IOC Report

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
cmd /C ""C:\Windows\system32\wscript.exe" //e:VBScript dekstop.ini "Microsoft""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\system32\wscript.exe" //e:VBScript dekstop.ini "Microsoft"

Domains

Name
IP
Malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45

Memdumps

Base Address
Regiontype
Protect
Malicious
3598000
heap
page read and write
353E000
stack
page read and write
35C3000
heap
page read and write
35B6000
heap
page read and write
35DC000
heap
page read and write
35C8000
heap
page read and write
3910000
heap
page read and write
35CB000
heap
page read and write
35C3000
heap
page read and write
35CF000
heap
page read and write
35A4000
heap
page read and write
35CB000
heap
page read and write
33E5000
heap
page read and write
35E1000
heap
page read and write
3259000
stack
page read and write
35B0000
heap
page read and write
3590000
heap
page read and write
33E0000
heap
page read and write
33C0000
heap
page read and write
335B000
stack
page read and write
35CB000
heap
page read and write
3916000
heap
page read and write
35D0000
heap
page read and write
38F0000
heap
page read and write
35CB000
heap
page read and write
391A000
heap
page read and write
34FD000
stack
page read and write
388E000
stack
page read and write
5174000
heap
page read and write
35CB000
heap
page read and write
5100000
heap
page read and write
35CB000
heap
page read and write
5170000
heap
page read and write
50F0000
heap
page read and write
378E000
stack
page read and write
35B6000
heap
page read and write
35B0000
heap
page read and write
35C7000
heap
page read and write
35C3000
heap
page read and write
6E90000
trusted library allocation
page read and write
35A7000
heap
page read and write
35C9000
heap
page read and write
33D0000
heap
page read and write
There are 33 hidden memdumps, click here to show them.