Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\QUOTATION_OCTQTRA071244PDF.scr.exe
|
"C:\Users\user\Desktop\QUOTATION_OCTQTRA071244PDF.scr.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://filetransfer.io/data-package/eZFzMENr/download
|
188.114.96.3
|
||
https://s23.filetransfer.io/storage/download/ZRP1AkSP9kG2
|
188.114.97.3
|
||
http://s23.filetransfer.io
|
unknown
|
||
https://s23.filetransfer.io/storage/download/EYxNoMbJWmad
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/UHZCmkCE5dCM
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/T4jQBjNxmaAP
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/goqkE17IMIu9
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/LnCn4Sq9X9QI
|
188.114.97.3
|
||
http://filetransfer.io/data-package/eZFzMENr
|
unknown
|
||
https://s23.filetransfer.io/storage/download/FMdaPuCZHHPj
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/JLKER12CLEEH
|
188.114.97.3
|
||
https://s23.filetransfer.io
|
unknown
|
||
https://s23.filetransfer.io/storage/download/8d0YtsDOnedA
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/RQn9FsWdafFG
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/EobBo452Hdxh
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/FdQTbjLkThhR
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/4CRE38zxXqXG
|
188.114.97.3
|
||
https://s23.filetrP
|
unknown
|
||
https://s23.filetransfer.io/storage/download/yGXCKBDIQrAq
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/9QRVQG14oBWg
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/sHIqABNcW3Ed
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/hCsyUwJb1Z1u
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/9EV86OzjvzKc
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/sI6TJT4vJ3Bm
|
188.114.97.3
|
||
https://filetransfer.io
|
unknown
|
||
https://s23.filetransfer.io/storage/download/C8OPC9MoIN8L
|
188.114.97.3
|
||
http://filetransfer.io
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://s23.filetransfer.io/storage/download/FecmNNRs2mj0
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/qr9THGkhopIj
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/8hFS5k720mAD
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/a6rLoYyAawaq
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/60jvYrdp5AfK
|
188.114.97.3
|
||
https://filetransfer.io/data-package/eZFzMENr/download
|
188.114.96.3
|
||
https://s23.filetransfer.io/storage/download/rNUQbvqXCkvY
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/oU6fOMiuNfFu
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/rF55DMjHHO7R
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/VzWqBQCvAaEg
|
188.114.97.3
|
||
https://filetransfer.ioX
|
unknown
|
||
https://s23.filetransfer.io/storage/download/UOzJ7nwkJVlJ
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/TSnbub9PBiUP
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/faOOXr9t1pNr
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/9R6i4hkSrRN5
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/5LUME3vteHCP
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/f5l4KzAPcLFN
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/KrgAyDYAYOu9
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/WRMLI4CLhfdR
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/h6my69Vdddiu
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/5ERBgCCUdqAJ
|
188.114.97.3
|
||
https://s23.filetransfer.io/storage/download/JNVqWjkJZeyM
|
188.114.97.3
|
||
https://s23.filetrPX
|
unknown
|
||
https://s23.filetransfer.io/storage/download/XKE7H4fnB1y6
|
188.114.97.3
|
||
https://filetransfer.io(
|
unknown
|
||
https://s23.filetransfer.iox
|
unknown
|
There are 44 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
filetransfer.io
|
188.114.96.3
|
||
s23.filetransfer.io
|
188.114.97.3
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
s23.filetransfer.io
|
European Union
|
||
188.114.96.3
|
filetransfer.io
|
European Union
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244PDF_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244PDF_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244PDF_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244PDF_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244PDF_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244PDF_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244PDF_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244PDF_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244PDF_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244PDF_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244PDF_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244PDF_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244PDF_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244PDF_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
21077090000
|
heap
|
page read and write
|
||
7969DFA000
|
stack
|
page read and write
|
||
21077000000
|
heap
|
page read and write
|
||
2105CDB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B700000
|
trusted library allocation
|
page read and write
|
||
2105CDC0000
|
heap
|
page read and write
|
||
2105C8B0000
|
unkown
|
page readonly
|
||
2105E97A000
|
trusted library allocation
|
page read and write
|
||
2105EA71000
|
trusted library allocation
|
page read and write
|
||
2105E791000
|
trusted library allocation
|
page read and write
|
||
79695FA000
|
stack
|
page read and write
|
||
7FFD9B882000
|
trusted library allocation
|
page read and write
|
||
2105CC20000
|
heap
|
page read and write
|
||
2105E945000
|
trusted library allocation
|
page read and write
|
||
2105E80C000
|
trusted library allocation
|
page read and write
|
||
21077008000
|
heap
|
page read and write
|
||
2105E809000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F3000
|
trusted library allocation
|
page read and write
|
||
2105E8FD000
|
trusted library allocation
|
page read and write
|
||
2105E980000
|
trusted library allocation
|
page read and write
|
||
2105E859000
|
trusted library allocation
|
page read and write
|
||
2105CD40000
|
heap
|
page read and write
|
||
21076FA0000
|
heap
|
page read and write
|
||
2105EB25000
|
trusted library allocation
|
page read and write
|
||
2105CC8E000
|
heap
|
page read and write
|
||
2105E999000
|
trusted library allocation
|
page read and write
|
||
2105E81C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6FD000
|
trusted library allocation
|
page execute and read and write
|
||
2105CC51000
|
heap
|
page read and write
|
||
7FF40D690000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B70D000
|
trusted library allocation
|
page execute and read and write
|
||
2105EA65000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E4000
|
trusted library allocation
|
page read and write
|
||
2105EA63000
|
trusted library allocation
|
page read and write
|
||
2105E8C9000
|
trusted library allocation
|
page read and write
|
||
2105E993000
|
trusted library allocation
|
page read and write
|
||
2105EA79000
|
trusted library allocation
|
page read and write
|
||
79675FE000
|
stack
|
page read and write
|
||
2105E87E000
|
trusted library allocation
|
page read and write
|
||
2105E96D000
|
trusted library allocation
|
page read and write
|
||
2105CC60000
|
heap
|
page read and write
|
||
2105CDB3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page read and write
|
||
2105E976000
|
trusted library allocation
|
page read and write
|
||
2105EA43000
|
trusted library allocation
|
page read and write
|
||
2105EA81000
|
trusted library allocation
|
page read and write
|
||
79699FF000
|
stack
|
page read and write
|
||
2105E986000
|
trusted library allocation
|
page read and write
|
||
210767C0000
|
trusted library allocation
|
page read and write
|
||
2106E797000
|
trusted library allocation
|
page read and write
|
||
2107709B000
|
heap
|
page read and write
|
||
7FFD9B6F8000
|
trusted library allocation
|
page read and write
|
||
79669FE000
|
stack
|
page read and write
|
||
2105EB6E000
|
trusted library allocation
|
page read and write
|
||
2106E881000
|
trusted library allocation
|
page read and write
|
||
2105CA31000
|
unkown
|
page readonly
|
||
2105EA15000
|
trusted library allocation
|
page read and write
|
||
2105E8EF000
|
trusted library allocation
|
page read and write
|
||
2105CE60000
|
heap
|
page read and write
|
||
2105E610000
|
heap
|
page read and write
|
||
2105CBF0000
|
heap
|
page read and write
|
||
2105E833000
|
trusted library allocation
|
page read and write
|
||
2105CE40000
|
heap
|
page read and write
|
||
2105EA75000
|
trusted library allocation
|
page read and write
|
||
2105EB0F000
|
trusted library allocation
|
page read and write
|
||
2105E8FA000
|
trusted library allocation
|
page read and write
|
||
2105CE65000
|
heap
|
page read and write
|
||
2105E91A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B73C000
|
trusted library allocation
|
page execute and read and write
|
||
2105E82A000
|
trusted library allocation
|
page read and write
|
||
2105E780000
|
heap
|
page execute and read and write
|
||
2105E972000
|
trusted library allocation
|
page read and write
|
||
2105E8F6000
|
trusted library allocation
|
page read and write
|
||
2105E807000
|
trusted library allocation
|
page read and write
|
||
2105E8E3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A9000
|
trusted library allocation
|
page read and write
|
||
21076FD4000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page execute and read and write
|
||
2105E8E9000
|
trusted library allocation
|
page read and write
|
||
7967DFE000
|
stack
|
page read and write
|
||
2105E7DA000
|
trusted library allocation
|
page read and write
|
||
2105E7F8000
|
trusted library allocation
|
page read and write
|
||
2105E95B000
|
trusted library allocation
|
page read and write
|
||
2105E7DE000
|
trusted library allocation
|
page read and write
|
||
796A9FB000
|
stack
|
page read and write
|
||
2105EA6D000
|
trusted library allocation
|
page read and write
|
||
2105EB23000
|
trusted library allocation
|
page read and write
|
||
79689FD000
|
stack
|
page read and write
|
||
2105E876000
|
trusted library allocation
|
page read and write
|
||
2105EC07000
|
trusted library allocation
|
page read and write
|
||
2105E95D000
|
trusted library allocation
|
page read and write
|
||
2105E800000
|
trusted library allocation
|
page read and write
|
||
2105EB03000
|
trusted library allocation
|
page read and write
|
||
2105CDC5000
|
heap
|
page read and write
|
||
79665E9000
|
stack
|
page read and write
|
||
2105CC95000
|
heap
|
page read and write
|
||
2106E791000
|
trusted library allocation
|
page read and write
|
||
2105CDA0000
|
trusted library allocation
|
page read and write
|
||
21076FD2000
|
heap
|
page read and write
|
||
2105CD80000
|
trusted library allocation
|
page read and write
|
||
7965FFF000
|
stack
|
page read and write
|
||
2105CCE8000
|
heap
|
page read and write
|
||
2105E7E6000
|
trusted library allocation
|
page read and write
|
||
79679FC000
|
stack
|
page read and write
|
||
2106E7A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B704000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79C000
|
trusted library allocation
|
page execute and read and write
|
||
2105CC8C000
|
heap
|
page read and write
|
||
2105E827000
|
trusted library allocation
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page read and write
|
||
2105CD20000
|
heap
|
page read and write
|
||
796A5FD000
|
stack
|
page read and write
|
||
2105E8DF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page execute and read and write
|
||
2105E871000
|
trusted library allocation
|
page read and write
|
||
2105C8B2000
|
unkown
|
page readonly
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
2105CCEC000
|
heap
|
page read and write
|
||
2105E802000
|
trusted library allocation
|
page read and write
|
||
7965FBF000
|
stack
|
page read and write
|
||
2105E87B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7C6000
|
trusted library allocation
|
page execute and read and write
|
||
2105CCFE000
|
heap
|
page read and write
|
||
2105EB1D000
|
trusted library allocation
|
page read and write
|
||
2105CC4C000
|
heap
|
page read and write
|
||
2105E95F000
|
trusted library allocation
|
page read and write
|
||
21076F90000
|
heap
|
page read and write
|
||
2105CB10000
|
heap
|
page read and write
|
||
2105E760000
|
heap
|
page execute and read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B70B000
|
trusted library allocation
|
page execute and read and write
|
||
2105CC54000
|
heap
|
page read and write
|
||
2105E9C9000
|
trusted library allocation
|
page read and write
|
There are 126 hidden memdumps, click here to show them.