Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ent.exe
|
"C:\Users\user\Desktop\ent.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://pastebin.com/raw/XzLzRHpk
|
172.67.19.24
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
0.tcp.eu.ngrok.io
|
3.124.142.205
|
||
pastebin.com
|
172.67.19.24
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
3.124.142.205
|
0.tcp.eu.ngrok.io
|
United States
|
||
172.67.19.24
|
pastebin.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ent_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ent_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ent_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ent_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ent_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ent_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ent_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ent_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ent_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ent_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ent_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ent_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ent_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ent_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
672000
|
unkown
|
page readonly
|
||
29AB000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
7FFD9B904000
|
trusted library allocation
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
C1D000
|
heap
|
page read and write
|
||
2783000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
12961000
|
trusted library allocation
|
page read and write
|
||
1B5F3000
|
heap
|
page read and write
|
||
1BF80000
|
heap
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
2C6C000
|
trusted library allocation
|
page read and write
|
||
1B570000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B924000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
1BA6F000
|
stack
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page execute and read and write
|
||
295E000
|
stack
|
page read and write
|
||
1C34E000
|
stack
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page execute and read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1B46E000
|
stack
|
page read and write
|
||
7FFD9B903000
|
trusted library allocation
|
page execute and read and write
|
||
C61000
|
heap
|
page read and write
|
||
B9C000
|
heap
|
page read and write
|
||
B96000
|
heap
|
page read and write
|
||
29E5000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
7FFD9B92B000
|
trusted library allocation
|
page execute and read and write
|
||
1A960000
|
trusted library allocation
|
page read and write
|
||
1C84C000
|
stack
|
page read and write
|
||
7FFD9B9E6000
|
trusted library allocation
|
page execute and read and write
|
||
C64000
|
heap
|
page read and write
|
||
1C44C000
|
stack
|
page read and write
|
||
1B86C000
|
stack
|
page read and write
|
||
2AFA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
1BC6E000
|
stack
|
page read and write
|
||
1B56C000
|
stack
|
page read and write
|
||
1BE64000
|
stack
|
page read and write
|
||
1B628000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
C09000
|
heap
|
page read and write
|
||
7FFD9B90D000
|
trusted library allocation
|
page execute and read and write
|
||
EAE000
|
stack
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
2850000
|
heap
|
page execute and read and write
|
||
FAD000
|
stack
|
page read and write
|
||
1B96E000
|
stack
|
page read and write
|
||
7FFD9B92D000
|
trusted library allocation
|
page execute and read and write
|
||
1B5BF000
|
heap
|
page read and write
|
||
1BF70000
|
heap
|
page read and write
|
||
C03000
|
heap
|
page read and write
|
||
7FFD9BAA2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91D000
|
trusted library allocation
|
page execute and read and write
|
||
1B5C1000
|
heap
|
page read and write
|
||
2961000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD2000
|
trusted library allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
B75000
|
heap
|
page read and write
|
||
1B624000
|
heap
|
page read and write
|
||
1ACEE000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page execute and read and write
|
||
1BD6A000
|
stack
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
7FFD9B95C000
|
trusted library allocation
|
page execute and read and write
|
||
1296F000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
BBC000
|
heap
|
page read and write
|
||
7C4000
|
stack
|
page read and write
|
||
7FFD9B913000
|
trusted library allocation
|
page read and write
|
||
67E000
|
unkown
|
page readonly
|
||
B90000
|
heap
|
page read and write
|
||
1AEED000
|
stack
|
page read and write
|
||
27C3000
|
heap
|
page read and write
|
||
7FF4E8190000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9BC000
|
trusted library allocation
|
page execute and read and write
|
||
DA5000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
7FFD9B9B6000
|
trusted library allocation
|
page read and write
|
||
C26000
|
heap
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
1B76C000
|
stack
|
page read and write
|
||
29E7000
|
trusted library allocation
|
page read and write
|
||
1C54A000
|
stack
|
page read and write
|
||
BD1000
|
heap
|
page read and write
|
||
1B5F1000
|
heap
|
page read and write
|
||
2780000
|
trusted library allocation
|
page read and write
|
There are 88 hidden memdumps, click here to show them.