Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\file.exe" & del "C:\ProgramData\*.dll"" &
exit
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout /t 5
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206/0d60be0de163924d/sqlite3.dll
|
185.215.113.206
|
||
http://185.215.113.206/e2b1563c6670f193.php
|
185.215.113.206
|
||
http://185.215.113.206
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.php//EN
|
unknown
|
||
http://185.215.113.206/0d60be0de163924d/sqlite3.dllx
|
unknown
|
||
http://185.215.113.206s.exe
|
unknown
|
||
http://185.215.113.206-//IETF//DTD
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.phpinit.exe
|
unknown
|
||
http://185.215.113.206/e2b1563c6670f193.phpion:
|
unknown
|
||
http://185.215.113.206e2b1563c6670f193.phpion:
|
unknown
|
||
http://185.215.113.206/0N
|
unknown
|
||
http://185.215.113.206e2b1563c6670f193.phpinit.exe
|
unknown
|
There are 3 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D3E000
|
heap
|
page read and write
|
||
4B30000
|
direct allocation
|
page read and write
|
||
37B000
|
unkown
|
page execute and read and write
|
||
171000
|
unkown
|
page execute and read and write
|
||
DE9000
|
heap
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
1CEAE000
|
stack
|
page read and write
|
||
1CA7F000
|
stack
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
46A1000
|
heap
|
page read and write
|
||
1D15F000
|
heap
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
1CA000
|
unkown
|
page execute and read and write
|
||
33CF000
|
stack
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
1D0EE000
|
stack
|
page read and write
|
||
4110000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
1CBBF000
|
stack
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
2320B000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
1D270000
|
trusted library allocation
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
CF5000
|
heap
|
page read and write
|
||
47C000
|
stack
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
995000
|
stack
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
28C7000
|
heap
|
page read and write
|
||
66D000
|
unkown
|
page execute and write copy
|
||
46A1000
|
heap
|
page read and write
|
||
1CE5F000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
4B30000
|
direct allocation
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
46A0000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
89C000
|
stack
|
page read and write
|
||
4B30000
|
direct allocation
|
page read and write
|
||
3DCF000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
1FF000
|
unkown
|
page execute and read and write
|
||
23380000
|
heap
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
D82000
|
heap
|
page read and write
|
||
4E8000
|
heap
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
4C6F000
|
stack
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
2330B000
|
stack
|
page read and write
|
||
43C000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
38CF000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
377000
|
unkown
|
page execute and read and write
|
||
318E000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
170000
|
unkown
|
page read and write
|
||
235BC000
|
stack
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
28CE000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
654000
|
unkown
|
page execute and read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
80B000
|
unkown
|
page execute and read and write
|
||
80C000
|
unkown
|
page execute and write copy
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
2A0C000
|
stack
|
page read and write
|
||
558000
|
unkown
|
page execute and read and write
|
||
454F000
|
stack
|
page read and write
|
||
1D150000
|
heap
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
27CF000
|
stack
|
page read and write
|
||
1F5000
|
unkown
|
page execute and read and write
|
||
354E000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
3BA000
|
unkown
|
page execute and read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46B0000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
D7E000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
65F000
|
unkown
|
page execute and read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
66D000
|
unkown
|
page execute and read and write
|
||
458E000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
1CBFE000
|
stack
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
66E000
|
unkown
|
page execute and write copy
|
||
D96000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
DD2000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
1D270000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
234BC000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
171000
|
unkown
|
page execute and write copy
|
||
4690000
|
direct allocation
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
1F8000
|
unkown
|
page execute and read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
3A4E000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
4B6B000
|
stack
|
page read and write
|
||
DB7000
|
heap
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
1CABE000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
46C0000
|
heap
|
page read and write
|
||
468F000
|
stack
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
1CCFE000
|
stack
|
page read and write
|
||
E11000
|
heap
|
page read and write
|
||
1CFAC000
|
stack
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
1CFED000
|
stack
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
99F000
|
stack
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
1D152000
|
heap
|
page read and write
|
||
202000
|
unkown
|
page execute and read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
632000
|
unkown
|
page execute and read and write
|
||
46A1000
|
heap
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
28CB000
|
heap
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
1CD5E000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
3CE000
|
unkown
|
page execute and read and write
|
||
444E000
|
stack
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
1D2000
|
unkown
|
page execute and read and write
|
||
10AE000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
There are 223 hidden memdumps, click here to show them.