Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\xOg18pHQGOQK.exe
|
"C:\Users\user\Desktop\xOg18pHQGOQK.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sendfiletiahforem.duckdns.org
|
|||
http://go.microsoft.
|
unknown
|
||
http://go.microsoft.LinkId=42127
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sendfiletiahforem.duckdns.org
|
85.60.29.68
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
85.60.29.68
|
sendfiletiahforem.duckdns.org
|
Spain
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER
|
di
|
||
HKEY_CURRENT_USER\SOFTWARE\1d3f999c897
|
[kl]
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1D2000
|
unkown
|
page readonly
|
||
AC2000
|
trusted library allocation
|
page execute and read and write
|
||
90F000
|
heap
|
page read and write
|
||
4A8C000
|
stack
|
page read and write
|
||
4ACC000
|
stack
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
4B90000
|
unclassified section
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
566000
|
stack
|
page read and write
|
||
90C000
|
heap
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page execute and read and write
|
||
B80000
|
heap
|
page read and write
|
||
81F000
|
stack
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
B07000
|
trusted library allocation
|
page execute and read and write
|
||
1D8000
|
unkown
|
page readonly
|
||
4B80000
|
trusted library allocation
|
page execute and read and write
|
||
242E000
|
stack
|
page read and write
|
||
4970000
|
trusted library allocation
|
page read and write
|
||
AFA000
|
trusted library allocation
|
page execute and read and write
|
||
8AE000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
AD7000
|
trusted library allocation
|
page execute and read and write
|
||
860000
|
heap
|
page read and write
|
||
2774000
|
trusted library allocation
|
page read and write
|
||
8AA000
|
heap
|
page read and write
|
||
4980000
|
trusted library allocation
|
page execute and read and write
|
||
569000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
ACA000
|
trusted library allocation
|
page execute and read and write
|
||
8E0000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
469000
|
stack
|
page read and write
|
||
ABA000
|
trusted library allocation
|
page execute and read and write
|
||
850000
|
heap
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
AB2000
|
trusted library allocation
|
page execute and read and write
|
||
AF2000
|
trusted library allocation
|
page execute and read and write
|
||
6EE000
|
stack
|
page read and write
|
||
4A40000
|
heap
|
page read and write
|
||
4778000
|
trusted library allocation
|
page read and write
|
||
ADA000
|
trusted library allocation
|
page execute and read and write
|
||
B0B000
|
trusted library allocation
|
page execute and read and write
|
||
3771000
|
trusted library allocation
|
page read and write
|
||
AA4000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
B02000
|
trusted library allocation
|
page read and write
|
||
4A2D000
|
stack
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
ACC000
|
trusted library allocation
|
page execute and read and write
|
||
29FB000
|
trusted library allocation
|
page read and write
|
||
27C1000
|
trusted library allocation
|
page read and write
|
||
4B09000
|
stack
|
page read and write
|
There are 50 hidden memdumps, click here to show them.