Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
incredibleextedwj.shop
|
|||
shortsvelventysjo.shop
|
|||
tolerateilusidjukl.shop
|
|||
liabilitynighstjsko.shop
|
|||
shatterbreathepsw.shop
|
|||
https://shortsvelventysjo.shop/api
|
104.21.16.225
|
||
demonstationfukewko.shop
|
|||
productivelookewr.shop
|
|||
alcojoldwograpciw.shop
|
|||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8z
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://shortsvelventysjo.shop/api=
|
unknown
|
||
https://shortsvelventysjo.shop/3
|
unknown
|
||
https://shortsvelventysjo.shop/u
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://shortsvelventysjo.shop/api2
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://shortsvelventysjo.shop/
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
https://shortsvelventysjo.shop/L
|
unknown
|
||
https://shortsvelventysjo.shop/F
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://shortsvelventysjo.shop/apih?
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://shortsvelventysjo.shop/8
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://shortsvelventysjo.shop/apiL
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
There are 38 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
shortsvelventysjo.shop
|
104.21.16.225
|
||
fp2e7a.wpc.phicdn.net
|
192.229.211.108
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.16.225
|
shortsvelventysjo.shop
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
FBA000
|
unkown
|
page readonly
|
||
ADB000
|
stack
|
page read and write
|
||
F25000
|
heap
|
page read and write
|
||
4048000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
1A97000
|
heap
|
page read and write
|
||
1A56000
|
heap
|
page read and write
|
||
1A11000
|
heap
|
page read and write
|
||
40E8000
|
trusted library allocation
|
page read and write
|
||
1A9A000
|
heap
|
page read and write
|
||
40F9000
|
trusted library allocation
|
page read and write
|
||
1A06000
|
heap
|
page read and write
|
||
3CA0000
|
heap
|
page read and write
|
||
1A13000
|
heap
|
page read and write
|
||
40E0000
|
trusted library allocation
|
page read and write
|
||
4041000
|
trusted library allocation
|
page read and write
|
||
193E000
|
stack
|
page read and write
|
||
405D000
|
trusted library allocation
|
page read and write
|
||
1A8B000
|
heap
|
page read and write
|
||
4074000
|
trusted library allocation
|
page read and write
|
||
4048000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
1A96000
|
heap
|
page read and write
|
||
40F9000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
4067000
|
trusted library allocation
|
page read and write
|
||
40E8000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
12C8000
|
unkown
|
page execute read
|
||
1A00000
|
heap
|
page read and write
|
||
4119000
|
trusted library allocation
|
page read and write
|
||
1A13000
|
heap
|
page read and write
|
||
1A97000
|
heap
|
page read and write
|
||
411B000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
405F000
|
trusted library allocation
|
page read and write
|
||
1A9C000
|
heap
|
page read and write
|
||
351D000
|
trusted library allocation
|
page read and write
|
||
40BC000
|
trusted library allocation
|
page read and write
|
||
408D000
|
trusted library allocation
|
page read and write
|
||
40D0000
|
trusted library allocation
|
page read and write
|
||
1A9A000
|
heap
|
page read and write
|
||
4048000
|
trusted library allocation
|
page read and write
|
||
44D8000
|
trusted library allocation
|
page read and write
|
||
1A1D000
|
heap
|
page read and write
|
||
42BB000
|
trusted library allocation
|
page read and write
|
||
4041000
|
trusted library allocation
|
page read and write
|
||
1A1D000
|
heap
|
page read and write
|
||
4B74000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
409C000
|
trusted library allocation
|
page read and write
|
||
4052000
|
trusted library allocation
|
page read and write
|
||
4042000
|
trusted library allocation
|
page read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
4086000
|
trusted library allocation
|
page read and write
|
||
4078000
|
trusted library allocation
|
page read and write
|
||
1A96000
|
heap
|
page read and write
|
||
407F000
|
trusted library allocation
|
page read and write
|
||
44DE000
|
trusted library allocation
|
page read and write
|
||
1A8F000
|
heap
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
1A1D000
|
heap
|
page read and write
|
||
12C8000
|
unkown
|
page execute read
|
||
1A56000
|
heap
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
40E5000
|
trusted library allocation
|
page read and write
|
||
F80000
|
unkown
|
page readonly
|
||
4079000
|
trusted library allocation
|
page read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
34F0000
|
remote allocation
|
page read and write
|
||
404B000
|
trusted library allocation
|
page read and write
|
||
1A9A000
|
heap
|
page read and write
|
||
1A9D000
|
heap
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
4076000
|
trusted library allocation
|
page read and write
|
||
40C4000
|
trusted library allocation
|
page read and write
|
||
1A9A000
|
heap
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
410B000
|
trusted library allocation
|
page read and write
|
||
34F0000
|
remote allocation
|
page read and write
|
||
18E5000
|
unkown
|
page readonly
|
||
4051000
|
trusted library allocation
|
page read and write
|
||
4059000
|
trusted library allocation
|
page read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
1A9A000
|
heap
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
1A94000
|
heap
|
page read and write
|
||
40BC000
|
trusted library allocation
|
page read and write
|
||
422B000
|
trusted library allocation
|
page read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
4054000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
F81000
|
unkown
|
page execute read
|
||
405E000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
4077000
|
trusted library allocation
|
page read and write
|
||
414C000
|
trusted library allocation
|
page read and write
|
||
1CCF000
|
stack
|
page read and write
|
||
1A87000
|
heap
|
page read and write
|
||
40E8000
|
trusted library allocation
|
page read and write
|
||
404E000
|
trusted library allocation
|
page read and write
|
||
408D000
|
trusted library allocation
|
page read and write
|
||
40E0000
|
trusted library allocation
|
page read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
4079000
|
trusted library allocation
|
page read and write
|
||
1A84000
|
heap
|
page read and write
|
||
4045000
|
trusted library allocation
|
page read and write
|
||
404D000
|
trusted library allocation
|
page read and write
|
||
19D0000
|
heap
|
page read and write
|
||
40EA000
|
trusted library allocation
|
page read and write
|
||
1A06000
|
heap
|
page read and write
|
||
4171000
|
trusted library allocation
|
page read and write
|
||
4147000
|
trusted library allocation
|
page read and write
|
||
4045000
|
trusted library allocation
|
page read and write
|
||
1A93000
|
heap
|
page read and write
|
||
40DC000
|
trusted library allocation
|
page read and write
|
||
404B000
|
trusted library allocation
|
page read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
4047000
|
trusted library allocation
|
page read and write
|
||
1A9C000
|
heap
|
page read and write
|
||
F80000
|
unkown
|
page readonly
|
||
40E1000
|
trusted library allocation
|
page read and write
|
||
40DC000
|
trusted library allocation
|
page read and write
|
||
1A9D000
|
heap
|
page read and write
|
||
4140000
|
trusted library allocation
|
page read and write
|
||
1A9D000
|
heap
|
page read and write
|
||
4078000
|
trusted library allocation
|
page read and write
|
||
4070000
|
trusted library allocation
|
page read and write
|
||
4119000
|
trusted library allocation
|
page read and write
|
||
1A9A000
|
heap
|
page read and write
|
||
40DC000
|
trusted library allocation
|
page read and write
|
||
1A93000
|
heap
|
page read and write
|
||
1A99000
|
heap
|
page read and write
|
||
4119000
|
trusted library allocation
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
1A76000
|
heap
|
page read and write
|
||
40FB000
|
trusted library allocation
|
page read and write
|
||
4119000
|
trusted library allocation
|
page read and write
|
||
4148000
|
trusted library allocation
|
page read and write
|
||
40CB000
|
trusted library allocation
|
page read and write
|
||
4059000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
408D000
|
trusted library allocation
|
page read and write
|
||
1A76000
|
heap
|
page read and write
|
||
40EA000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
19DA000
|
heap
|
page read and write
|
||
1A9C000
|
heap
|
page read and write
|
||
449F000
|
stack
|
page read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
1A93000
|
heap
|
page read and write
|
||
4118000
|
trusted library allocation
|
page read and write
|
||
4223000
|
trusted library allocation
|
page read and write
|
||
1A9A000
|
heap
|
page read and write
|
||
4079000
|
trusted library allocation
|
page read and write
|
||
40CB000
|
trusted library allocation
|
page read and write
|
||
5086000
|
trusted library allocation
|
page read and write
|
||
4078000
|
trusted library allocation
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
1A76000
|
heap
|
page read and write
|
||
FBD000
|
unkown
|
page read and write
|
||
405F000
|
trusted library allocation
|
page read and write
|
||
4080000
|
trusted library allocation
|
page read and write
|
||
4048000
|
trusted library allocation
|
page read and write
|
||
1A9C000
|
heap
|
page read and write
|
||
BD9000
|
stack
|
page read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
4141000
|
trusted library allocation
|
page read and write
|
||
4179000
|
trusted library allocation
|
page read and write
|
||
4046000
|
trusted library allocation
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
1A93000
|
heap
|
page read and write
|
||
41F3000
|
trusted library allocation
|
page read and write
|
||
1A76000
|
heap
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
1A93000
|
heap
|
page read and write
|
||
40AF000
|
trusted library allocation
|
page read and write
|
||
40F9000
|
trusted library allocation
|
page read and write
|
||
4088000
|
trusted library allocation
|
page read and write
|
||
1A8C000
|
heap
|
page read and write
|
||
1A56000
|
heap
|
page read and write
|
||
4109000
|
trusted library allocation
|
page read and write
|
||
1A90000
|
heap
|
page read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
4141000
|
trusted library allocation
|
page read and write
|
||
4040000
|
trusted library allocation
|
page read and write
|
||
19DE000
|
heap
|
page read and write
|
||
408D000
|
trusted library allocation
|
page read and write
|
||
40F9000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
4111000
|
trusted library allocation
|
page read and write
|
||
1A11000
|
heap
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
360D000
|
stack
|
page read and write
|
||
4660000
|
heap
|
page read and write
|
||
40E3000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
19FF000
|
heap
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
421B000
|
trusted library allocation
|
page read and write
|
||
40DD000
|
trusted library allocation
|
page read and write
|
||
1A9D000
|
heap
|
page read and write
|
||
40BC000
|
trusted library allocation
|
page read and write
|
||
1A9A000
|
heap
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
404D000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
1A9A000
|
heap
|
page read and write
|
||
18E5000
|
unkown
|
page readonly
|
||
439E000
|
stack
|
page read and write
|
||
4085000
|
trusted library allocation
|
page read and write
|
||
1A9E000
|
heap
|
page read and write
|
||
4077000
|
trusted library allocation
|
page read and write
|
||
4080000
|
trusted library allocation
|
page read and write
|
||
40C4000
|
trusted library allocation
|
page read and write
|
||
406F000
|
trusted library allocation
|
page read and write
|
||
1A13000
|
heap
|
page read and write
|
||
404D000
|
trusted library allocation
|
page read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
4041000
|
trusted library allocation
|
page read and write
|
||
1A84000
|
heap
|
page read and write
|
||
1A11000
|
heap
|
page read and write
|
||
1A93000
|
heap
|
page read and write
|
||
1A93000
|
heap
|
page read and write
|
||
1A98000
|
heap
|
page read and write
|
||
4041000
|
trusted library allocation
|
page read and write
|
||
1A80000
|
heap
|
page read and write
|
||
4074000
|
trusted library allocation
|
page read and write
|
||
4141000
|
trusted library allocation
|
page read and write
|
||
1A28000
|
heap
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
4109000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
406F000
|
trusted library allocation
|
page read and write
|
||
1A98000
|
heap
|
page read and write
|
||
4047000
|
trusted library allocation
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
4077000
|
trusted library allocation
|
page read and write
|
||
4095000
|
trusted library allocation
|
page read and write
|
||
40FA000
|
trusted library allocation
|
page read and write
|
||
1A93000
|
heap
|
page read and write
|
||
1A7C000
|
heap
|
page read and write
|
||
4152000
|
trusted library allocation
|
page read and write
|
||
40D9000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
4077000
|
trusted library allocation
|
page read and write
|
||
4077000
|
trusted library allocation
|
page read and write
|
||
408D000
|
trusted library allocation
|
page read and write
|
||
40D2000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
1BCE000
|
stack
|
page read and write
|
||
1A9A000
|
heap
|
page read and write
|
||
1A56000
|
heap
|
page read and write
|
||
4073000
|
trusted library allocation
|
page read and write
|
||
4069000
|
trusted library allocation
|
page read and write
|
||
34AD000
|
stack
|
page read and write
|
||
1A9A000
|
heap
|
page read and write
|
||
1A90000
|
heap
|
page read and write
|
||
4078000
|
trusted library allocation
|
page read and write
|
||
4183000
|
trusted library allocation
|
page read and write
|
||
1A06000
|
heap
|
page read and write
|
||
1A93000
|
heap
|
page read and write
|
||
19FB000
|
heap
|
page read and write
|
||
1A9C000
|
heap
|
page read and write
|
||
4045000
|
trusted library allocation
|
page read and write
|
||
405A000
|
trusted library allocation
|
page read and write
|
||
405D000
|
trusted library allocation
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
40E2000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
34F0000
|
remote allocation
|
page read and write
|
||
4084000
|
trusted library allocation
|
page read and write
|
||
1A9E000
|
heap
|
page read and write
|
||
4675000
|
trusted library allocation
|
page read and write
|
||
40E0000
|
trusted library allocation
|
page read and write
|
||
41A3000
|
trusted library allocation
|
page read and write
|
||
1A93000
|
heap
|
page read and write
|
||
1A90000
|
heap
|
page read and write
|
||
40E1000
|
trusted library allocation
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
404E000
|
trusted library allocation
|
page read and write
|
||
405C000
|
trusted library allocation
|
page read and write
|
||
405F000
|
trusted library allocation
|
page read and write
|
||
416B000
|
trusted library allocation
|
page read and write
|
||
19AE000
|
stack
|
page read and write
|
||
405F000
|
trusted library allocation
|
page read and write
|
||
414F000
|
trusted library allocation
|
page read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
1A97000
|
heap
|
page read and write
|
||
4047000
|
trusted library allocation
|
page read and write
|
||
1A00000
|
heap
|
page read and write
|
||
3C90000
|
heap
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
FC8000
|
unkown
|
page execute read
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
405F000
|
trusted library allocation
|
page read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
1A7A000
|
heap
|
page read and write
|
||
1950000
|
heap
|
page read and write
|
||
406B000
|
trusted library allocation
|
page read and write
|
||
404A000
|
trusted library allocation
|
page read and write
|
||
1A9E000
|
heap
|
page read and write
|
||
40BC000
|
trusted library allocation
|
page read and write
|
||
1A93000
|
heap
|
page read and write
|
||
4046000
|
trusted library allocation
|
page read and write
|
||
405D000
|
trusted library allocation
|
page read and write
|
||
409E000
|
trusted library allocation
|
page read and write
|
||
1A9E000
|
heap
|
page read and write
|
||
40E8000
|
trusted library allocation
|
page read and write
|
||
40E8000
|
trusted library allocation
|
page read and write
|
||
4159000
|
trusted library allocation
|
page read and write
|
There are 305 hidden memdumps, click here to show them.