Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\Newtonsoft.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Newtonsoft.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\Newtonsoft.dll",#1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.newtonsoft.com/json
|
unknown
|
||
https://www.nuget.org/packages/Newtonsoft.Json.Bson
|
unknown
|
||
http://james.newtonking.com/projects/json
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://github.com/JamesNK/Newtonsoft.Json
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4C0000
|
heap
|
page read and write
|
||
5F60000
|
heap
|
page read and write
|
||
2F18000
|
heap
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
67B000
|
heap
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
2F2E000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
6044000
|
heap
|
page read and write
|
||
463F000
|
stack
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
2D3A000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
6390000
|
trusted library allocation
|
page read and write
|
||
4AE000
|
stack
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
A9C000
|
stack
|
page read and write
|
||
2F18000
|
heap
|
page read and write
|
||
2F18000
|
heap
|
page read and write
|
||
1AD000
|
stack
|
page read and write
|
||
2F35000
|
heap
|
page read and write
|
||
2F14000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
67F000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
46E000
|
stack
|
page read and write
|
||
6040000
|
heap
|
page read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
A59000
|
stack
|
page read and write
|
||
AD000
|
stack
|
page read and write
|
||
2D36000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
86F000
|
stack
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
A3F000
|
stack
|
page read and write
|
||
5F70000
|
heap
|
page read and write
|
||
2F1D000
|
heap
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
2EFA000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
There are 37 hidden memdumps, click here to show them.