Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
7echqQm6T4.vbs
|
ASCII text, with very long lines (6218), with CRLF, LF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7echqQm6T4.vbs"
|
||
C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe
|
"C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe"
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
89.197.154.116
|
unknown
|
United Kingdom
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
unkown
|
page execute and read and write
|
||
2BF0045B000
|
heap
|
page read and write
|
||
2BF004A5000
|
heap
|
page read and write
|
||
2BF004AE000
|
heap
|
page read and write
|
||
2BF00489000
|
heap
|
page read and write
|
||
120000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2BF02370000
|
heap
|
page read and write
|
||
2BF00466000
|
heap
|
page read and write
|
||
2BF00489000
|
heap
|
page read and write
|
||
2BF021C2000
|
heap
|
page read and write
|
||
2BF00489000
|
heap
|
page read and write
|
||
2BF01E70000
|
heap
|
page read and write
|
||
2BF004CF000
|
heap
|
page read and write
|
||
2BF0059A000
|
heap
|
page read and write
|
||
FC3A7FE000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2BF004BC000
|
heap
|
page read and write
|
||
2BF004A5000
|
heap
|
page read and write
|
||
2BF0040B000
|
heap
|
page read and write
|
||
A9F000
|
stack
|
page read and write
|
||
2BF004DD000
|
heap
|
page read and write
|
||
2BF00380000
|
heap
|
page read and write
|
||
2BF00479000
|
heap
|
page read and write
|
||
2BF002A0000
|
heap
|
page read and write
|
||
2BF00479000
|
heap
|
page read and write
|
||
2BF023B0000
|
heap
|
page read and write
|
||
2BF021C0000
|
heap
|
page read and write
|
||
2BF0047B000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
2BF021C1000
|
heap
|
page read and write
|
||
FC3AAFF000
|
stack
|
page read and write
|
||
2BF004F1000
|
heap
|
page read and write
|
||
2BF026E0000
|
trusted library allocation
|
page read and write
|
||
2BF023A0000
|
heap
|
page read and write
|
||
2BF004E0000
|
heap
|
page read and write
|
||
2BF02530000
|
heap
|
page read and write
|
||
2BF004A5000
|
heap
|
page read and write
|
||
2BF0047B000
|
heap
|
page read and write
|
||
2BF00590000
|
heap
|
page read and write
|
||
2BF00461000
|
heap
|
page read and write
|
||
2BF00463000
|
heap
|
page read and write
|
||
2BF0059D000
|
heap
|
page read and write
|
||
FC3ABFF000
|
stack
|
page read and write
|
||
125000
|
heap
|
page read and write
|
||
2BF004F1000
|
heap
|
page read and write
|
||
2BF00453000
|
heap
|
page read and write
|
||
2BF021C8000
|
heap
|
page read and write
|
||
2BF004AE000
|
heap
|
page read and write
|
||
2BF0047B000
|
heap
|
page read and write
|
||
FC3ADFE000
|
stack
|
page read and write
|
||
2BF01E50000
|
heap
|
page read and write
|
||
2BF023BC000
|
heap
|
page read and write
|
||
2BF004AE000
|
heap
|
page read and write
|
||
2BF004AE000
|
heap
|
page read and write
|
||
2BF0045B000
|
heap
|
page read and write
|
||
60D000
|
stack
|
page read and write
|
||
2BF00467000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page execute and write copy
|
||
2BF004F1000
|
heap
|
page read and write
|
||
2BF004A5000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
FC3A6F9000
|
stack
|
page read and write
|
||
2BF004E1000
|
heap
|
page read and write
|
||
2BF02B80000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
2BF004D0000
|
heap
|
page read and write
|
||
2BF004BA000
|
heap
|
page read and write
|
||
2BF00414000
|
heap
|
page read and write
|
||
2BF004B7000
|
heap
|
page read and write
|
||
2BF004B5000
|
heap
|
page read and write
|
||
2BF003A0000
|
heap
|
page read and write
|
||
2BF004BC000
|
heap
|
page read and write
|
||
2BF004B2000
|
heap
|
page read and write
|
||
FC3ACFF000
|
stack
|
page read and write
|
||
2BF004F1000
|
heap
|
page read and write
|
||
2BF004B0000
|
heap
|
page read and write
|
||
2BF00479000
|
heap
|
page read and write
|
||
2BF023B4000
|
heap
|
page read and write
|
||
2BF004C9000
|
heap
|
page read and write
|
||
2BF00489000
|
heap
|
page read and write
|
||
2BF00479000
|
heap
|
page read and write
|
||
2BF004CB000
|
heap
|
page read and write
|
||
2BF02590000
|
heap
|
page read and write
|
||
2BF00595000
|
heap
|
page read and write
|
||
2BF0047B000
|
heap
|
page read and write
|
||
2BF02340000
|
heap
|
page read and write
|
||
2BF004AE000
|
heap
|
page read and write
|
||
FC3AEFD000
|
stack
|
page read and write
|
||
2BF0046C000
|
heap
|
page read and write
|
||
2BF00400000
|
heap
|
page read and write
|
||
2BF00465000
|
heap
|
page read and write
|
||
2BF004DC000
|
heap
|
page read and write
|
||
2BF004D2000
|
heap
|
page read and write
|
||
FC3A8FE000
|
stack
|
page read and write
|
||
2BF004C1000
|
heap
|
page read and write
|
||
2BF004C0000
|
heap
|
page read and write
|
||
2BF0047B000
|
heap
|
page read and write
|
||
2BF021D1000
|
heap
|
page read and write
|
||
2BF00432000
|
heap
|
page read and write
|
||
2BF00479000
|
heap
|
page read and write
|
||
2BF023C0000
|
heap
|
page read and write
|
||
2BF004DD000
|
heap
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
2BF00432000
|
heap
|
page read and write
|
||
2BF00489000
|
heap
|
page read and write
|
||
7AE000
|
heap
|
page read and write
|
||
F0000
|
heap
|
page read and write
|
||
2BF00431000
|
heap
|
page read and write
|
||
2BF0059A000
|
heap
|
page read and write
|
||
2BF004A5000
|
heap
|
page read and write
|
||
2BF024B0000
|
heap
|
page read and write
|
||
2BF004C8000
|
heap
|
page read and write
|
||
2BF004C0000
|
heap
|
page read and write
|
||
7AA000
|
heap
|
page read and write
|
||
2BF004D6000
|
heap
|
page read and write
|
||
2BF004BC000
|
heap
|
page read and write
|
||
FC3B0FB000
|
stack
|
page read and write
|
||
2BF0059B000
|
heap
|
page read and write
|
There are 110 hidden memdumps, click here to show them.