Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\tfSYi9zABT.exe
|
"C:\Users\user\Desktop\tfSYi9zABT.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://ip-api.com/json/
|
208.95.112.1
|
||
~^')}-{#
|
|||
http://api.ipify.org/
|
unknown
|
||
http://freegeoip.net/xml/
|
unknown
|
||
http://schemas.datacontract.org/2004/07/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
crissnda5.ddns.net
|
87.121.86.32
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
87.121.86.32
|
crissnda5.ddns.net
|
Bulgaria
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tfSYi9zABT_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tfSYi9zABT_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tfSYi9zABT_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tfSYi9zABT_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tfSYi9zABT_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tfSYi9zABT_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tfSYi9zABT_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tfSYi9zABT_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tfSYi9zABT_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tfSYi9zABT_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tfSYi9zABT_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tfSYi9zABT_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tfSYi9zABT_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tfSYi9zABT_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B02000
|
unkown
|
page readonly
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1B9E2000
|
heap
|
page read and write
|
||
1B280000
|
heap
|
page read and write
|
||
106B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
12BE000
|
stack
|
page read and write
|
||
7FF4DC9A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
1B9E0000
|
heap
|
page read and write
|
||
1BCAB000
|
stack
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page execute and read and write
|
||
1B48D000
|
stack
|
page read and write
|
||
1C2EE000
|
stack
|
page read and write
|
||
1B7D0000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
2F01000
|
trusted library allocation
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page read and write
|
||
10FF000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
EF4000
|
stack
|
page read and write
|
||
7FFD9B90D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
35AB000
|
trusted library allocation
|
page read and write
|
||
1BDAE000
|
stack
|
page read and write
|
||
1BA2C000
|
heap
|
page read and write
|
||
1C4E9000
|
stack
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1BA39000
|
heap
|
page read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
7FFD9B752000
|
trusted library allocation
|
page read and write
|
||
30B3000
|
trusted library allocation
|
page read and write
|
||
1C5EA000
|
stack
|
page read and write
|
||
1B9FF000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
1BA28000
|
heap
|
page read and write
|
||
112A000
|
heap
|
page read and write
|
||
7FFD9B914000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1B9D4000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
10B5000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
1B9B0000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B753000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
7FFD9B96C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page execute and read and write
|
||
1BA18000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page execute and read and write
|
||
12F01000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page execute and read and write
|
||
1B9A0000
|
heap
|
page execute and read and write
|
||
10C9000
|
heap
|
page read and write
|
||
B5A000
|
unkown
|
page readonly
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
FF0000
|
heap
|
page read and write
|
||
7FFD9B906000
|
trusted library allocation
|
page read and write
|
||
1B8CE000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
10E7000
|
heap
|
page read and write
|
||
10FD000
|
heap
|
page read and write
|
||
1B9DE000
|
heap
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
1093000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
1AF30000
|
trusted library allocation
|
page read and write
|
||
1B87B000
|
heap
|
page read and write
|
There are 81 hidden memdumps, click here to show them.