Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\HeOkukP.dll,#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\HeOkukP.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\HeOkukP.dll",#1
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\HeOkukP.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\HeOkukP.dll",#1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.rapidfilestorage.com/clrls/cl_rls.json
|
185.22.66.16
|
||
http://www.rapidfilestorage.com/clrls/cl_rls.jsonB
|
unknown
|
||
https://hg.mozilla.org/releases/mozilla-release
|
unknown
|
||
http://www.rapidfilestorage.com/clrls/cl_rls.jsonLz
|
unknown
|
||
https://crash-reports.mozilla.com/submit?id=
|
unknown
|
||
http://www.rapidfilestorage.com/clrls/cl_rls.json)
|
unknown
|
||
http://www.rapidfilestorage.com/clrls/cl_rls.json;
|
unknown
|
||
http://www.rapidfilestorage.com/clrls/cl_rls.jsond
|
unknown
|
||
http://www.rapidfilestorage.com/clrls/cl_rls.jsonu
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
env-3936544.jcloud.kz
|
185.22.66.16
|
||
www.rapidfilestorage.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.22.66.16
|
env-3936544.jcloud.kz
|
Kazakhstan
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4D0E000
|
stack
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
2B35000
|
heap
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
495C000
|
stack
|
page read and write
|
||
1017000
|
heap
|
page read and write
|
||
4A4D000
|
stack
|
page read and write
|
||
2B66000
|
heap
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
50CD000
|
direct allocation
|
page readonly
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
5531000
|
direct allocation
|
page execute read
|
||
2963000
|
heap
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
33CA000
|
heap
|
page read and write
|
||
2976000
|
heap
|
page read and write
|
||
2B61000
|
heap
|
page read and write
|
||
2B3E000
|
heap
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
28D1000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
2ADA000
|
heap
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
44C0000
|
heap
|
page read and write
|
||
33B8000
|
heap
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
2B75000
|
heap
|
page read and write
|
||
3327000
|
heap
|
page read and write
|
||
2B47000
|
heap
|
page read and write
|
||
5B19000
|
heap
|
page read and write
|
||
5C10000
|
trusted library allocation
|
page read and write
|
||
2962000
|
heap
|
page read and write
|
||
25A0000
|
heap
|
page read and write
|
||
2945000
|
heap
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
50A0000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
48DD000
|
stack
|
page read and write
|
||
48CE000
|
stack
|
page read and write
|
||
33B8000
|
heap
|
page read and write
|
||
5B10000
|
heap
|
page read and write
|
||
333A000
|
heap
|
page read and write
|
||
33D6000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
4AB1000
|
direct allocation
|
page execute read
|
||
28D0000
|
heap
|
page read and write
|
||
2B5E000
|
heap
|
page read and write
|
||
33C5000
|
heap
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
33B3000
|
heap
|
page read and write
|
||
2945000
|
heap
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
5111000
|
heap
|
page read and write
|
||
28BA000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
2B75000
|
heap
|
page read and write
|
||
33BC000
|
heap
|
page read and write
|
||
294C000
|
heap
|
page read and write
|
||
3394000
|
heap
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
50CF000
|
direct allocation
|
page execute and read and write
|
||
297D000
|
heap
|
page read and write
|
||
33D6000
|
heap
|
page read and write
|
||
3287000
|
heap
|
page read and write
|
||
5AFD000
|
direct allocation
|
page readonly
|
||
568A000
|
direct allocation
|
page read and write
|
||
54DD000
|
stack
|
page read and write
|
||
101D000
|
heap
|
page read and write
|
||
33C6000
|
heap
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
484D000
|
stack
|
page read and write
|
||
33D6000
|
heap
|
page read and write
|
||
28A7000
|
heap
|
page read and write
|
||
33B8000
|
heap
|
page read and write
|
||
255B000
|
stack
|
page read and write
|
||
4E90000
|
heap
|
page read and write
|
||
543F000
|
stack
|
page read and write
|
||
4D4E000
|
stack
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
5080000
|
direct allocation
|
page read and write
|
||
339C000
|
heap
|
page read and write
|
||
2539000
|
stack
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
3333000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
100F000
|
heap
|
page read and write
|
||
28D4000
|
heap
|
page read and write
|
||
4430000
|
heap
|
page read and write
|
||
2971000
|
heap
|
page read and write
|
||
2B47000
|
heap
|
page read and write
|
||
2ACD000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
52CD000
|
stack
|
page read and write
|
||
332D000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
296E000
|
heap
|
page read and write
|
||
2B57000
|
heap
|
page read and write
|
||
25E5000
|
heap
|
page read and write
|
||
2AC2000
|
heap
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
2935000
|
heap
|
page read and write
|
||
2B6D000
|
heap
|
page read and write
|
||
2B35000
|
heap
|
page read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
33B3000
|
heap
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
2945000
|
heap
|
page read and write
|
||
2935000
|
heap
|
page read and write
|
||
2B5E000
|
heap
|
page read and write
|
||
2B58000
|
heap
|
page read and write
|
||
28D5000
|
heap
|
page read and write
|
||
28A7000
|
heap
|
page read and write
|
||
323A000
|
stack
|
page read and write
|
||
4AFF000
|
stack
|
page read and write
|
||
33BC000
|
heap
|
page read and write
|
||
33D6000
|
heap
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
5111000
|
heap
|
page read and write
|
||
3394000
|
heap
|
page read and write
|
||
4A0F000
|
stack
|
page read and write
|
||
2B75000
|
heap
|
page read and write
|
||
33C9000
|
heap
|
page read and write
|
||
33B3000
|
heap
|
page read and write
|
||
530F000
|
stack
|
page read and write
|
||
5110000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
24FB000
|
stack
|
page read and write
|
||
259A000
|
stack
|
page read and write
|
||
28DB000
|
heap
|
page read and write
|
||
339A000
|
heap
|
page read and write
|
||
33CB000
|
heap
|
page read and write
|
||
100B000
|
heap
|
page read and write
|
||
2935000
|
heap
|
page read and write
|
||
28E9000
|
heap
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
50D0000
|
direct allocation
|
page read and write
|
||
287F000
|
stack
|
page read and write
|
||
4510000
|
heap
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
2B68000
|
heap
|
page read and write
|
||
2B56000
|
heap
|
page read and write
|
||
507F000
|
direct allocation
|
page execute and read and write
|
||
491D000
|
stack
|
page read and write
|
||
2AAA000
|
heap
|
page read and write
|
||
2B3C000
|
heap
|
page read and write
|
||
44AD000
|
stack
|
page read and write
|
||
2B47000
|
heap
|
page read and write
|
||
2B67000
|
heap
|
page read and write
|
||
507D000
|
direct allocation
|
page readonly
|
||
2962000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
2977000
|
heap
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
2B75000
|
heap
|
page read and write
|
||
3322000
|
heap
|
page read and write
|
||
28A5000
|
heap
|
page read and write
|
||
2B6A000
|
heap
|
page read and write
|
||
296E000
|
heap
|
page read and write
|
||
2ACF000
|
heap
|
page read and write
|
||
33C4000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
4C5A000
|
direct allocation
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
488D000
|
stack
|
page read and write
|
||
489D000
|
stack
|
page read and write
|
||
5530000
|
direct allocation
|
page read and write
|
||
2B35000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
2B63000
|
heap
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
28EF000
|
heap
|
page read and write
|
||
2B47000
|
heap
|
page read and write
|
||
4D8F000
|
stack
|
page read and write
|
||
D3C000
|
stack
|
page read and write
|
||
2B69000
|
heap
|
page read and write
|
||
2B3E000
|
heap
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
2978000
|
heap
|
page read and write
|
||
496F000
|
stack
|
page read and write
|
||
330A000
|
heap
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
5AFF000
|
direct allocation
|
page execute and read and write
|
||
283E000
|
stack
|
page read and write
|
||
4A8C000
|
stack
|
page read and write
|
||
2968000
|
heap
|
page read and write
|
||
33B3000
|
heap
|
page read and write
|
||
25E7000
|
heap
|
page read and write
|
||
4B01000
|
direct allocation
|
page execute read
|
||
2AFF000
|
stack
|
page read and write
|
||
29BE000
|
stack
|
page read and write
|
||
534E000
|
stack
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
4C0A000
|
direct allocation
|
page read and write
|
||
2AD3000
|
heap
|
page read and write
|
||
3321000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
2B3E000
|
heap
|
page read and write
|
||
2967000
|
heap
|
page read and write
|
||
3326000
|
heap
|
page read and write
|
||
369E000
|
stack
|
page read and write
|
||
28E2000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
5B00000
|
direct allocation
|
page read and write
|
||
28A7000
|
heap
|
page read and write
|
||
28DF000
|
heap
|
page read and write
|
||
2FCB000
|
stack
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
3285000
|
heap
|
page read and write
|
||
339A000
|
heap
|
page read and write
|
||
4F2F000
|
stack
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
2962000
|
heap
|
page read and write
|
||
3394000
|
heap
|
page read and write
|
There are 225 hidden memdumps, click here to show them.