IOC Report
7echqQm6T4.vbs

loading gif

Files

File Path
Type
Category
Malicious
7echqQm6T4.vbs
ASCII text, with very long lines (6218), with CRLF, LF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7echqQm6T4.vbs"
malicious
C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe
"C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe"
malicious

IPs

IP
Domain
Country
Malicious
89.197.154.116
unknown
United Kingdom
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
unkown
page execute and read and write
malicious
2BF0045B000
heap
page read and write
2BF004A5000
heap
page read and write
2BF004AE000
heap
page read and write
2BF00489000
heap
page read and write
120000
heap
page read and write
400000
unkown
page readonly
2BF02370000
heap
page read and write
2BF00466000
heap
page read and write
2BF00489000
heap
page read and write
2BF021C2000
heap
page read and write
2BF00489000
heap
page read and write
2BF01E70000
heap
page read and write
2BF004CF000
heap
page read and write
2BF0059A000
heap
page read and write
FC3A7FE000
stack
page read and write
7A0000
heap
page read and write
400000
unkown
page readonly
2BF004BC000
heap
page read and write
2BF004A5000
heap
page read and write
2BF0040B000
heap
page read and write
A9F000
stack
page read and write
2BF004DD000
heap
page read and write
2BF00380000
heap
page read and write
2BF00479000
heap
page read and write
2BF002A0000
heap
page read and write
2BF00479000
heap
page read and write
2BF023B0000
heap
page read and write
2BF021C0000
heap
page read and write
2BF0047B000
heap
page read and write
650000
heap
page read and write
2BF021C1000
heap
page read and write
FC3AAFF000
stack
page read and write
2BF004F1000
heap
page read and write
2BF026E0000
trusted library allocation
page read and write
2BF023A0000
heap
page read and write
2BF004E0000
heap
page read and write
2BF02530000
heap
page read and write
2BF004A5000
heap
page read and write
2BF0047B000
heap
page read and write
2BF00590000
heap
page read and write
2BF00461000
heap
page read and write
2BF00463000
heap
page read and write
2BF0059D000
heap
page read and write
FC3ABFF000
stack
page read and write
125000
heap
page read and write
2BF004F1000
heap
page read and write
2BF00453000
heap
page read and write
2BF021C8000
heap
page read and write
2BF004AE000
heap
page read and write
2BF0047B000
heap
page read and write
FC3ADFE000
stack
page read and write
2BF01E50000
heap
page read and write
2BF023BC000
heap
page read and write
2BF004AE000
heap
page read and write
2BF004AE000
heap
page read and write
2BF0045B000
heap
page read and write
60D000
stack
page read and write
2BF00467000
heap
page read and write
402000
unkown
page execute and write copy
2BF004F1000
heap
page read and write
2BF004A5000
heap
page read and write
100000
heap
page read and write
FC3A6F9000
stack
page read and write
2BF004E1000
heap
page read and write
2BF02B80000
heap
page read and write
9D000
stack
page read and write
2BF004D0000
heap
page read and write
2BF004BA000
heap
page read and write
2BF00414000
heap
page read and write
2BF004B7000
heap
page read and write
2BF004B5000
heap
page read and write
2BF003A0000
heap
page read and write
2BF004BC000
heap
page read and write
2BF004B2000
heap
page read and write
FC3ACFF000
stack
page read and write
2BF004F1000
heap
page read and write
2BF004B0000
heap
page read and write
2BF00479000
heap
page read and write
2BF023B4000
heap
page read and write
2BF004C9000
heap
page read and write
2BF00489000
heap
page read and write
2BF00479000
heap
page read and write
2BF004CB000
heap
page read and write
2BF02590000
heap
page read and write
2BF00595000
heap
page read and write
2BF0047B000
heap
page read and write
2BF02340000
heap
page read and write
2BF004AE000
heap
page read and write
FC3AEFD000
stack
page read and write
2BF0046C000
heap
page read and write
2BF00400000
heap
page read and write
2BF00465000
heap
page read and write
2BF004DC000
heap
page read and write
2BF004D2000
heap
page read and write
FC3A8FE000
stack
page read and write
2BF004C1000
heap
page read and write
2BF004C0000
heap
page read and write
2BF0047B000
heap
page read and write
2BF021D1000
heap
page read and write
2BF00432000
heap
page read and write
2BF00479000
heap
page read and write
2BF023C0000
heap
page read and write
2BF004DD000
heap
page read and write
64E000
stack
page read and write
2BF00432000
heap
page read and write
2BF00489000
heap
page read and write
7AE000
heap
page read and write
F0000
heap
page read and write
2BF00431000
heap
page read and write
2BF0059A000
heap
page read and write
2BF004A5000
heap
page read and write
2BF024B0000
heap
page read and write
2BF004C8000
heap
page read and write
2BF004C0000
heap
page read and write
7AA000
heap
page read and write
2BF004D6000
heap
page read and write
2BF004BC000
heap
page read and write
FC3B0FB000
stack
page read and write
2BF0059B000
heap
page read and write
There are 110 hidden memdumps, click here to show them.