Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\uA71eQl1nA.exe
|
"C:\Users\user\Desktop\uA71eQl1nA.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://119.45.147.28/jquery-3.3.2.slim.min.js
|
|||
http://code.jquery.com/
|
unknown
|
||
http://119.45.147.28:443/jquery-3.3.2.slim.min.js
|
|||
https://119.45.147.28/8
|
unknown
|
||
https://119.45.147.28/jquery-3.3.2.slim.min.js3fovzTE
|
unknown
|
||
https://119.45.147.28/jquery-3.3.2.slim.min.js
|
unknown
|
||
https://119.45.147.28/
|
unknown
|
||
https://119.45.147.28/jquery-3.3.2.slim.min.jsYvdTA
|
unknown
|
||
https://119.45.147.28/jquery-3.3.2.slim.min.js#
|
unknown
|
||
https://119.45.147.28/jquery-3.3.2.slim.min.jss
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
119.45.147.28
|
unknown
|
China
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2750000
|
direct allocation
|
page execute and read and write
|
||
AFA000
|
stack
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
C3C000
|
heap
|
page read and write
|
||
BD2000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
50DD000
|
stack
|
page read and write
|
||
BDE000
|
heap
|
page read and write
|
||
C6B000
|
heap
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
279B000
|
heap
|
page read and write
|
||
7FF625960000
|
unkown
|
page readonly
|
||
C64000
|
heap
|
page read and write
|
||
7FF625961000
|
unkown
|
page execute read
|
||
4FE0000
|
remote allocation
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
4F7F000
|
stack
|
page read and write
|
||
27C3000
|
heap
|
page read and write
|
||
C2F000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
7FF625960000
|
unkown
|
page readonly
|
||
4FE0000
|
remote allocation
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
BDB000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
29CC000
|
stack
|
page read and write
|
||
2795000
|
heap
|
page read and write
|
||
BDB000
|
heap
|
page read and write
|
||
BB6000
|
heap
|
page read and write
|
||
4023000
|
heap
|
page read and write
|
||
C43000
|
heap
|
page read and write
|
||
7FF625964000
|
unkown
|
page readonly
|
||
BDA000
|
heap
|
page read and write
|
||
4FE0000
|
remote allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
7FF625962000
|
unkown
|
page readonly
|
||
C41000
|
heap
|
page read and write
|
||
BF7000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
7FF625964000
|
unkown
|
page readonly
|
||
B40000
|
heap
|
page read and write
|
||
C6B000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
7FF625962000
|
unkown
|
page readonly
|
||
2BCF000
|
stack
|
page read and write
|
||
4020000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
7FF625961000
|
unkown
|
page execute read
|
||
4570000
|
trusted library allocation
|
page read and write
|
||
C2D000
|
heap
|
page read and write
|
||
2AC8000
|
stack
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
BF7000
|
heap
|
page read and write
|
||
BDF000
|
heap
|
page read and write
|
||
BDE000
|
heap
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
There are 52 hidden memdumps, click here to show them.