Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
fragnantbui.shop
|
|||
gutterydhowi.shop
|
|||
offensivedzvju.shop
|
|||
drawzhotdog.shop
|
|||
ghostreedmnu.shop
|
|||
reinforcenh.shop
|
|||
stogeneratmns.shop
|
|||
vozmeatillu.shop
|
|||
https://ghostreedmnu.shop/api
|
188.114.96.3
|
||
https://www.cloudflare.com/learning/access-management/phishing-attack/
|
unknown
|
||
https://ghostreedmnu.shop/
|
unknown
|
||
https://api.midtrans.comGetUserDefaultLocaleNameinvalid
|
unknown
|
||
https://api.sandbox.midtrans.comcrypto/aes:
|
unknown
|
||
https://www.cloudflare.com/5xx-error-landing
|
unknown
|
There are 4 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ghostreedmnu.shop
|
188.114.96.3
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
ghostreedmnu.shop
|
European Union
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
72B000
|
remote allocation
|
page readonly
|
||
143F000
|
direct allocation
|
page read and write
|
||
1490000
|
direct allocation
|
page read and write
|
||
C4B000
|
unkown
|
page readonly
|
||
475D000
|
stack
|
page read and write
|
||
C01000
|
unkown
|
page read and write
|
||
140C000
|
direct allocation
|
page read and write
|
||
833000
|
heap
|
page read and write
|
||
14CE000
|
direct allocation
|
page read and write
|
||
18A0000
|
direct allocation
|
page read and write
|
||
9DD000
|
stack
|
page read and write
|
||
21880000
|
direct allocation
|
page read and write
|
||
2163D000
|
stack
|
page read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
14A4000
|
direct allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
1900000
|
direct allocation
|
page read and write
|
||
C1E000
|
unkown
|
page read and write
|
||
1488000
|
direct allocation
|
page read and write
|
||
7F2000
|
heap
|
page read and write
|
||
14BA000
|
direct allocation
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
17CE000
|
direct allocation
|
page read and write
|
||
1412000
|
direct allocation
|
page read and write
|
||
14C6000
|
direct allocation
|
page read and write
|
||
4B9F000
|
stack
|
page read and write
|
||
ED0000
|
remote allocation
|
page read and write
|
||
2177D000
|
stack
|
page read and write
|
||
1448000
|
direct allocation
|
page read and write
|
||
73D000
|
remote allocation
|
page readonly
|
||
ADF000
|
stack
|
page read and write
|
||
7D8000
|
heap
|
page read and write
|
||
BED000
|
unkown
|
page read and write
|
||
6E1000
|
remote allocation
|
page execute read
|
||
829000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
14AE000
|
direct allocation
|
page read and write
|
||
C28000
|
unkown
|
page readonly
|
||
14CA000
|
direct allocation
|
page read and write
|
||
1482000
|
direct allocation
|
page read and write
|
||
149A000
|
direct allocation
|
page read and write
|
||
18B0000
|
direct allocation
|
page read and write
|
||
1446000
|
direct allocation
|
page read and write
|
||
651000
|
unkown
|
page execute read
|
||
14BC000
|
direct allocation
|
page read and write
|
||
218C2000
|
direct allocation
|
page read and write
|
||
148E000
|
direct allocation
|
page read and write
|
||
D1D000
|
stack
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
C28000
|
unkown
|
page readonly
|
||
1882000
|
direct allocation
|
page read and write
|
||
4D1E000
|
stack
|
page read and write
|
||
14B0000
|
direct allocation
|
page read and write
|
||
1498000
|
direct allocation
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
E7D000
|
stack
|
page read and write
|
||
1668000
|
direct allocation
|
page read and write
|
||
140A000
|
direct allocation
|
page read and write
|
||
651000
|
unkown
|
page execute read
|
||
1502000
|
direct allocation
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
142C000
|
direct allocation
|
page read and write
|
||
167A000
|
direct allocation
|
page read and write
|
||
1402000
|
direct allocation
|
page read and write
|
||
1DD000
|
stack
|
page read and write
|
||
14A0000
|
direct allocation
|
page read and write
|
||
14C2000
|
direct allocation
|
page read and write
|
||
18F0000
|
direct allocation
|
page read and write
|
||
1546000
|
direct allocation
|
page read and write
|
||
1456000
|
direct allocation
|
page read and write
|
||
7FC000
|
heap
|
page read and write
|
||
148C000
|
direct allocation
|
page read and write
|
||
5C0000
|
direct allocation
|
page read and write
|
||
1890000
|
direct allocation
|
page read and write
|
||
1666000
|
direct allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
215FF000
|
stack
|
page read and write
|
||
18C0000
|
direct allocation
|
page read and write
|
||
1434000
|
direct allocation
|
page read and write
|
||
BBD000
|
unkown
|
page read and write
|
||
14D8000
|
direct allocation
|
page read and write
|
||
166A000
|
direct allocation
|
page read and write
|
||
BBD000
|
unkown
|
page write copy
|
||
14B2000
|
direct allocation
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
538000
|
direct allocation
|
page read and write
|
||
1416000
|
direct allocation
|
page read and write
|
||
2187F000
|
stack
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
1438000
|
direct allocation
|
page read and write
|
||
ED0000
|
remote allocation
|
page read and write
|
||
197F000
|
direct allocation
|
page read and write
|
||
13CD000
|
stack
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
1458000
|
direct allocation
|
page read and write
|
||
145A000
|
direct allocation
|
page read and write
|
||
D5C000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
14BE000
|
direct allocation
|
page read and write
|
||
6E0000
|
remote allocation
|
page execute and read and write
|
||
7EB000
|
heap
|
page read and write
|
||
14D4000
|
direct allocation
|
page read and write
|
||
863000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
6AB000
|
stack
|
page read and write
|
||
214FE000
|
stack
|
page read and write
|
||
150C000
|
direct allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
1464000
|
direct allocation
|
page read and write
|
||
14A8000
|
direct allocation
|
page read and write
|
||
72E000
|
remote allocation
|
page execute and read and write
|
||
829000
|
heap
|
page read and write
|
||
833000
|
heap
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
CDD000
|
stack
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
1492000
|
direct allocation
|
page read and write
|
||
E50000
|
direct allocation
|
page read and write
|
||
143A000
|
direct allocation
|
page read and write
|
||
141C000
|
direct allocation
|
page read and write
|
||
14AA000
|
direct allocation
|
page read and write
|
||
C4B000
|
unkown
|
page readonly
|
||
118E000
|
stack
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
18E0000
|
direct allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
14E9000
|
direct allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
128F000
|
stack
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
17E0000
|
direct allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
17DE000
|
direct allocation
|
page read and write
|
||
1404000
|
direct allocation
|
page read and write
|
||
167C000
|
direct allocation
|
page read and write
|
||
1418000
|
direct allocation
|
page read and write
|
||
C27000
|
unkown
|
page write copy
|
||
14D2000
|
direct allocation
|
page read and write
|
||
1486000
|
direct allocation
|
page read and write
|
||
1406000
|
direct allocation
|
page read and write
|
||
1494000
|
direct allocation
|
page read and write
|
||
ED0000
|
remote allocation
|
page read and write
|
||
66B000
|
stack
|
page read and write
|
||
EBD000
|
stack
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
14DC000
|
direct allocation
|
page read and write
|
||
145C000
|
direct allocation
|
page read and write
|
||
D20000
|
direct allocation
|
page read and write
|
||
1662000
|
direct allocation
|
page read and write
|
||
1400000
|
direct allocation
|
page read and write
|
||
14C0000
|
direct allocation
|
page read and write
|
||
138F000
|
stack
|
page read and write
|
||
4CDE000
|
stack
|
page read and write
|
||
5D0000
|
direct allocation
|
page read and write
|
||
141E000
|
direct allocation
|
page read and write
|
||
14A2000
|
direct allocation
|
page read and write
|
||
218C0000
|
direct allocation
|
page read and write
|
||
7FC000
|
heap
|
page read and write
|
||
1500000
|
direct allocation
|
page read and write
|
||
197F000
|
direct allocation
|
page read and write
|
||
14B8000
|
direct allocation
|
page read and write
|
||
BC3000
|
unkown
|
page read and write
|
||
812000
|
heap
|
page read and write
|
||
1460000
|
direct allocation
|
page read and write
|
||
1474000
|
direct allocation
|
page read and write
|
||
147A000
|
direct allocation
|
page read and write
|
||
1420000
|
direct allocation
|
page read and write
|
||
530000
|
direct allocation
|
page read and write
|
||
148A000
|
direct allocation
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
18D0000
|
direct allocation
|
page read and write
|
||
149E000
|
direct allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
1410000
|
direct allocation
|
page read and write
|
||
1414000
|
direct allocation
|
page read and write
|
||
14D6000
|
direct allocation
|
page read and write
|
||
140E000
|
direct allocation
|
page read and write
|
||
DC000
|
stack
|
page read and write
|
||
C27000
|
unkown
|
page write copy
|
||
4D5F000
|
stack
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
150A000
|
direct allocation
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
8EA000
|
unkown
|
page readonly
|
||
BC4000
|
unkown
|
page write copy
|
||
144A000
|
direct allocation
|
page read and write
|
||
8EA000
|
unkown
|
page readonly
|
||
465D000
|
stack
|
page read and write
|
||
7F8000
|
heap
|
page read and write
|
||
14EC000
|
direct allocation
|
page read and write
|
||
BC2000
|
unkown
|
page write copy
|
||
B1E000
|
stack
|
page read and write
|
||
2173E000
|
stack
|
page read and write
|
There are 185 hidden memdumps, click here to show them.