IOCReport

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\vbc.exe.exe
'C:\Users\user\Desktop\vbc.exe.exe'
malicious

URLs

Name
IP
Malicious
https://bara-seck.com/bin_YIuwAXdc211.bin, https://wizumiya.co.jp/html/user_data/
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
401000
unkown image
page execute read
malicious
401000
unkown image
page execute read
malicious
330000
unkown
page write copy
clean
320000
unkown
page read and write
clean
400000
unkown image
page readonly
clean
2B0000
heap private
page read and write
clean
424000
unkown image
page readonly
clean
7EFDF000
unkown
page read and write
clean
720000
unkown
page readonly
clean
424000
unkown image
page readonly
clean
450000
unkown
page readonly
clean
1E50000
heap private
page read and write
clean
310000
heap private
page read and write
clean
5A0000
unkown
page readonly
clean
300000
unkown
page readonly
clean
166000
unkown
page read and write
clean
20000
unkown
page read and write
clean
1D50000
unkown
page readonly
clean
1D32000
heap private
page read and write
clean
1D10000
heap private
page read and write
clean
2260000
unkown
page readonly
clean
380000
unkown
page read and write
clean
400000
unkown image
page readonly
clean
460000
unkown
page execute and read and write
clean
1D14000
heap private
page read and write
clean
4A0000
heap default
page read and write
clean
2F0000
unkown
page execute read
clean
4A7000
heap default
page read and write
clean
367000
heap private
page read and write
clean
1B0000
unkown
page readonly
clean
400000
unkown image
page readonly
clean
1E60000
unkown
page read and write
clean
430000
unkown
page readonly
clean
220000
heap default
page read and write
clean
4C4000
heap default
page read and write
clean
87000
unkown
page read and write
clean
8C0000
unkown
page readonly
clean
340000
heap private
page read and write
clean
422000
unkown image
page read and write
clean
34A000
heap private
page read and write
clean
There are 30 hidden memdumps, click here to show them.