|
page read and write
|
||
129DD7E5000
|
heap
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
1A6F8646000
|
heap
|
page read and write
|
||
134B000
|
heap
|
page read and write
|
||
2DAC7640000
|
heap
|
page read and write
|
||
129DD560000
|
heap
|
page read and write
|
||
129DDFC7000
|
heap
|
page read and write
|
||
8C3A77E000
|
stack
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
129DD63D000
|
heap
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
2CA6F502000
|
heap
|
page read and write
|
||
1EED426C000
|
heap
|
page read and write
|
||
1F5B6802000
|
trusted library allocation
|
page read and write
|
||
1CA1A2C0000
|
heap
|
page read and write
|
||
8CA667D000
|
stack
|
page read and write
|
||
2CA6F2F0000
|
heap
|
page read and write
|
||
2DAC7440000
|
heap
|
page read and write
|
||
1EED4300000
|
heap
|
page read and write
|
||
1EED4213000
|
heap
|
page read and write
|
||
129DDF6F000
|
heap
|
page read and write
|
||
1EED4313000
|
heap
|
page read and write
|
||
425E6FE000
|
stack
|
page read and write
|
||
1CA1A475000
|
heap
|
page read and write
|
||
425E3F9000
|
stack
|
page read and write
|
||
1F5B6079000
|
heap
|
page read and write
|
||
1A6F8600000
|
heap
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
129DD629000
|
heap
|
page read and write
|
||
1F5B6002000
|
heap
|
page read and write
|
||
B3A227F000
|
stack
|
page read and write
|
||
2CA6F429000
|
heap
|
page read and write
|
||
8C3A37F000
|
stack
|
page read and write
|
||
FEC2BFE000
|
stack
|
page read and write
|
||
2DAC7450000
|
heap
|
page read and write
|
||
33CA000
|
stack
|
page read and write
|
||
129DD687000
|
heap
|
page read and write
|
||
2DAC7670000
|
heap
|
page read and write
|
||
1A6F863B000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
B3A1F7E000
|
stack
|
page read and write
|
||
FEC2DFF000
|
stack
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
2CA6F2E0000
|
heap
|
page read and write
|
||
1CA1A250000
|
heap
|
page read and write
|
||
425E5FF000
|
stack
|
page read and write
|
||
24704A90000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
1CA1A484000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
129DD78E000
|
heap
|
page read and write
|
||
469237B000
|
stack
|
page read and write
|
||
2CA6F380000
|
trusted library allocation
|
page read and write
|
||
1EED424E000
|
heap
|
page read and write
|
||
D897DAB000
|
stack
|
page read and write
|
||
1A6F864C000
|
heap
|
page read and write
|
||
1CA1A46A000
|
heap
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
1B0C1FE000
|
stack
|
page read and write
|
||
129DD500000
|
heap
|
page read and write
|
||
8CA67FC000
|
stack
|
page read and write
|
||
1B0B79B000
|
stack
|
page read and write
|
||
1EED4318000
|
heap
|
page read and write
|
||
1F5B6100000
|
heap
|
page read and write
|
||
B3A1B3E000
|
stack
|
page read and write
|
||
2DAC7702000
|
heap
|
page read and write
|
||
1CA1A465000
|
heap
|
page read and write
|
||
129DDF22000
|
heap
|
page read and write
|
||
24704C29000
|
heap
|
page read and write
|
||
B3A207E000
|
stack
|
page read and write
|
||
2CA6F3B0000
|
remote allocation
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
1CA1A441000
|
heap
|
page read and write
|
||
24704AF0000
|
heap
|
page read and write
|
||
B3A1BBE000
|
stack
|
page read and write
|
||
1CA1A429000
|
heap
|
page read and write
|
||
1EED423D000
|
heap
|
page read and write
|
||
24705512000
|
heap
|
page read and write
|
||
129DDF00000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
8C3A57C000
|
stack
|
page read and write
|
||
129DD665000
|
heap
|
page read and write
|
||
129DDFB2000
|
heap
|
page read and write
|
||
8CA63FE000
|
stack
|
page read and write
|
||
8C3A17E000
|
stack
|
page read and write
|
||
24705500000
|
heap
|
page read and write
|
||
FEC30FF000
|
stack
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
8CA607B000
|
stack
|
page read and write
|
||
2DAC7659000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1A6F85A0000
|
heap
|
page read and write
|
||
1A6F8E02000
|
trusted library allocation
|
page read and write
|
||
425E4FF000
|
stack
|
page read and write
|
||
1CA1A453000
|
heap
|
page read and write
|
||
129DD613000
|
heap
|
page read and write
|
||
1CA1A45D000
|
heap
|
page read and write
|
||
1A6F862F000
|
heap
|
page read and write
|
||
1F5B6113000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
8CA69FE000
|
stack
|
page read and write
|
||
129DD590000
|
trusted library allocation
|
page read and write
|
||
FEC2EFF000
|
stack
|
page read and write
|
||
FEC2FFF000
|
stack
|
page read and write
|
||
24704A80000
|
heap
|
page read and write
|
||
1F5B606C000
|
heap
|
page read and write
|
||
1EED422A000
|
heap
|
page read and write
|
||
129DE030000
|
heap
|
page read and write
|
||
2CA6F402000
|
heap
|
page read and write
|
||
1A6F8702000
|
heap
|
page read and write
|
||
24704CB9000
|
heap
|
page read and write
|
||
1B0C27E000
|
stack
|
page read and write
|
||
2CA6F400000
|
heap
|
page read and write
|
||
1EED4302000
|
heap
|
page read and write
|
||
1F5B5FB0000
|
trusted library allocation
|
page read and write
|
||
1F5B6051000
|
heap
|
page read and write
|
||
B3A1ABC000
|
stack
|
page read and write
|
||
129DD670000
|
heap
|
page read and write
|
||
E4C000
|
stack
|
page read and write
|
||
1EED5E02000
|
trusted library allocation
|
page read and write
|
||
D89857F000
|
stack
|
page read and write
|
||
1A6F8641000
|
heap
|
page read and write
|
||
1CA1A44A000
|
heap
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
8C3A67E000
|
stack
|
page read and write
|
||
2CA6F413000
|
heap
|
page read and write
|
||
1B0C0FF000
|
stack
|
page read and write
|
||
129DD5B0000
|
trusted library allocation
|
page read and write
|
||
8CA6AFE000
|
stack
|
page read and write
|
||
57C000
|
unclassified section
|
page readonly
|
||
1B0BFFA000
|
stack
|
page read and write
|
||
1F5B5E50000
|
heap
|
page read and write
|
||
8C3A27F000
|
stack
|
page read and write
|
||
1CA1A44C000
|
heap
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
579000
|
unclassified section
|
page readonly
|
||
1CA1A47B000
|
heap
|
page read and write
|
||
2CA6F3B0000
|
remote allocation
|
page read and write
|
||
1CA1A43E000
|
heap
|
page read and write
|
||
D89807E000
|
stack
|
page read and write
|
||
1CA1A448000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
129DD656000
|
heap
|
page read and write
|
||
1A6F8602000
|
heap
|
page read and write
|
||
1CA1A446000
|
heap
|
page read and write
|
||
129DE002000
|
heap
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
1CA1A502000
|
heap
|
page read and write
|
||
1EED41D0000
|
heap
|
page read and write
|
||
1EED5D80000
|
remote allocation
|
page read and write
|
||
2DAC7613000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
1EED429E000
|
heap
|
page read and write
|
||
1A6F8654000
|
heap
|
page read and write
|
||
24704D13000
|
heap
|
page read and write
|
||
24704BF0000
|
trusted library allocation
|
page read and write
|
||
1EED4170000
|
heap
|
page read and write
|
||
570000
|
unclassified section
|
page read and write
|
||
1CA1A46D000
|
heap
|
page read and write
|
||
1CA1A43B000
|
heap
|
page read and write
|
||
8C39FFC000
|
stack
|
page read and write
|
||
129DD692000
|
heap
|
page read and write
|
||
1EED425D000
|
heap
|
page read and write
|
||
1F5B6000000
|
heap
|
page read and write
|
||
129DDF22000
|
heap
|
page read and write
|
||
D8982FE000
|
stack
|
page read and write
|
||
1CA1A47E000
|
heap
|
page read and write
|
||
F0E000
|
stack
|
page read and write
|
||
1F5B6040000
|
heap
|
page read and write
|
||
1F5B6028000
|
heap
|
page read and write
|
||
24704C25000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
469207B000
|
stack
|
page read and write
|
||
129DD677000
|
heap
|
page read and write
|
||
2CA6F440000
|
heap
|
page read and write
|
||
129DD68B000
|
heap
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
1F5B6013000
|
heap
|
page read and write
|
||
FEC28FB000
|
stack
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
1CA1A46B000
|
heap
|
page read and write
|
||
1EED425C000
|
heap
|
page read and write
|
||
2CA6FC02000
|
trusted library allocation
|
page read and write
|
||
2DAC7602000
|
heap
|
page read and write
|
||
2CA6F437000
|
heap
|
page read and write
|
||
D89877D000
|
stack
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
2DAC75B0000
|
trusted library allocation
|
page read and write
|
||
129DD713000
|
heap
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
1A6F8613000
|
heap
|
page read and write
|
||
1EED4275000
|
heap
|
page read and write
|
||
1F5B6075000
|
heap
|
page read and write
|
||
405000
|
unkown
|
page read and write
|
||
8CA657C000
|
stack
|
page read and write
|
||
1A6F8629000
|
heap
|
page read and write
|
||
24704CC7000
|
heap
|
page read and write
|
||
129DD4F0000
|
heap
|
page read and write
|
||
1EED4202000
|
heap
|
page read and write
|
||
24704C00000
|
heap
|
page read and write
|
||
FEC29FF000
|
stack
|
page read and write
|
||
469257E000
|
stack
|
page read and write
|
||
783000
|
heap
|
page read and write
|
||
1EED5D80000
|
remote allocation
|
page read and write
|
||
469247E000
|
stack
|
page read and write
|
||
1CA1AC02000
|
trusted library allocation
|
page read and write
|
||
425DEBC000
|
stack
|
page read and write
|
||
1CA1A463000
|
heap
|
page read and write
|
||
129DD691000
|
heap
|
page read and write
|
||
129DD600000
|
heap
|
page read and write
|
||
129DD62F000
|
heap
|
page read and write
|
||
1B0BD7F000
|
stack
|
page read and write
|
||
1CA1A44E000
|
heap
|
page read and write
|
||
1A6F8D50000
|
trusted library allocation
|
page read and write
|
||
1CA1A462000
|
heap
|
page read and write
|
||
129DDF43000
|
heap
|
page read and write
|
||
24704CCA000
|
heap
|
page read and write
|
||
1EED5D80000
|
remote allocation
|
page read and write
|
||
129DE013000
|
heap
|
page read and write
|
||
736000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2DAC7E02000
|
trusted library allocation
|
page read and write
|
||
1CA1A460000
|
heap
|
page read and write
|
||
D89867D000
|
stack
|
page read and write
|
||
129DDF54000
|
heap
|
page read and write
|
||
24704CE3000
|
heap
|
page read and write
|
||
1CA1A447000
|
heap
|
page read and write
|
||
129DD675000
|
heap
|
page read and write
|
||
1CA1A461000
|
heap
|
page read and write
|
||
1CA1A260000
|
heap
|
page read and write
|
||
24705402000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
8CA627C000
|
stack
|
page read and write
|
||
1CA1A3C0000
|
trusted library allocation
|
page read and write
|
||
1EED4200000
|
heap
|
page read and write
|
||
FEC2AFB000
|
stack
|
page read and write
|
||
1B0BE7B000
|
stack
|
page read and write
|
||
129DE000000
|
heap
|
page read and write
|
||
129DDFC0000
|
heap
|
page read and write
|
||
1CA1A449000
|
heap
|
page read and write
|
||
24704C6D000
|
heap
|
page read and write
|
||
1EED5C70000
|
trusted library allocation
|
page read and write
|
||
FEC2CFD000
|
stack
|
page read and write
|
||
1CA1A45F000
|
heap
|
page read and write
|
||
1EED426D000
|
heap
|
page read and write
|
||
1CA1A468000
|
heap
|
page read and write
|
||
1CA1A432000
|
heap
|
page read and write
|
||
403000
|
unkown
|
page readonly
|
||
FEC24AB000
|
stack
|
page read and write
|
||
2CA6F423000
|
heap
|
page read and write
|
||
1CA1A413000
|
heap
|
page read and write
|
||
8C3A47C000
|
stack
|
page read and write
|
||
1A6F85F0000
|
heap
|
page read and write
|
||
571000
|
unclassified section
|
page execute read
|
||
405000
|
unkown
|
page write copy
|
||
407000
|
unkown
|
page readonly
|
||
B3A217F000
|
stack
|
page read and write
|
||
8C39B8B000
|
stack
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
1F5B6102000
|
heap
|
page read and write
|
||
129DDF02000
|
heap
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
2DAC7629000
|
heap
|
page read and write
|
||
1EED425D000
|
heap
|
page read and write
|
||
129DE027000
|
heap
|
page read and write
|
||
D8984FD000
|
stack
|
page read and write
|
||
2CA6F3B0000
|
remote allocation
|
page read and write
|
||
2CA6F41F000
|
heap
|
page read and write
|
||
1CA1A46F000
|
heap
|
page read and write
|
||
8CA64FF000
|
stack
|
page read and write
|
||
2C7D000
|
stack
|
page read and write
|
||
1EED5CC0000
|
trusted library allocation
|
page read and write
|
||
57A000
|
unclassified section
|
page read and write
|
||
1B0BBFA000
|
stack
|
page read and write
|
||
2CA6F350000
|
heap
|
page read and write
|
||
469267B000
|
stack
|
page read and write
|
||
1CA1A400000
|
heap
|
page read and write
|
||
1CA1A443000
|
heap
|
page read and write
|
||
24704D02000
|
heap
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
1A6F8590000
|
heap
|
page read and write
|
There are 328 hidden memdumps, click here to show them.