Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\boking_reserva.vbs"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.244.29.74:456/document
|
185.244.29.74
|
||
http://185.244.29.74:456/documenta
|
unknown
|
||
http://185.244.29.74:456/documentd
|
unknown
|
||
http://185.244.29.74:456/document&
|
unknown
|
||
http://185.244.29.74:456/documentf
|
unknown
|
||
http://185.244.29.74:456/documentj
|
unknown
|
||
http://185.244.29.74:456/documentEncoding:
|
unknown
|
||
http://185.244.29.74:456/documenti
|
unknown
|
||
http://185.244.29.74:456/documentn
|
unknown
|
||
http://185.244.29.74:456/document609
|
unknown
|
||
http://185.244.29.74:456/document0
|
unknown
|
||
http://185.244.29.74:456/documentcept-Encoding:
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.244.29.74
|
unknown
|
Netherlands
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FFB1E0F6000
|
unkown
|
page readonly
|
||
20DA8611000
|
heap
|
page read and write
|
||
20DA86A0000
|
heap
|
page read and write
|
||
8CC63FE000
|
stack
|
page read and write
|
||
20DA85A0000
|
heap
|
page read and write
|
||
20DA89F0000
|
heap
|
page read and write
|
||
20DA8601000
|
heap
|
page read and write
|
||
20DA8626000
|
heap
|
page read and write
|
||
20DA85B4000
|
heap
|
page read and write
|
||
20DA9312000
|
heap
|
page read and write
|
||
20DA87A0000
|
heap
|
page read and write
|
||
20DA85A1000
|
heap
|
page read and write
|
||
20DA85DF000
|
heap
|
page read and write
|
||
8CC64FD000
|
stack
|
page read and write
|
||
20DA67E0000
|
heap
|
page read and write
|
||
20DA85EC000
|
heap
|
page read and write
|
||
20DA85C0000
|
heap
|
page read and write
|
||
20DA8645000
|
heap
|
page read and write
|
||
20DA85BB000
|
heap
|
page read and write
|
||
8CC62F8000
|
stack
|
page read and write
|
||
20DA6959000
|
heap
|
page read and write
|
||
20DA8669000
|
heap
|
page read and write
|
||
20DA6800000
|
heap
|
page read and write
|
||
20DA8672000
|
heap
|
page read and write
|
||
20DA92ED000
|
heap
|
page read and write
|
||
7FFB1E0E1000
|
unkown
|
page execute read
|
||
20DA867F000
|
heap
|
page read and write
|
||
20DA85A4000
|
heap
|
page read and write
|
||
20DA8250000
|
heap
|
page read and write
|
||
20DA6810000
|
heap
|
page read and write
|
||
8CC5DFD000
|
stack
|
page read and write
|
||
20DA8675000
|
heap
|
page read and write
|
||
20DA85C7000
|
heap
|
page read and write
|
||
20DA680E000
|
heap
|
page read and write
|
||
20DA85C4000
|
heap
|
page read and write
|
||
20DA868B000
|
heap
|
page read and write
|
||
20DA8631000
|
heap
|
page read and write
|
||
20DA85AF000
|
heap
|
page read and write
|
||
20DA8A80000
|
heap
|
page read and write
|
||
20DA865A000
|
heap
|
page read and write
|
||
7FFB1E0E0000
|
unkown
|
page readonly
|
||
20DA864E000
|
heap
|
page read and write
|
||
20DA85D8000
|
heap
|
page read and write
|
||
20DA8651000
|
heap
|
page read and write
|
||
7FFB1E105000
|
unkown
|
page readonly
|
||
20DA85EF000
|
heap
|
page read and write
|
||
20DA863A000
|
heap
|
page read and write
|
||
20DA879E000
|
heap
|
page read and write
|
||
20DA89A0000
|
heap
|
page read and write
|
||
20DA8675000
|
heap
|
page read and write
|
||
20DA92DB000
|
heap
|
page read and write
|
||
20DA699B000
|
heap
|
page read and write
|
||
20DA8D10000
|
heap
|
page read and write
|
||
20DA85C7000
|
heap
|
page read and write
|
||
20DA868F000
|
heap
|
page read and write
|
||
20DA8666000
|
heap
|
page read and write
|
||
20DA6805000
|
heap
|
page read and write
|
||
20DA8B60000
|
heap
|
page read and write
|
||
20DA865D000
|
heap
|
page read and write
|
||
20DA92DD000
|
heap
|
page read and write
|
||
20DA6808000
|
heap
|
page read and write
|
||
20DA85A6000
|
heap
|
page read and write
|
||
20DA680D000
|
heap
|
page read and write
|
||
7FFB1E102000
|
unkown
|
page readonly
|
||
20DA8686000
|
heap
|
page read and write
|
||
20DA85A9000
|
heap
|
page read and write
|
||
20DA867E000
|
heap
|
page read and write
|
||
20DA85E7000
|
heap
|
page read and write
|
||
20DA6700000
|
heap
|
page read and write
|
||
20DA92F9000
|
heap
|
page read and write
|
||
20DA85CC000
|
heap
|
page read and write
|
||
20DA862E000
|
heap
|
page read and write
|
||
20DA697E000
|
heap
|
page read and write
|
||
20DA8675000
|
heap
|
page read and write
|
||
20DA8684000
|
heap
|
page read and write
|
||
20DA85AC000
|
heap
|
page read and write
|
||
20DA9260000
|
heap
|
page read and write
|
||
20DA8642000
|
heap
|
page read and write
|
||
20DA89C0000
|
heap
|
page read and write
|
||
20DA68A9000
|
heap
|
page read and write
|
||
8CC5AF8000
|
stack
|
page read and write
|
||
20DA8C60000
|
heap
|
page read and write
|
||
7FFB1E100000
|
unkown
|
page read and write
|
||
20DA8615000
|
heap
|
page read and write
|
||
20DA8B65000
|
heap
|
page read and write
|
||
20DA6957000
|
heap
|
page read and write
|
||
20DA85D3000
|
heap
|
page read and write
|
||
20DA8E60000
|
trusted library allocation
|
page read and write
|
||
20DA68B2000
|
heap
|
page read and write
|
||
20DA68A0000
|
heap
|
page read and write
|
||
20DA8656000
|
heap
|
page read and write
|
||
20DA85D3000
|
heap
|
page read and write
|
||
8CC5EFE000
|
stack
|
page read and write
|
||
20DA85E4000
|
heap
|
page read and write
|
There are 84 hidden memdumps, click here to show them.