IOC Report
https://b6dj2ueylkg.juraganrc.com/?url=aHR0cHM6Ly9ob2xseS1sYXZlbmRlci1yYXR0bGVzbmFrZS5nbGl0Y2gubWUvdmlsZC5odG1s

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Desktop\cmdline.out
ASCII text, with CRLF line terminators
modified
C:\Users\user\Desktop\download\index.html@url=aHR0cHM6Ly9ob2xseS1sYXZlbmRlci1yYXR0bGVzbmFrZS5nbGl0Y2gubWUvdmlsZC5odG1s
HTML document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://b6dj2ueylkg.juraganrc.com/?url=aHR0cHM6Ly9ob2xseS1sYXZlbmRlci1yYXR0bGVzbmFrZS5nbGl0Y2gubWUvdmlsZC5odG1s" > cmdline.out 2>&1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wget.exe
wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://b6dj2ueylkg.juraganrc.com/?url=aHR0cHM6Ly9ob2xseS1sYXZlbmRlci1yYXR0bGVzbmFrZS5nbGl0Y2gubWUvdmlsZC5odG1s"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\download\index.html@url=aHR0cHM6Ly9ob2xseS1sYXZlbmRlci1yYXR0bGVzbmFrZS5nbGl0Y2gubWUvdmlsZC5odG1s.html
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1944 --field-trial-handle=1616,i,5292400896411780733,13825633785752334259,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://b6dj2ueylkg.juraganrc.com/?url=aHR0cHM6Ly9ob2xseS1sYXZlbmRlci1yYXR0bGVzbmFrZS5nbGl0Y2gubWUvdmlsZC5odG1s
malicious
https://b6dj2ueylkg.juraganrc.com/?url=aHR0cHM6Ly9ob2xseS1sYXZlbmRlci1yYXR0bGVzbmFrZS5nbGl0Y2gubWUvdmlsZC5odG1s
192.185.138.191
malicious
https://holly-lavender-rattlesnake.glitch.me/vild.html#
https://holly-lavender-rattlesnake.glitch.me/vild.html#
unknown
https://honapalestine.com/1/frontend/web/index.php?/
https://holly-lavender-rattlesnake.glitch.me/favicon.ico
44.199.49.219
https://honapalestine.com/1/frontend/web/css/FrutigerLTArabic-55Roman.ttf
139.162.167.121
https://honapalestine.com/1/frontend/web/images/icons.png
139.162.167.121
https://honapalestine.com/
139.162.167.121
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
172.217.168.45
https://honapalestine.com/1/frontend/web/images/playstore.png
139.162.167.121
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
142.250.203.110
https://honapalestine.com/1/frontend/web/images/appstore.png
139.162.167.121
https://honapalestine.com/1/frontend/web/assets/e189e3b3/js/bootstrap.js
139.162.167.121
https://b6dj2ueylkg.juraganrc.com/?url=aHR0cHM6Ly9ob2xseS1sYXZlbmRlci1yYXR0bGVzbmFrZS5nbGl0Y2gubWUvd
unknown
https://holly-lavender-rattlesnake.glitch.me/vild.html
44.199.49.219
https://honapalestine.com/1/frontend/web/index.php?/
139.162.167.121
https://honapalestine.com/1/frontend/web/images/listenlive.png
139.162.167.121
https://honapalestine.com/1/frontend/web/css/site.css
139.162.167.121
https://honapalestine.com/1/frontend/web/assets/df38217b/yii.js
139.162.167.121
https://honapalestine.com/1/frontend/web/images/searchenglishbgar.png
139.162.167.121
https://honapalestine.com/1/frontend/web/assets/493c98da/jquery.js
139.162.167.121
https://honapalestine.com/1/frontend/web/images/logo-en.png
139.162.167.121
https://honapalestine.com/1/frontend/web/images/bg.jpg
139.162.167.121
https://honapalestine.com/1/frontend/web/assets/e189e3b3/css/bootstrap.css
139.162.167.121
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
accounts.google.com
172.217.168.45
holly-lavender-rattlesnake.glitch.me
44.199.49.219
honapalestine.com
139.162.167.121
b6dj2ueylkg.juraganrc.com
192.185.138.191
www.google.com
172.217.168.36
clients.l.google.com
142.250.203.110
part-0032.t-0009.fbs1-t-msedge.net
13.107.219.60
clients2.google.com
unknown

IPs

IP
Domain
Country
Malicious
13.107.219.60
part-0032.t-0009.fbs1-t-msedge.net
United States
192.168.2.1
unknown
unknown
142.250.203.110
clients.l.google.com
United States
139.162.167.121
honapalestine.com
Netherlands
44.199.49.219
holly-lavender-rattlesnake.glitch.me
United States
172.217.168.45
accounts.google.com
United States
192.185.138.191
b6dj2ueylkg.juraganrc.com
United States
172.217.168.36
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
S-1-5-21-3853321935-2125563209-4053062332-1002
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gdaefkejpgkiemlaofpalmlakkmbjdnl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
kmendfapggjehodndflmmgagdbamhnfd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
neajdppkdcdipfabeoofebfddakdcjhd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gdaefkejpgkiemlaofpalmlakkmbjdnl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
kmendfapggjehodndflmmgagdbamhnfd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
neajdppkdcdipfabeoofebfddakdcjhd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
dr
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
module_blocklist_cache_md5_digest
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_username
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
lastrun
HKEY_USERSS-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry
TraceTimeLast
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
S-1-5-21-3853321935-2125563209-4053062332-1002
There are 37 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1E6A8713000
heap
page read and write
2C2B000
trusted library allocation
page read and write
25A7A88B000
heap
page read and write
2BED000
trusted library allocation
page read and write
18DD3C83000
heap
page read and write
25A7B16D000
heap
page read and write
234813A0000
trusted library allocation
page read and write
18481200000
heap
page read and write
A9B12F9000
stack
page read and write
18481246000
heap
page read and write
25A7A820000
heap
page read and write
107E000
stack
page read and write
CF1EEFC000
stack
page read and write
29683A90000
heap
page read and write
23480E2F000
heap
page read and write
18481190000
heap
page read and write
2BE1000
trusted library allocation
page read and write
184811F0000
heap
page read and write
CF1EE7F000
stack
page read and write
CF1F17D000
stack
page read and write
C1323FD000
stack
page read and write
18DD3C00000
heap
page read and write
18DD3C60000
heap
page read and write
B00000
heap
page read and write
25A7B143000
heap
page read and write
29683A30000
heap
page read and write
18481302000
heap
page read and write
18DD3C33000
heap
page read and write
1E6A8570000
trusted library allocation
page read and write
967F5FE000
stack
page read and write
18482DA0000
remote allocation
page read and write
967FCFE000
stack
page read and write
C1320FD000
stack
page read and write
18482DA0000
remote allocation
page read and write
25A7A760000
heap
page read and write
18DD3C5B000
heap
page read and write
1E6A8702000
heap
page read and write
649B3CB000
stack
page read and write
18481318000
heap
page read and write
1C367670000
heap
page read and write
2BE2000
trusted library allocation
page read and write
967F7FD000
stack
page read and write
967F3FB000
stack
page read and write
29683D02000
heap
page read and write
25A7AF50000
trusted library allocation
page read and write
18DD3C58000
heap
page read and write
25A7B1AE000
heap
page read and write
1E6A8629000
heap
page read and write
2BE6000
trusted library allocation
page read and write
25A7A83C000
heap
page read and write
10F0000
heap
page read and write
967F8FE000
stack
page read and write
C131EFE000
stack
page read and write
18DD3BF0000
trusted library allocation
page read and write
25A7A86C000
heap
page read and write
23480E52000
heap
page read and write
2BE0000
trusted library allocation
page read and write
3F1E17E000
stack
page read and write
25A7B223000
heap
page read and write
CF1ED7F000
stack
page read and write
29683C02000
heap
page read and write
1C367640000
heap
page read and write
25A7A876000
heap
page read and write
C131E7E000
stack
page read and write
649BA79000
stack
page read and write
23480E02000
heap
page read and write
B3F000
heap
page read and write
9CC000
stack
page read and write
2101FE28000
heap
page read and write
1C367480000
heap
page read and write
1C367613000
heap
page read and write
25A7B227000
heap
page read and write
23480BF0000
heap
page read and write
2101FE02000
heap
page read and write
7DA7B9B000
stack
page read and write
1C36765B000
heap
page read and write
18DD3C46000
heap
page read and write
C1321FF000
stack
page read and write
29683A20000
heap
page read and write
C131FFF000
stack
page read and write
18DD3D02000
heap
page read and write
25A7A855000
heap
page read and write
21020602000
trusted library allocation
page read and write
2C2A000
trusted library allocation
page read and write
1BE000
stack
page read and write
29683C29000
heap
page read and write
5A9B8FF000
stack
page read and write
5A9BAFD000
stack
page read and write
25A7A886000
heap
page read and write
1E6A8F12000
heap
page read and write
25A7A858000
heap
page read and write
1E6A8F00000
heap
page read and write
25A7AF30000
trusted library allocation
page read and write
18481213000
heap
page read and write
A9B14FF000
stack
page read and write
1C367E02000
trusted library allocation
page read and write
2BE3000
trusted library allocation
page read and write
18481280000
heap
page read and write
1C367713000
heap
page read and write
649B7FE000
stack
page read and write
1E6A8613000
heap
page read and write
25A7B002000
heap
page read and write
1848127E000
heap
page read and write
176000
heap
page read and write
25A7A890000
heap
page read and write
18481257000
heap
page read and write
18481202000
heap
page read and write
18DD3C68000
heap
page read and write
1E6A86E1000
heap
page read and write
C13198B000
stack
page read and write
29683C23000
heap
page read and write
25A7B102000
heap
page read and write
25A7A88E000
heap
page read and write
C13217F000
stack
page read and write
2101FE68000
heap
page read and write
5A9BCFC000
stack
page read and write
CF1F37C000
stack
page read and write
18DD3AF0000
heap
page read and write
ADE000
stack
page read and write
1848122A000
heap
page read and write
1E6A8687000
heap
page read and write
2101FE40000
heap
page read and write
18DD3C5F000
heap
page read and write
967FAFF000
stack
page read and write
2101FCB0000
heap
page read and write
18DD3C4E000
heap
page read and write
2101FF00000
heap
page read and write
1E6A84E0000
heap
page read and write
3F1DF7F000
stack
page read and write
23480F02000
heap
page read and write
967FBFF000
stack
page read and write
18DD3C77000
heap
page read and write
18482CB0000
trusted library allocation
page read and write
25A7A870000
heap
page read and write
A9B0FFE000
stack
page read and write
CF1EA7F000
stack
page read and write
2EDF000
stack
page read and write
2BE5000
trusted library allocation
page read and write
18DD3C7B000
heap
page read and write
25A7A7D0000
heap
page read and write
2C2A000
trusted library allocation
page read and write
2101FE7B000
heap
page read and write
5A9B13B000
stack
page read and write
18481313000
heap
page read and write
23480E3E000
heap
page read and write
2C22000
trusted library allocation
page read and write
2101FE64000
heap
page read and write
1C3674E0000
heap
page read and write
18DD3C3E000
heap
page read and write
7DA82FB000
stack
page read and write
29683B90000
trusted library allocation
page read and write
7DA81FF000
stack
page read and write
18DD3C6C000
heap
page read and write
1C367653000
heap
page read and write
1E6A8E02000
heap
page read and write
967EF8B000
stack
page read and write
1C367602000
heap
page read and write
18DD3C2A000
heap
page read and write
1E6A86E8000
heap
page read and write
2101FF13000
heap
page read and write
18482CE0000
trusted library allocation
page read and write
32DF000
stack
page read and write
18481300000
heap
page read and write
25A7A800000
heap
page read and write
25A7A873000
heap
page read and write
18482D20000
trusted library allocation
page read and write
5A9BBFE000
stack
page read and write
29683BC0000
remote allocation
page read and write
18481257000
heap
page read and write
18DD3C5D000
heap
page read and write
CF1E7BC000
stack
page read and write
23480E13000
heap
page read and write
A9B177F000
stack
page read and write
18482E02000
trusted library allocation
page read and write
18DD3C32000
heap
page read and write
18DD3C63000
heap
page read and write
1E6A8600000
heap
page read and write
1848126D000
heap
page read and write
170000
heap
page read and write
A9B15FE000
stack
page read and write
18481256000
heap
page read and write
18481247000
heap
page read and write
1C0000
heap
page read and write
29683BC0000
remote allocation
page read and write
2101FE00000
heap
page read and write
23480E37000
heap
page read and write
18DD3C59000
heap
page read and write
25A7B200000
heap
page read and write
967F9FF000
stack
page read and write
18DD4402000
trusted library allocation
page read and write
3F1E27E000
stack
page read and write
DFF000
stack
page read and write
5A9B9FC000
stack
page read and write
2101FE13000
heap
page read and write
1C3675E0000
trusted library allocation
page read and write
25A7B1BC000
heap
page read and write
3F1DB2E000
stack
page read and write
25A7B202000
heap
page read and write
2101FF02000
heap
page read and write
18481263000
heap
page read and write
25A7A98E000
heap
page read and write
140000
trusted library allocation
page read and write
18481180000
heap
page read and write
CF1F47E000
stack
page read and write
23480E00000
heap
page read and write
1848123F000
heap
page read and write
A9B13FA000
stack
page read and write
967F6FF000
stack
page read and write
FFF000
stack
page read and write
25A7A813000
heap
page read and write
160000
trusted library allocation
page read and write
2101FCA0000
heap
page read and write
25A7B190000
heap
page read and write
29683C13000
heap
page read and write
25A7B213000
heap
page read and write
25A7B154000
heap
page read and write
2C26000
trusted library allocation
page read and write
25A7A829000
heap
page read and write
1C367470000
heap
page read and write
1E6A8540000
heap
page read and write
2C26000
trusted library allocation
page read and write
2101FD10000
heap
page read and write
23480E45000
heap
page read and write
18DD3C7A000
heap
page read and write
18DD3C13000
heap
page read and write
1C367600000
heap
page read and write
29683C3D000
heap
page read and write
1E6A8643000
heap
page read and write
1C367629000
heap
page read and write
25A7A913000
heap
page read and write
2101FE57000
heap
page read and write
25A7A82C000
heap
page read and write
1E6A86C4000
heap
page read and write
3F1DAAB000
stack
page read and write
25A7A770000
heap
page read and write
29684402000
trusted library allocation
page read and write
25A7A843000
heap
page read and write
18DD3C61000
heap
page read and write
25A7B230000
heap
page read and write
A9B127B000
stack
page read and write
967F4FB000
stack
page read and write
18482DA0000
remote allocation
page read and write
25A7B100000
heap
page read and write
21020470000
trusted library allocation
page read and write
18DD3C7E000
heap
page read and write
25A7B122000
heap
page read and write
18481247000
heap
page read and write
10F6000
heap
page read and write
25A7B1C6000
heap
page read and write
30000
heap
page read and write
CF1EFFE000
stack
page read and write
CF1F07B000
stack
page read and write
18DD3C43000
heap
page read and write
18DD3C41000
heap
page read and write
2C22000
trusted library allocation
page read and write
1E6A86BA000
heap
page read and write
10BE000
stack
page read and write
34DF000
stack
page read and write
1C367688000
heap
page read and write
29683C58000
heap
page read and write
23480C40000
heap
page read and write
A9B16FB000
stack
page read and write
649BB7F000
stack
page read and write
18DD3C3B000
heap
page read and write
29683C00000
heap
page read and write
18DD3C25000
heap
page read and write
18481288000
heap
page read and write
13E000
stack
page read and write
7DA80FB000
stack
page read and write
5A9B7FF000
stack
page read and write
18482C90000
trusted library allocation
page read and write
18DD3A90000
heap
page read and write
9D000
stack
page read and write
25A7A9E5000
heap
page read and write
23480BE0000
heap
page read and write
B08000
heap
page read and write
1C367669000
heap
page read and write
18DD3C65000
heap
page read and write
3F1DBAE000
stack
page read and write
C1322FD000
stack
page read and write
5A9B6FF000
stack
page read and write
1E6A84D0000
heap
page read and write
23481402000
trusted library allocation
page read and write
25A7B122000
heap
page read and write
1E6A8F3B000
heap
page read and write
7DA83FF000
stack
page read and write
23480E2A000
heap
page read and write
2C2C000
trusted library allocation
page read and write
2BE9000
trusted library allocation
page read and write
CF1EBFC000
stack
page read and write
A9B0E7B000
stack
page read and write
1E6A8670000
heap
page read and write
18DD3C48000
heap
page read and write
25A7A9B9000
heap
page read and write
29683C35000
heap
page read and write
1C367702000
heap
page read and write
649B97E000
stack
page read and write
1C367660000
heap
page read and write
1E6A86CB000
heap
page read and write
A9B117E000
stack
page read and write
18DD3C47000
heap
page read and write
CF1F27E000
stack
page read and write
18DD3A80000
heap
page read and write
3F1E07E000
stack
page read and write
25A7A843000
heap
page read and write
25A7A888000
heap
page read and write
29683BC0000
remote allocation
page read and write
There are 297 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://holly-lavender-rattlesnake.glitch.me/vild.html#
malicious
https://honapalestine.com/1/frontend/web/index.php?/