IOC Report
mYX4N3FRJj.vbs

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\mYX4N3FRJj.vbs"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
196A169C000
heap
page read and write
196A1710000
heap
page read and write
196A170E000
heap
page read and write
196A1680000
heap
page read and write
137E4FE000
stack
page read and write
196A173A000
heap
page read and write
196A170B000
heap
page read and write
196A30A9000
heap
page read and write
196A30AA000
heap
page read and write
196A15A0000
heap
page read and write
196A16ED000
heap
page read and write
137EBFE000
stack
page read and write
196A14C0000
heap
page read and write
196A1732000
heap
page read and write
196A16D8000
heap
page read and write
196A1727000
heap
page read and write
196A1760000
heap
page read and write
196A173A000
heap
page read and write
196A1707000
heap
page read and write
196A30A1000
heap
page read and write
196A30B8000
heap
page read and write
196A16C0000
heap
page read and write
196A3220000
heap
page read and write
196A16F6000
heap
page read and write
137E9FE000
stack
page read and write
196A16CC000
heap
page read and write
196A30B2000
heap
page read and write
137E8FE000
stack
page read and write
196A18FA000
heap
page read and write
196A1713000
heap
page read and write
196A16F6000
heap
page read and write
196A18F0000
heap
page read and write
196A1725000
heap
page read and write
196A30A7000
heap
page read and write
196A1728000
heap
page read and write
196A4DD0000
trusted library allocation
page read and write
196A16D7000
heap
page read and write
196A16CF000
heap
page read and write
196A1724000
heap
page read and write
196A18FA000
heap
page read and write
196A1707000
heap
page read and write
196A171C000
heap
page read and write
196A1741000
heap
page read and write
196A1732000
heap
page read and write
196A173A000
heap
page read and write
196A16FD000
heap
page read and write
196A1728000
heap
page read and write
196A170A000
heap
page read and write
196A1710000
heap
page read and write
196A30B2000
heap
page read and write
196A18FB000
heap
page read and write
196A1707000
heap
page read and write
196A16BE000
heap
page read and write
196A30B2000
heap
page read and write
137E1B9000
stack
page read and write
196A30A0000
heap
page read and write
196A16FD000
heap
page read and write
196A16D6000
heap
page read and write
196A16D8000
heap
page read and write
196A30B2000
heap
page read and write
196A173B000
heap
page read and write
196A1707000
heap
page read and write
196A16D8000
heap
page read and write
196A1745000
heap
page read and write
196A1732000
heap
page read and write
196A1760000
heap
page read and write
137EAFF000
stack
page read and write
196A16ED000
heap
page read and write
196A30A7000
heap
page read and write
196A18FB000
heap
page read and write
196A1712000
heap
page read and write
196A16F6000
heap
page read and write
196A16A9000
heap
page read and write
196A16DA000
heap
page read and write
196A16FD000
heap
page read and write
196A16DB000
heap
page read and write
196A16A8000
heap
page read and write
196A1756000
heap
page read and write
196A18F5000
heap
page read and write
196A16ED000
heap
page read and write
196A1726000
heap
page read and write
196A1717000
heap
page read and write
196A30A3000
heap
page read and write
196A31D0000
heap
page read and write
196A15C0000
heap
page read and write
196A30A8000
heap
page read and write
196A1726000
heap
page read and write
196A16A1000
heap
page read and write
196A16A1000
heap
page read and write
196A16D5000
heap
page read and write
196A18FB000
heap
page read and write
196A172A000
heap
page read and write
196A172C000
heap
page read and write
137E7FE000
stack
page read and write
196A16BB000
heap
page read and write
196A16D6000
heap
page read and write
196A173C000
heap
page read and write
196A1711000
heap
page read and write
196A1742000
heap
page read and write
196A30B7000
heap
page read and write
196A3224000
heap
page read and write
196A16C0000
heap
page read and write
196A16F6000
heap
page read and write
196A170C000
heap
page read and write
196A1737000
heap
page read and write
196A30A5000
heap
page read and write
196A16FD000
heap
page read and write
196A173A000
heap
page read and write
137E5FE000
stack
page read and write
196A171E000
heap
page read and write
196A16E6000
heap
page read and write
196A1726000
heap
page read and write
196A16E4000
heap
page read and write
196A170B000
heap
page read and write
196A16BC000
heap
page read and write
There are 105 hidden memdumps, click here to show them.