Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\mYX4N3FRJj.vbs"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
196A169C000
|
heap
|
page read and write
|
||
196A1710000
|
heap
|
page read and write
|
||
196A170E000
|
heap
|
page read and write
|
||
196A1680000
|
heap
|
page read and write
|
||
137E4FE000
|
stack
|
page read and write
|
||
196A173A000
|
heap
|
page read and write
|
||
196A170B000
|
heap
|
page read and write
|
||
196A30A9000
|
heap
|
page read and write
|
||
196A30AA000
|
heap
|
page read and write
|
||
196A15A0000
|
heap
|
page read and write
|
||
196A16ED000
|
heap
|
page read and write
|
||
137EBFE000
|
stack
|
page read and write
|
||
196A14C0000
|
heap
|
page read and write
|
||
196A1732000
|
heap
|
page read and write
|
||
196A16D8000
|
heap
|
page read and write
|
||
196A1727000
|
heap
|
page read and write
|
||
196A1760000
|
heap
|
page read and write
|
||
196A173A000
|
heap
|
page read and write
|
||
196A1707000
|
heap
|
page read and write
|
||
196A30A1000
|
heap
|
page read and write
|
||
196A30B8000
|
heap
|
page read and write
|
||
196A16C0000
|
heap
|
page read and write
|
||
196A3220000
|
heap
|
page read and write
|
||
196A16F6000
|
heap
|
page read and write
|
||
137E9FE000
|
stack
|
page read and write
|
||
196A16CC000
|
heap
|
page read and write
|
||
196A30B2000
|
heap
|
page read and write
|
||
137E8FE000
|
stack
|
page read and write
|
||
196A18FA000
|
heap
|
page read and write
|
||
196A1713000
|
heap
|
page read and write
|
||
196A16F6000
|
heap
|
page read and write
|
||
196A18F0000
|
heap
|
page read and write
|
||
196A1725000
|
heap
|
page read and write
|
||
196A30A7000
|
heap
|
page read and write
|
||
196A1728000
|
heap
|
page read and write
|
||
196A4DD0000
|
trusted library allocation
|
page read and write
|
||
196A16D7000
|
heap
|
page read and write
|
||
196A16CF000
|
heap
|
page read and write
|
||
196A1724000
|
heap
|
page read and write
|
||
196A18FA000
|
heap
|
page read and write
|
||
196A1707000
|
heap
|
page read and write
|
||
196A171C000
|
heap
|
page read and write
|
||
196A1741000
|
heap
|
page read and write
|
||
196A1732000
|
heap
|
page read and write
|
||
196A173A000
|
heap
|
page read and write
|
||
196A16FD000
|
heap
|
page read and write
|
||
196A1728000
|
heap
|
page read and write
|
||
196A170A000
|
heap
|
page read and write
|
||
196A1710000
|
heap
|
page read and write
|
||
196A30B2000
|
heap
|
page read and write
|
||
196A18FB000
|
heap
|
page read and write
|
||
196A1707000
|
heap
|
page read and write
|
||
196A16BE000
|
heap
|
page read and write
|
||
196A30B2000
|
heap
|
page read and write
|
||
137E1B9000
|
stack
|
page read and write
|
||
196A30A0000
|
heap
|
page read and write
|
||
196A16FD000
|
heap
|
page read and write
|
||
196A16D6000
|
heap
|
page read and write
|
||
196A16D8000
|
heap
|
page read and write
|
||
196A30B2000
|
heap
|
page read and write
|
||
196A173B000
|
heap
|
page read and write
|
||
196A1707000
|
heap
|
page read and write
|
||
196A16D8000
|
heap
|
page read and write
|
||
196A1745000
|
heap
|
page read and write
|
||
196A1732000
|
heap
|
page read and write
|
||
196A1760000
|
heap
|
page read and write
|
||
137EAFF000
|
stack
|
page read and write
|
||
196A16ED000
|
heap
|
page read and write
|
||
196A30A7000
|
heap
|
page read and write
|
||
196A18FB000
|
heap
|
page read and write
|
||
196A1712000
|
heap
|
page read and write
|
||
196A16F6000
|
heap
|
page read and write
|
||
196A16A9000
|
heap
|
page read and write
|
||
196A16DA000
|
heap
|
page read and write
|
||
196A16FD000
|
heap
|
page read and write
|
||
196A16DB000
|
heap
|
page read and write
|
||
196A16A8000
|
heap
|
page read and write
|
||
196A1756000
|
heap
|
page read and write
|
||
196A18F5000
|
heap
|
page read and write
|
||
196A16ED000
|
heap
|
page read and write
|
||
196A1726000
|
heap
|
page read and write
|
||
196A1717000
|
heap
|
page read and write
|
||
196A30A3000
|
heap
|
page read and write
|
||
196A31D0000
|
heap
|
page read and write
|
||
196A15C0000
|
heap
|
page read and write
|
||
196A30A8000
|
heap
|
page read and write
|
||
196A1726000
|
heap
|
page read and write
|
||
196A16A1000
|
heap
|
page read and write
|
||
196A16A1000
|
heap
|
page read and write
|
||
196A16D5000
|
heap
|
page read and write
|
||
196A18FB000
|
heap
|
page read and write
|
||
196A172A000
|
heap
|
page read and write
|
||
196A172C000
|
heap
|
page read and write
|
||
137E7FE000
|
stack
|
page read and write
|
||
196A16BB000
|
heap
|
page read and write
|
||
196A16D6000
|
heap
|
page read and write
|
||
196A173C000
|
heap
|
page read and write
|
||
196A1711000
|
heap
|
page read and write
|
||
196A1742000
|
heap
|
page read and write
|
||
196A30B7000
|
heap
|
page read and write
|
||
196A3224000
|
heap
|
page read and write
|
||
196A16C0000
|
heap
|
page read and write
|
||
196A16F6000
|
heap
|
page read and write
|
||
196A170C000
|
heap
|
page read and write
|
||
196A1737000
|
heap
|
page read and write
|
||
196A30A5000
|
heap
|
page read and write
|
||
196A16FD000
|
heap
|
page read and write
|
||
196A173A000
|
heap
|
page read and write
|
||
137E5FE000
|
stack
|
page read and write
|
||
196A171E000
|
heap
|
page read and write
|
||
196A16E6000
|
heap
|
page read and write
|
||
196A1726000
|
heap
|
page read and write
|
||
196A16E4000
|
heap
|
page read and write
|
||
196A170B000
|
heap
|
page read and write
|
||
196A16BC000
|
heap
|
page read and write
|
There are 105 hidden memdumps, click here to show them.