Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
nR63RhmdVb.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\nR63RhmdVb.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\nR63RhmdVb.exe
|
"C:\Users\user\Desktop\nR63RhmdVb.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
213.209.129.155:27667
|
|||
https://api.ip.sb/ip
|
unknown
|
||
https://api.ip.s
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FFB9AA1D000
|
trusted library allocation
|
page execute and read and write
|
||
2D0E000
|
trusted library allocation
|
page read and write
|
||
B87000
|
heap
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
1B2F0000
|
heap
|
page read and write
|
||
2BFD000
|
trusted library allocation
|
page read and write
|
||
B6A000
|
heap
|
page read and write
|
||
7FFB9ABA0000
|
trusted library allocation
|
page read and write
|
||
2C8E000
|
trusted library allocation
|
page read and write
|
||
12AD1000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
2CB9000
|
trusted library allocation
|
page read and write
|
||
2C7D000
|
trusted library allocation
|
page read and write
|
||
2CFD000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
1B68D000
|
stack
|
page read and write
|
||
2C8A000
|
trusted library allocation
|
page read and write
|
||
2C6A000
|
trusted library allocation
|
page read and write
|
||
2C5D000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
1B2D4000
|
heap
|
page read and write
|
||
2B19000
|
trusted library allocation
|
page read and write
|
||
2C77000
|
trusted library allocation
|
page read and write
|
||
2C90000
|
trusted library allocation
|
page read and write
|
||
B72000
|
heap
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
1B2E9000
|
heap
|
page read and write
|
||
1E39F000
|
stack
|
page read and write
|
||
64E000
|
unkown
|
page readonly
|
||
1B328000
|
heap
|
page read and write
|
||
ACF000
|
heap
|
page read and write
|
||
A96000
|
heap
|
page read and write
|
||
622000
|
unkown
|
page readonly
|
||
2CB5000
|
trusted library allocation
|
page read and write
|
||
B5D000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
1B430000
|
heap
|
page execute and read and write
|
||
B04000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page execute and read and write
|
||
7FFB9AB10000
|
trusted library allocation
|
page execute and read and write
|
||
2CDD000
|
trusted library allocation
|
page read and write
|
||
1B2B9000
|
heap
|
page read and write
|
||
7FFB9AAD6000
|
trusted library allocation
|
page execute and read and write
|
||
1B6A5000
|
heap
|
page read and write
|
||
2B79000
|
trusted library allocation
|
page read and write
|
||
1E29E000
|
stack
|
page read and write
|
||
E05000
|
heap
|
page read and write
|
||
ABE000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
1B325000
|
heap
|
page read and write
|
||
2D08000
|
trusted library allocation
|
page read and write
|
||
7FFB9AAAC000
|
trusted library allocation
|
page execute and read and write
|
||
12AD3000
|
trusted library allocation
|
page read and write
|
||
1B2B0000
|
heap
|
page read and write
|
||
AFE000
|
heap
|
page read and write
|
||
2D0A000
|
trusted library allocation
|
page read and write
|
||
7FFB9AA1B000
|
trusted library allocation
|
page execute and read and write
|
||
2CDB000
|
trusted library allocation
|
page read and write
|
||
1C7B0000
|
heap
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
2CEC000
|
trusted library allocation
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
2B71000
|
trusted library allocation
|
page read and write
|
||
1B6A0000
|
heap
|
page read and write
|
||
2CB7000
|
trusted library allocation
|
page read and write
|
||
7FF4F5D30000
|
trusted library allocation
|
page execute and read and write
|
||
12AD8000
|
trusted library allocation
|
page read and write
|
||
2C55000
|
trusted library allocation
|
page read and write
|
||
12AD6000
|
trusted library allocation
|
page read and write
|
||
1B2DC000
|
heap
|
page read and write
|
||
7FFB9ABB0000
|
trusted library allocation
|
page read and write
|
||
1B6B0000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
7FFB9AA03000
|
trusted library allocation
|
page read and write
|
||
2C8C000
|
trusted library allocation
|
page read and write
|
||
1E49F000
|
stack
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
1B6C0000
|
heap
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
7FFB9AAB0000
|
trusted library allocation
|
page execute and read and write
|
||
A90000
|
heap
|
page read and write
|
||
B22000
|
heap
|
page read and write
|
||
7FFB9A9F4000
|
trusted library allocation
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
AD3000
|
heap
|
page read and write
|
||
7FFB9AB90000
|
trusted library allocation
|
page read and write
|
||
7FFB9ABC0000
|
trusted library allocation
|
page read and write
|
||
7FFB9AA14000
|
trusted library allocation
|
page read and write
|
||
7FFB9A9FD000
|
trusted library allocation
|
page execute and read and write
|
||
B79000
|
heap
|
page read and write
|
||
2C9F000
|
trusted library allocation
|
page read and write
|
||
2CC8000
|
trusted library allocation
|
page read and write
|
||
2CEA000
|
trusted library allocation
|
page read and write
|
||
1B2C0000
|
heap
|
page read and write
|
||
7FFB9ABD0000
|
trusted library allocation
|
page execute and read and write
|
||
28BF000
|
stack
|
page read and write
|
||
2C59000
|
trusted library allocation
|
page read and write
|
||
AD1000
|
heap
|
page read and write
|
||
7FFB9AA0D000
|
trusted library allocation
|
page execute and read and write
|
||
A30000
|
heap
|
page read and write
|
||
2C42000
|
trusted library allocation
|
page read and write
|
||
2C31000
|
trusted library allocation
|
page read and write
|
||
2D0C000
|
trusted library allocation
|
page read and write
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
7FFB9AA4C000
|
trusted library allocation
|
page execute and read and write
|
||
620000
|
unkown
|
page readonly
|
||
2A30000
|
trusted library section
|
page readonly
|
||
1B2CC000
|
heap
|
page read and write
|
||
2C57000
|
trusted library allocation
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
2C68000
|
trusted library allocation
|
page read and write
|
||
1B309000
|
heap
|
page read and write
|
||
2CCE000
|
trusted library allocation
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
7FFB9AAA0000
|
trusted library allocation
|
page read and write
|
||
1B290000
|
heap
|
page read and write
|
||
7FFB9AAA6000
|
trusted library allocation
|
page read and write
|
||
2CC6000
|
trusted library allocation
|
page read and write
|
||
2C6C000
|
trusted library allocation
|
page read and write
|
||
2CD7000
|
trusted library allocation
|
page read and write
|
||
1CEAE000
|
stack
|
page read and write
|
||
7E2000
|
stack
|
page read and write
|
||
2C9D000
|
trusted library allocation
|
page read and write
|
||
2CCC000
|
trusted library allocation
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
2CCA000
|
trusted library allocation
|
page read and write
|
||
2B38000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
1B580000
|
heap
|
page read and write
|
||
2C6F000
|
trusted library allocation
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
2CBB000
|
trusted library allocation
|
page read and write
|
||
1B2E2000
|
heap
|
page read and write
|
||
7FFB9AA10000
|
trusted library allocation
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
1AF4C000
|
stack
|
page read and write
|
||
1B332000
|
heap
|
page read and write
|
||
2CFB000
|
trusted library allocation
|
page read and write
|
||
2CD9000
|
trusted library allocation
|
page read and write
|
||
7FFB9A9F3000
|
trusted library allocation
|
page execute and read and write
|
||
2CEE000
|
trusted library allocation
|
page read and write
|
||
1B313000
|
heap
|
page read and write
|
There are 138 hidden memdumps, click here to show them.