IOC Report
FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs

loading gif

Files

File Path
Type
Category
Malicious
FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs
ASCII text, with very long lines (65536), with no line terminators
initial sample
malicious
C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs"
malicious
C:\Windows\System32\cmd.exe
cmd /c copy "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exe" /Y
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
255C298E000
heap
page read and write
255C14BB000
heap
page read and write
255C2D63000
heap
page read and write
255C1481000
heap
page read and write
255BF50C000
heap
page read and write
255C25A0000
heap
page read and write
255C1473000
heap
page read and write
255C156E000
heap
page read and write
255C1498000
heap
page read and write
255C307D000
heap
page read and write
255C3585000
heap
page read and write
255C2A28000
heap
page read and write
255C2E80000
heap
page read and write
255C35A4000
heap
page read and write
255C2C27000
heap
page read and write
255C29FE000
heap
page read and write
255C1567000
heap
page read and write
255C2980000
heap
page read and write
255C3072000
heap
page read and write
255C2A01000
heap
page read and write
255C29A8000
heap
page read and write
255C14D3000
heap
page read and write
255C32CE000
heap
page read and write
255C2C27000
heap
page read and write
255C2B50000
heap
page read and write
255C2F7F000
heap
page read and write
255C156E000
heap
page read and write
255C14D2000
heap
page read and write
255C1533000
heap
page read and write
255BF54B000
heap
page read and write
255BF5DE000
heap
page read and write
255C14DB000
heap
page read and write
255C23A0000
heap
page read and write
255C14F3000
heap
page read and write
255BF5A8000
heap
page read and write
255C2B68000
heap
page read and write
255C33D3000
heap
page read and write
255C358A000
heap
page read and write
255C2EF4000
heap
page read and write
255C33CE000
heap
page read and write
255C2A9F000
heap
page read and write
255BF532000
heap
page read and write
255BF79A000
heap
page read and write
255C2C6E000
heap
page read and write
A32AFFE000
stack
page read and write
255C3569000
heap
page read and write
255C2A4D000
heap
page read and write
255C2ACB000
heap
page read and write
255C2A7E000
heap
page read and write
255C3080000
heap
page read and write
255C14C3000
heap
page read and write
255BF5BD000
heap
page read and write
255C14D0000
heap
page read and write
255C2981000
heap
page read and write
255C23A1000
heap
page read and write
255C149F000
heap
page read and write
255C29FE000
heap
page read and write
255C29E3000
heap
page read and write
255BF799000
heap
page read and write
255C2E85000
heap
page read and write
255C1543000
heap
page read and write
255C2C27000
heap
page read and write
255C14D0000
heap
page read and write
255C3573000
heap
page read and write
255C35A4000
heap
page read and write
255C14D8000
heap
page read and write
255C2A7E000
heap
page read and write
255C30C5000
heap
page read and write
255C14D0000
heap
page read and write
255C35E3000
heap
page read and write
255C1523000
heap
page read and write
255C14A8000
heap
page read and write
255C3584000
heap
page read and write
255C156E000
heap
page read and write
255BF582000
heap
page read and write
255C35C0000
heap
page read and write
255C148F000
heap
page read and write
255BF6B0000
heap
page read and write
255BF585000
heap
page read and write
255BF79B000
heap
page read and write
255C2C81000
heap
page read and write
255BF4E0000
heap
page read and write
255C2D0C000
heap
page read and write
255BF540000
heap
page read and write
255C2A98000
heap
page read and write
255C2A7E000
heap
page read and write
255C156E000
heap
page read and write
255BF570000
heap
page read and write
255BF50C000
heap
page read and write
255C2E7F000
heap
page read and write
255C33CE000
heap
page read and write
255C2C27000
heap
page read and write
255BF587000
heap
page read and write
255C2F6B000
heap
page read and write
255C2F7E000
heap
page read and write
255C150B000
heap
page read and write
255C35A4000
heap
page read and write
255C156E000
heap
page read and write
255C14B0000
heap
page read and write
255C1487000
heap
page read and write
255BF4B0000
heap
page read and write
255C30CA000
heap
page read and write
255C1493000
heap
page read and write
255C14D3000
heap
page read and write
255C23A6000
heap
page read and write
255C35E1000
heap
page read and write
255C5350000
trusted library allocation
page read and write
255C156E000
heap
page read and write
255C1478000
heap
page read and write
255C14CB000
heap
page read and write
255C39C5000
heap
page read and write
255BF5DE000
heap
page read and write
255BF550000
heap
page read and write
255C156E000
heap
page read and write
255C2B2F000
heap
page read and write
255C2A7E000
heap
page read and write
255BF5DE000
heap
page read and write
255C156E000
heap
page read and write
255C3081000
heap
page read and write
255BF58B000
heap
page read and write
255C2C7E000
heap
page read and write
255C14D3000
heap
page read and write
255C1124000
heap
page read and write
255C2C7E000
heap
page read and write
255C29C5000
heap
page read and write
255C1488000
heap
page read and write
255C1471000
heap
page read and write
A32AAA8000
stack
page read and write
255C14FF000
heap
page read and write
255C35A4000
heap
page read and write
255C156E000
heap
page read and write
255C356A000
heap
page read and write
255C156E000
heap
page read and write
255C1A2D000
heap
page read and write
255C2D80000
heap
page read and write
255C2D7F000
heap
page read and write
255BF53F000
heap
page read and write
255C31D0000
heap
page read and write
255BF4C0000
heap
page read and write
255C156E000
heap
page read and write
255BF585000
heap
page read and write
A32B2FE000
stack
page read and write
255C2C7E000
heap
page read and write
255C2E7F000
heap
page read and write
255C3247000
heap
page read and write
255C3589000
heap
page read and write
A32B0FF000
stack
page read and write
255C2B50000
heap
page read and write
255C156E000
heap
page read and write
255C14D3000
heap
page read and write
255C14AB000
heap
page read and write
255C156E000
heap
page read and write
255C1A29000
heap
page read and write
255C2F7E000
heap
page read and write
255C14D0000
heap
page read and write
255C3569000
heap
page read and write
255C2C27000
heap
page read and write
255BF5DE000
heap
page read and write
255C14D0000
heap
page read and write
255C156E000
heap
page read and write
A32AEFF000
stack
page read and write
255C14D3000
heap
page read and write
255C1DFC000
heap
page read and write
255C31CF000
heap
page read and write
255C10D0000
heap
page read and write
255C30D0000
heap
page read and write
255BF5DE000
heap
page read and write
255BF5DE000
heap
page read and write
255C30D0000
heap
page read and write
255C1470000
heap
page read and write
255C1483000
heap
page read and write
255C35A5000
heap
page read and write
255C1471000
heap
page read and write
255BF4FC000
heap
page read and write
255C147B000
heap
page read and write
255C156E000
heap
page read and write
255C2C80000
heap
page read and write
255C14B3000
heap
page read and write
255C2BA2000
heap
page read and write
255C3469000
heap
page read and write
255C156E000
heap
page read and write
255C2C23000
heap
page read and write
255BF79C000
heap
page read and write
255C165A000
heap
page read and write
255C156E000
heap
page read and write
255C2A7E000
heap
page read and write
255C349B000
heap
page read and write
255C3579000
heap
page read and write
255C156E000
heap
page read and write
255C2C2C000
heap
page read and write
255C3583000
heap
page read and write
255C30D1000
heap
page read and write
255C35BD000
heap
page read and write
255C31CF000
heap
page read and write
255C2C27000
heap
page read and write
255C2A7E000
heap
page read and write
255C14B0000
heap
page read and write
255C2A99000
heap
page read and write
255C1471000
heap
page read and write
255C2A80000
heap
page read and write
255C156E000
heap
page read and write
255C346A000
heap
page read and write
255C148B000
heap
page read and write
255C2CBB000
heap
page read and write
255C307D000
heap
page read and write
255C32CF000
heap
page read and write
255C2C28000
heap
page read and write
255BF53C000
heap
page read and write
255BF58C000
heap
page read and write
255C2A7E000
heap
page read and write
255C156E000
heap
page read and write
255C35A4000
heap
page read and write
255BF51C000
heap
page read and write
255C1553000
heap
page read and write
255C2FEA000
heap
page read and write
255BF795000
heap
page read and write
255C2B50000
heap
page read and write
255C156E000
heap
page read and write
255BF560000
heap
page read and write
255C356B000
heap
page read and write
255C1497000
heap
page read and write
255C3590000
heap
page read and write
255C156E000
heap
page read and write
255BF58B000
heap
page read and write
255C2DBE000
heap
page read and write
255BF549000
heap
page read and write
255BF79A000
heap
page read and write
255C156E000
heap
page read and write
255C14E7000
heap
page read and write
255C3578000
heap
page read and write
A32ACFE000
stack
page read and write
255C3589000
heap
page read and write
255BF58B000
heap
page read and write
255BF534000
heap
page read and write
255C2A81000
heap
page read and write
255BF58B000
heap
page read and write
255C147F000
heap
page read and write
255C149B000
heap
page read and write
255C14D3000
heap
page read and write
255C156E000
heap
page read and write
255BF5DE000
heap
page read and write
255C14D0000
heap
page read and write
255BF4E9000
heap
page read and write
255C2E20000
heap
page read and write
255C156E000
heap
page read and write
255C156E000
heap
page read and write
255C1491000
heap
page read and write
255C156E000
heap
page read and write
255C156E000
heap
page read and write
255C14A1000
heap
page read and write
255BF79E000
heap
page read and write
255C14A3000
heap
page read and write
255C2A75000
heap
page read and write
255C1120000
heap
page read and write
A32ABFE000
stack
page read and write
255C35A4000
heap
page read and write
255C156E000
heap
page read and write
255C2AFC000
heap
page read and write
255C14B0000
heap
page read and write
A32B1FD000
stack
page read and write
255C2D7F000
heap
page read and write
255C2A06000
heap
page read and write
255C307D000
heap
page read and write
255C156E000
heap
page read and write
255C33CE000
heap
page read and write
255C32F7000
heap
page read and write
255C33B2000
heap
page read and write
255BF79B000
heap
page read and write
255C1DF5000
heap
page read and write
255BF589000
heap
page read and write
255C2B50000
heap
page read and write
255C14D7000
heap
page read and write
255BF51D000
heap
page read and write
255C31A2000
heap
page read and write
255C14D3000
heap
page read and write
255C2F7E000
heap
page read and write
255C358E000
heap
page read and write
255C2D7F000
heap
page read and write
255BF549000
heap
page read and write
255BF594000
heap
page read and write
255C156E000
heap
page read and write
255C29FE000
heap
page read and write
255BF58B000
heap
page read and write
255C2BE0000
heap
page read and write
255C156E000
heap
page read and write
255C2C7E000
heap
page read and write
255BF501000
heap
page read and write
255C1477000
heap
page read and write
255C2B53000
heap
page read and write
255C2A7E000
heap
page read and write
255BF790000
heap
page read and write
255C3108000
heap
page read and write
255C1517000
heap
page read and write
255C3571000
heap
page read and write
255BF530000
heap
page read and write
255C156E000
heap
page read and write
255C14B0000
heap
page read and write
255C29FE000
heap
page read and write
255C14D8000
heap
page read and write
255BF5D5000
heap
page read and write
There are 290 hidden memdumps, click here to show them.