IOC Report
#Inv_PI29467018.pdf.vbs

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\#Inv_PI29467018.pdf.vbs"
malicious

URLs

Name
IP
Malicious
http://41.216.183.13/Users_API/gavrels/file_splnzgmx.ozu.txt
41.216.183.13
malicious
http://41.216.183.
unknown
http://41.216.183.13/Users_APhO
unknown
http://41.216.183.13/Users_API/gavrels/file_splnzgmx.ozu.txt.
unknown
http://41.216.183.13/Users_API/gavrels/file_splnzgmx.ozu.txtssesROAMIN
unknown
http://41.216.183.13/Users_API/gavre
unknown

IPs

IP
Domain
Country
Malicious
41.216.183.13
unknown
South Africa
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2107CD80000
heap
page read and write
2107CC4D000
heap
page read and write
2107AE5B000
heap
page read and write
2107CD92000
heap
page read and write
2107CC4D000
heap
page read and write
2107D703000
heap
page read and write
2107CC4D000
heap
page read and write
2107ADB0000
heap
page read and write
2107CC42000
heap
page read and write
2107AE5B000
heap
page read and write
2107ADF0000
heap
page read and write
2107D1B0000
heap
page read and write
F8DCCF5000
stack
page read and write
2107CC4D000
heap
page read and write
2107ADDF000
heap
page read and write
2107CC30000
heap
page read and write
2107D703000
heap
page read and write
2107D70B000
heap
page read and write
2107D090000
heap
page read and write
2107AE83000
heap
page read and write
2107AE43000
heap
page read and write
2107D718000
heap
page read and write
2107D2A0000
heap
page read and write
2107AE94000
heap
page read and write
2107D6FC000
heap
page read and write
2107CC3A000
heap
page read and write
2107AE93000
heap
page read and write
2107B055000
heap
page read and write
2107D700000
heap
page read and write
2107CC4E000
heap
page read and write
2107AE8D000
heap
page read and write
2107CD90000
heap
page read and write
2107D020000
heap
page read and write
2107CEF3000
heap
page read and write
2107CC49000
heap
page read and write
2107D100000
heap
page read and write
2107ADEE000
heap
page read and write
2107AE5D000
heap
page read and write
2107D704000
heap
page read and write
2107ADE0000
heap
page read and write
2107CC4D000
heap
page read and write
2107CC32000
heap
page read and write
2107CC4F000
heap
page read and write
2107AE20000
heap
page read and write
2107CC5E000
heap
page read and write
2107D6D1000
heap
page read and write
2107AE3E000
heap
page read and write
F8DD0FE000
stack
page read and write
2107AE2D000
heap
page read and write
2107AE89000
heap
page read and write
F8DD1FF000
stack
page read and write
2107F010000
trusted library allocation
page read and write
2107D6F3000
heap
page read and write
2107CEF5000
heap
page read and write
2107AE0E000
heap
page read and write
2107ADF9000
heap
page read and write
2107AE5D000
heap
page read and write
2107AE20000
heap
page read and write
2107ADDA000
heap
page read and write
2107AD30000
heap
page read and write
2107CD9A000
heap
page read and write
2107AE2F000
heap
page read and write
F8DCDFE000
stack
page read and write
2107AE20000
heap
page read and write
2107CC3E000
heap
page read and write
2107AE3D000
heap
page read and write
2107AE05000
heap
page read and write
2107AE43000
heap
page read and write
2107AE9B000
heap
page read and write
2107AE84000
heap
page read and write
2107D2B0000
trusted library allocation
page read and write
2107D105000
heap
page read and write
2107AE20000
heap
page read and write
2107CC39000
heap
page read and write
2107CC5E000
heap
page read and write
2107D6B0000
heap
page read and write
2107D700000
heap
page read and write
2107D705000
heap
page read and write
2107CC31000
heap
page read and write
2107CEEE000
heap
page read and write
2107AE5B000
heap
page read and write
2107ADF9000
heap
page read and write
2107CC4D000
heap
page read and write
2107AFC0000
heap
page read and write
2107D70B000
heap
page read and write
2107AE5D000
heap
page read and write
2107AD40000
heap
page read and write
2107AE2C000
heap
page read and write
F8DD4FB000
stack
page read and write
2107AE88000
heap
page read and write
2107AE3D000
heap
page read and write
2107AE34000
heap
page read and write
2107CC34000
heap
page read and write
2107AE05000
heap
page read and write
2107AE3C000
heap
page read and write
2107CEE0000
heap
page read and write
2107ADF9000
heap
page read and write
2107ADB7000
heap
page read and write
2107AE43000
heap
page read and write
2107CC32000
heap
page read and write
2107AE83000
heap
page read and write
2107AD60000
heap
page read and write
2107D703000
heap
page read and write
2107D6F9000
heap
page read and write
2107D70A000
heap
page read and write
F8DD2FE000
stack
page read and write
2107AE5B000
heap
page read and write
2107B050000
heap
page read and write
2107CC45000
heap
page read and write
2107AE88000
heap
page read and write
F8DCEFE000
stack
page read and write
2107AE83000
heap
page read and write
2107AE96000
heap
page read and write
2107ADD9000
heap
page read and write
2107AE83000
heap
page read and write
2107AE5D000
heap
page read and write
F8DD3FE000
stack
page read and write
2107AE83000
heap
page read and write
2107AFC4000
heap
page read and write
2107D110000
heap
page read and write
2107CC3E000
heap
page read and write
F8DD5FE000
stack
page read and write
2107D030000
heap
page read and write
2107CC4D000
heap
page read and write
2107CC36000
heap
page read and write
2107AE90000
heap
page read and write
2107ADEC000
heap
page read and write
2107B000000
heap
page read and write
2107AE8F000
heap
page read and write
2107CC33000
heap
page read and write
2107D6CB000
heap
page read and write
2107CC3E000
heap
page read and write
F8DD6FE000
stack
page read and write
2107AE83000
heap
page read and write
2107D6F3000
heap
page read and write
2107CC4D000
heap
page read and write
There are 126 hidden memdumps, click here to show them.