Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\XMx8r7SLZr.exe
|
"C:\Users\user\Desktop\XMx8r7SLZr.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://login.microsoftonline.com/common/oauth2/v2.0/tokenI
|
unknown
|
||
https://login.microsoftonline.com/
|
unknown
|
||
https://login.microsoftonline.com/error?code=70000
|
unknown
|
||
https://login.microsoftonline.com/common/oauth2/v2.0/token.dllk
|
unknown
|
||
https://login.microsoftonline.com/common/oauth2/v2.0/tokenlll
|
unknown
|
||
https://login.microsoftonline.com/common/oauth2/v2.0/tokenK
|
unknown
|
||
https://login.microsoftonline.com/common/oauth2/v2.0/tokenllmL
|
unknown
|
||
https://login.microsoftonline.com/common/oauth2/v2.0/tokenl
|
unknown
|
||
https://login.microsoftonline.com/common/oauth2/v2.0/token0
|
unknown
|
||
https://login.microsoftonline.com/common/oauth2/v2.0/tokeny
|
unknown
|
||
https://login.microsoftonline.com/common/oauth2/v2.0/token~
|
unknown
|
||
https://login.microsoftonline.com/common/oauth2/v2.0/tokenllljbin(
|
unknown
|
||
https://login.microsoftonline.com/icates
|
unknown
|
||
https://login.microsoftonline.com/common/oauth2/v2.0/token
|
unknown
|
||
https://login.microsoftonline.com/common/oauth2/v2.0/tokenmL
|
unknown
|
||
https://login.microsoftonline.com/common/oauth2/v2.0/tokenll
|
unknown
|
There are 6 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
login.microsoftonline.com
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive
|
quent-application
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4F8000
|
heap
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
49B000
|
heap
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
489000
|
heap
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
4D6000
|
heap
|
page read and write
|
||
2130000
|
heap
|
page read and write
|
||
5D0000
|
stack
|
page read and write
|
||
284E000
|
stack
|
page read and write
|
||
462000
|
heap
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
40C000
|
heap
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
4D8000
|
heap
|
page read and write
|
||
2D4F000
|
stack
|
page read and write
|
||
49B000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
4D6000
|
heap
|
page read and write
|
||
4D6000
|
heap
|
page read and write
|
||
14C000
|
stack
|
page read and write
|
||
49B000
|
heap
|
page read and write
|
||
4D9000
|
heap
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
4A3000
|
heap
|
page read and write
|
||
2B4D000
|
stack
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
4D6000
|
heap
|
page read and write
|
||
4D8000
|
heap
|
page read and write
|
||
5D0000
|
unkown
|
page execute read
|
||
492000
|
heap
|
page read and write
|
||
274F000
|
stack
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
492000
|
heap
|
page read and write
|
||
2A4B000
|
stack
|
page read and write
|
||
14015C000
|
unkown
|
page readonly
|
||
2D51000
|
unkown
|
page read and write
|
||
4F2000
|
heap
|
page read and write
|
||
2240000
|
unkown
|
page execute read
|
||
4AA000
|
heap
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
4D9000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
14016E000
|
unkown
|
page readonly
|
||
2135000
|
heap
|
page read and write
|
||
14013F000
|
unkown
|
page write copy
|
||
4AA000
|
heap
|
page read and write
|
||
4A3000
|
heap
|
page read and write
|
||
434000
|
heap
|
page read and write
|
||
2066000
|
stack
|
page read and write
|
||
4A3000
|
heap
|
page read and write
|
||
4AA000
|
heap
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
4F1000
|
heap
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
462000
|
heap
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
14015C000
|
unkown
|
page readonly
|
||
4AA000
|
heap
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
2260000
|
unkown
|
page execute read
|
||
14016E000
|
unkown
|
page readonly
|
||
4F1000
|
heap
|
page read and write
|
||
2240000
|
remote allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
4D6000
|
heap
|
page read and write
|
||
409000
|
heap
|
page read and write
|
||
4D9000
|
heap
|
page read and write
|
||
2300000
|
heap
|
page read and write
|
||
444000
|
heap
|
page read and write
|
||
140110000
|
unkown
|
page readonly
|
||
294F000
|
stack
|
page read and write
|
||
2240000
|
remote allocation
|
page read and write
|
||
140158000
|
unkown
|
page read and write
|
||
2240000
|
remote allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
14013F000
|
unkown
|
page read and write
|
||
4D6000
|
heap
|
page read and write
|
||
489000
|
heap
|
page read and write
|
||
4A3000
|
heap
|
page read and write
|
||
2240000
|
unkown
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
4F8000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
445000
|
heap
|
page read and write
|
||
4A7000
|
heap
|
page read and write
|
||
140110000
|
unkown
|
page readonly
|
There are 82 hidden memdumps, click here to show them.