IOC Report
boking_reserva.vbs

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\boking_reserva.vbs"
malicious

URLs

Name
IP
Malicious
http://185.244.29.74:456/document
185.244.29.74
malicious
http://185.244.29.74:456/documenta
unknown
http://185.244.29.74:456/documentd
unknown
http://185.244.29.74:456/document&
unknown
http://185.244.29.74:456/documentf
unknown
http://185.244.29.74:456/documentj
unknown
http://185.244.29.74:456/documentEncoding:
unknown
http://185.244.29.74:456/documenti
unknown
http://185.244.29.74:456/documentn
unknown
http://185.244.29.74:456/document609
unknown
http://185.244.29.74:456/document0
unknown
http://185.244.29.74:456/documentcept-Encoding:
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.244.29.74
unknown
Netherlands
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFB1E0F6000
unkown
page readonly
20DA8611000
heap
page read and write
20DA86A0000
heap
page read and write
8CC63FE000
stack
page read and write
20DA85A0000
heap
page read and write
20DA89F0000
heap
page read and write
20DA8601000
heap
page read and write
20DA8626000
heap
page read and write
20DA85B4000
heap
page read and write
20DA9312000
heap
page read and write
20DA87A0000
heap
page read and write
20DA85A1000
heap
page read and write
20DA85DF000
heap
page read and write
8CC64FD000
stack
page read and write
20DA67E0000
heap
page read and write
20DA85EC000
heap
page read and write
20DA85C0000
heap
page read and write
20DA8645000
heap
page read and write
20DA85BB000
heap
page read and write
8CC62F8000
stack
page read and write
20DA6959000
heap
page read and write
20DA8669000
heap
page read and write
20DA6800000
heap
page read and write
20DA8672000
heap
page read and write
20DA92ED000
heap
page read and write
7FFB1E0E1000
unkown
page execute read
20DA867F000
heap
page read and write
20DA85A4000
heap
page read and write
20DA8250000
heap
page read and write
20DA6810000
heap
page read and write
8CC5DFD000
stack
page read and write
20DA8675000
heap
page read and write
20DA85C7000
heap
page read and write
20DA680E000
heap
page read and write
20DA85C4000
heap
page read and write
20DA868B000
heap
page read and write
20DA8631000
heap
page read and write
20DA85AF000
heap
page read and write
20DA8A80000
heap
page read and write
20DA865A000
heap
page read and write
7FFB1E0E0000
unkown
page readonly
20DA864E000
heap
page read and write
20DA85D8000
heap
page read and write
20DA8651000
heap
page read and write
7FFB1E105000
unkown
page readonly
20DA85EF000
heap
page read and write
20DA863A000
heap
page read and write
20DA879E000
heap
page read and write
20DA89A0000
heap
page read and write
20DA8675000
heap
page read and write
20DA92DB000
heap
page read and write
20DA699B000
heap
page read and write
20DA8D10000
heap
page read and write
20DA85C7000
heap
page read and write
20DA868F000
heap
page read and write
20DA8666000
heap
page read and write
20DA6805000
heap
page read and write
20DA8B60000
heap
page read and write
20DA865D000
heap
page read and write
20DA92DD000
heap
page read and write
20DA6808000
heap
page read and write
20DA85A6000
heap
page read and write
20DA680D000
heap
page read and write
7FFB1E102000
unkown
page readonly
20DA8686000
heap
page read and write
20DA85A9000
heap
page read and write
20DA867E000
heap
page read and write
20DA85E7000
heap
page read and write
20DA6700000
heap
page read and write
20DA92F9000
heap
page read and write
20DA85CC000
heap
page read and write
20DA862E000
heap
page read and write
20DA697E000
heap
page read and write
20DA8675000
heap
page read and write
20DA8684000
heap
page read and write
20DA85AC000
heap
page read and write
20DA9260000
heap
page read and write
20DA8642000
heap
page read and write
20DA89C0000
heap
page read and write
20DA68A9000
heap
page read and write
8CC5AF8000
stack
page read and write
20DA8C60000
heap
page read and write
7FFB1E100000
unkown
page read and write
20DA8615000
heap
page read and write
20DA8B65000
heap
page read and write
20DA6957000
heap
page read and write
20DA85D3000
heap
page read and write
20DA8E60000
trusted library allocation
page read and write
20DA68B2000
heap
page read and write
20DA68A0000
heap
page read and write
20DA8656000
heap
page read and write
20DA85D3000
heap
page read and write
8CC5EFE000
stack
page read and write
20DA85E4000
heap
page read and write
There are 84 hidden memdumps, click here to show them.