Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\Scan 4405.vbs"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1BB17A7A000
|
heap
|
page read and write
|
||
2A0C15E0000
|
heap
|
page read and write
|
||
20127448000
|
heap
|
page read and write
|
||
2601D4C0000
|
heap
|
page read and write
|
||
1C969CF0000
|
trusted library allocation
|
page read and write
|
||
A40C0FF000
|
stack
|
page read and write
|
||
19615FBE000
|
heap
|
page read and write
|
||
19615FA4000
|
heap
|
page read and write
|
||
2A0C1770000
|
heap
|
page read and write
|
||
2601D5E4000
|
unkown
|
page read and write
|
||
19615629000
|
heap
|
page read and write
|
||
19615F91000
|
heap
|
page read and write
|
||
1BB17A3C000
|
heap
|
page read and write
|
||
24635302000
|
heap
|
page read and write
|
||
19615F94000
|
heap
|
page read and write
|
||
19615F13000
|
heap
|
page read and write
|
||
576F54F000
|
stack
|
page read and write
|
||
2601B610000
|
heap
|
page read and write
|
||
2601D5C0000
|
unkown
|
page read and write
|
||
196153D0000
|
heap
|
page read and write
|
||
2A0C15E1000
|
heap
|
page read and write
|
||
21B3E648000
|
heap
|
page read and write
|
||
196156A9000
|
heap
|
page read and write
|
||
21B3E670000
|
heap
|
page read and write
|
||
6ACA4FB000
|
stack
|
page read and write
|
||
196156DB000
|
heap
|
page read and write
|
||
E19637E000
|
stack
|
page read and write
|
||
E1966F7000
|
stack
|
page read and write
|
||
1961567C000
|
heap
|
page read and write
|
||
196156C1000
|
heap
|
page read and write
|
||
9F71DFB000
|
stack
|
page read and write
|
||
19615F8A000
|
heap
|
page read and write
|
||
19615F69000
|
heap
|
page read and write
|
||
19615688000
|
heap
|
page read and write
|
||
196156B3000
|
heap
|
page read and write
|
||
2601B9F0000
|
heap
|
page read and write
|
||
1E1F8A8C000
|
heap
|
page read and write
|
||
21B3E675000
|
heap
|
page read and write
|
||
2601D4FC000
|
heap
|
page read and write
|
||
1E1F9202000
|
trusted library allocation
|
page read and write
|
||
1E1F8A4B000
|
heap
|
page read and write
|
||
A40C1F9000
|
stack
|
page read and write
|
||
24635110000
|
heap
|
page read and write
|
||
1E1F8A13000
|
heap
|
page read and write
|
||
21B3E650000
|
heap
|
page read and write
|
||
19615DA0000
|
remote allocation
|
page read and write
|
||
2A0C15F0000
|
heap
|
page read and write
|
||
20127470000
|
heap
|
page read and write
|
||
1C968EC0000
|
trusted library allocation
|
page read and write
|
||
19615FBE000
|
heap
|
page read and write
|
||
19615F88000
|
heap
|
page read and write
|
||
1E1F8A51000
|
heap
|
page read and write
|
||
21B3E651000
|
heap
|
page read and write
|
||
55CD07B000
|
stack
|
page read and write
|
||
19615F4F000
|
heap
|
page read and write
|
||
20127502000
|
heap
|
page read and write
|
||
24635202000
|
heap
|
page read and write
|
||
19615F83000
|
heap
|
page read and write
|
||
19616402000
|
heap
|
page read and write
|
||
19615F8A000
|
heap
|
page read and write
|
||
19615F88000
|
heap
|
page read and write
|
||
E19627B000
|
stack
|
page read and write
|
||
19615FAE000
|
heap
|
page read and write
|
||
A40C2FF000
|
stack
|
page read and write
|
||
19616402000
|
heap
|
page read and write
|
||
2A0C15FA000
|
heap
|
page read and write
|
||
24635200000
|
heap
|
page read and write
|
||
19615F76000
|
heap
|
page read and write
|
||
19615540000
|
trusted library allocation
|
page read and write
|
||
21B3E629000
|
heap
|
page read and write
|
||
2A0C15E3000
|
heap
|
page read and write
|
||
9F721FF000
|
stack
|
page read and write
|
||
19616403000
|
heap
|
page read and write
|
||
A40C17F000
|
stack
|
page read and write
|
||
A40C27E000
|
stack
|
page read and write
|
||
201271F0000
|
heap
|
page read and write
|
||
1C968BE0000
|
heap
|
page read and write
|
||
1BB17A5F000
|
heap
|
page read and write
|
||
20127468000
|
heap
|
page read and write
|
||
1BB17B02000
|
heap
|
page read and write
|
||
21B3E5E0000
|
heap
|
page read and write
|
||
19615FAD000
|
heap
|
page read and write
|
||
196156DB000
|
heap
|
page read and write
|
||
2601D4E0000
|
heap
|
page read and write
|
||
1E1F8B13000
|
heap
|
page read and write
|
||
19615FAD000
|
heap
|
page read and write
|
||
2601B9F5000
|
heap
|
page read and write
|
||
1E1F8A3C000
|
heap
|
page read and write
|
||
21B3E580000
|
heap
|
page read and write
|
||
A41D8FD000
|
stack
|
page read and write
|
||
1E1F88B0000
|
heap
|
page read and write
|
||
19615F87000
|
heap
|
page read and write
|
||
19615F63000
|
heap
|
page read and write
|
||
1E1F8B02000
|
heap
|
page read and write
|
||
246351A0000
|
trusted library allocation
|
page read and write
|
||
19615F86000
|
heap
|
page read and write
|
||
19615F88000
|
heap
|
page read and write
|
||
1E1F8A7C000
|
heap
|
page read and write
|
||
19615F00000
|
heap
|
page read and write
|
||
1BB17A62000
|
heap
|
page read and write
|
||
19615F65000
|
heap
|
page read and write
|
||
19615F0F000
|
heap
|
page read and write
|
||
19615F94000
|
heap
|
page read and write
|
||
9F7191F000
|
stack
|
page read and write
|
||
19616402000
|
heap
|
page read and write
|
||
196156AE000
|
heap
|
page read and write
|
||
24635100000
|
heap
|
page read and write
|
||
21B3E647000
|
heap
|
page read and write
|
||
19615F9C000
|
heap
|
page read and write
|
||
19615DA0000
|
remote allocation
|
page read and write
|
||
A40C07A000
|
stack
|
page read and write
|
||
19615FC9000
|
heap
|
page read and write
|
||
6ACA5F7000
|
stack
|
page read and write
|
||
19615DA0000
|
remote allocation
|
page read and write
|
||
1BB17A29000
|
heap
|
page read and write
|
||
2A0C15D2000
|
heap
|
page read and write
|
||
19615E02000
|
heap
|
page read and write
|
||
19615F67000
|
heap
|
page read and write
|
||
21B3E600000
|
heap
|
page read and write
|
||
20127454000
|
heap
|
page read and write
|
||
19615F88000
|
heap
|
page read and write
|
||
576FB77000
|
stack
|
page read and write
|
||
941EEFB000
|
stack
|
page read and write
|
||
20127447000
|
heap
|
page read and write
|
||
2A0C13E0000
|
heap
|
page read and write
|
||
21B3E708000
|
heap
|
page read and write
|
||
19615F87000
|
heap
|
page read and write
|
||
19615702000
|
heap
|
page read and write
|
||
196156C8000
|
heap
|
page read and write
|
||
19615F70000
|
heap
|
page read and write
|
||
A41D4F9000
|
stack
|
page read and write
|
||
9F71EF7000
|
stack
|
page read and write
|
||
20127360000
|
trusted library allocation
|
page read and write
|
||
196156F6000
|
heap
|
page read and write
|
||
2601B5A0000
|
heap
|
page read and write
|
||
19615613000
|
heap
|
page read and write
|
||
1BB17B08000
|
heap
|
page read and write
|
||
A41DCFF000
|
stack
|
page read and write
|
||
19615F65000
|
heap
|
page read and write
|
||
7E1577F000
|
stack
|
page read and write
|
||
19615F70000
|
heap
|
page read and write
|
||
1E1F8A88000
|
heap
|
page read and write
|
||
1C968F60000
|
trusted library allocation
|
page read and write
|
||
1BB17B13000
|
heap
|
page read and write
|
||
1C969AE0000
|
trusted library allocation
|
page read and write
|
||
19615F91000
|
heap
|
page read and write
|
||
1C968FE0000
|
heap
|
page read and write
|
||
1C968EB0000
|
trusted library allocation
|
page read and write
|
||
E1967FE000
|
stack
|
page read and write
|
||
55CD2FE000
|
stack
|
page read and write
|
||
1E1F8910000
|
heap
|
page read and write
|
||
2601D4C5000
|
heap
|
page read and write
|
||
E1968FF000
|
stack
|
page read and write
|
||
2601D4D2000
|
heap
|
page read and write
|
||
19615F83000
|
heap
|
page read and write
|
||
2A0C1510000
|
heap
|
page read and write
|
||
19615FA6000
|
heap
|
page read and write
|
||
2601D4C9000
|
heap
|
page read and write
|
||
7E1557B000
|
stack
|
page read and write
|
||
21B3E674000
|
heap
|
page read and write
|
||
1C968DCC000
|
heap
|
page read and write
|
||
19615600000
|
heap
|
page read and write
|
||
19615FC3000
|
heap
|
page read and write
|
||
21B3E570000
|
heap
|
page read and write
|
||
1E1F8A54000
|
heap
|
page read and write
|
||
19615F6E000
|
heap
|
page read and write
|
||
20127400000
|
heap
|
page read and write
|
||
576FC78000
|
stack
|
page read and write
|
||
576F8FD000
|
stack
|
page read and write
|
||
941E9CC000
|
stack
|
page read and write
|
||
2A0C15C0000
|
heap
|
page read and write
|
||
9F720FF000
|
stack
|
page read and write
|
||
19615F11000
|
heap
|
page read and write
|
||
6ACA6FE000
|
stack
|
page read and write
|
||
941F1FF000
|
stack
|
page read and write
|
||
1C968D90000
|
heap
|
page read and write
|
||
19615F83000
|
heap
|
page read and write
|
||
1BB17B00000
|
heap
|
page read and write
|
||
1C968D20000
|
heap
|
page read and write
|
||
21B3E64C000
|
heap
|
page read and write
|
||
19615FAD000
|
heap
|
page read and write
|
||
576FD7F000
|
stack
|
page read and write
|
||
1C968D80000
|
heap
|
page read and write
|
||
941F0FB000
|
stack
|
page read and write
|
||
19615F83000
|
heap
|
page read and write
|
||
1E1F8A29000
|
heap
|
page read and write
|
||
1C968BF0000
|
trusted library allocation
|
page read and write
|
||
19615F8A000
|
heap
|
page read and write
|
||
19615F8A000
|
heap
|
page read and write
|
||
9F7199E000
|
stack
|
page read and write
|
||
19615F8A000
|
heap
|
page read and write
|
||
576FEFF000
|
unkown
|
page read and write
|
||
24635C02000
|
trusted library allocation
|
page read and write
|
||
21B3E655000
|
heap
|
page read and write
|
||
A41DBFE000
|
stack
|
page read and write
|
||
55CD1F9000
|
stack
|
page read and write
|
||
1E1F8B08000
|
heap
|
page read and write
|
||
55CD379000
|
stack
|
page read and write
|
||
19615F83000
|
heap
|
page read and write
|
||
1C968F20000
|
trusted library allocation
|
page read and write
|
||
7E1527B000
|
stack
|
page read and write
|
||
20127500000
|
heap
|
page read and write
|
||
19615F88000
|
heap
|
page read and write
|
||
E19647B000
|
stack
|
page read and write
|
||
1E1F8A70000
|
heap
|
page read and write
|
||
20127200000
|
heap
|
page read and write
|
||
19615670000
|
heap
|
page read and write
|
||
55CD279000
|
stack
|
page read and write
|
||
1C968D40000
|
heap
|
page read and write
|
||
1C968F70000
|
heap
|
page readonly
|
||
19615F8A000
|
heap
|
page read and write
|
||
19615F83000
|
heap
|
page read and write
|
||
19615FC3000
|
heap
|
page read and write
|
||
2601D5D1000
|
unkown
|
page read and write
|
||
2601D4C3000
|
heap
|
page read and write
|
||
21B3F002000
|
trusted library allocation
|
page read and write
|
||
21B3EE80000
|
trusted library allocation
|
page read and write
|
||
24635170000
|
heap
|
page read and write
|
||
19615FB4000
|
heap
|
page read and write
|
||
19616419000
|
heap
|
page read and write
|
||
19615FBE000
|
heap
|
page read and write
|
||
19615F6E000
|
heap
|
page read and write
|
||
19615F5D000
|
heap
|
page read and write
|
||
2601D500000
|
heap
|
page read and write
|
||
7E1587F000
|
stack
|
page read and write
|
||
19615F9F000
|
heap
|
page read and write
|
||
20127429000
|
heap
|
page read and write
|
||
2012743C000
|
heap
|
page read and write
|
||
1C968FF0000
|
trusted library allocation
|
page read and write
|
||
19615440000
|
heap
|
page read and write
|
||
576FA78000
|
stack
|
page read and write
|
||
1C968DCC000
|
heap
|
page read and write
|
||
19615F65000
|
heap
|
page read and write
|
||
1BB18402000
|
trusted library allocation
|
page read and write
|
||
19616402000
|
heap
|
page read and write
|
||
21B3E63C000
|
heap
|
page read and write
|
||
2A0C15E8000
|
heap
|
page read and write
|
||
19615FA6000
|
heap
|
page read and write
|
||
2A0C15FE000
|
heap
|
page read and write
|
||
2601D4CB000
|
heap
|
page read and write
|
||
21B3E613000
|
heap
|
page read and write
|
||
1BB179D0000
|
heap
|
page read and write
|
||
19615F6F000
|
heap
|
page read and write
|
||
576FE79000
|
stack
|
page read and write
|
||
2601D4C4000
|
heap
|
page read and write
|
||
19615F88000
|
heap
|
page read and write
|
||
19615F88000
|
heap
|
page read and write
|
||
6ACA7FF000
|
stack
|
page read and write
|
||
2A0C15F0000
|
heap
|
page read and write
|
||
19615F83000
|
heap
|
page read and write
|
||
A40C37C000
|
stack
|
page read and write
|
||
19616402000
|
heap
|
page read and write
|
||
19615F8A000
|
heap
|
page read and write
|
||
19615FA5000
|
heap
|
page read and write
|
||
2601B63A000
|
heap
|
page read and write
|
||
2601D4F1000
|
heap
|
page read and write
|
||
19615FAE000
|
heap
|
page read and write
|
||
19615F88000
|
heap
|
page read and write
|
||
19615F65000
|
heap
|
page read and write
|
||
2601D4D5000
|
heap
|
page read and write
|
||
19615F6C000
|
heap
|
page read and write
|
||
2A0C15D7000
|
heap
|
page read and write
|
||
19616420000
|
heap
|
page read and write
|
||
19615F6E000
|
heap
|
page read and write
|
||
2601D170000
|
heap
|
page read and write
|
||
19615F88000
|
heap
|
page read and write
|
||
2A0C15FA000
|
heap
|
page read and write
|
||
196153E0000
|
heap
|
page read and write
|
||
19615FBE000
|
heap
|
page read and write
|
||
19615F8A000
|
heap
|
page read and write
|
||
19615F65000
|
heap
|
page read and write
|
||
19616403000
|
heap
|
page read and write
|
||
21B3E713000
|
heap
|
page read and write
|
||
2463527A000
|
heap
|
page read and write
|
||
1BB17A83000
|
heap
|
page read and write
|
||
2601B722000
|
heap
|
page read and write
|
||
1BB17A60000
|
heap
|
page read and write
|
||
9F71FFE000
|
stack
|
page read and write
|
||
19615713000
|
heap
|
page read and write
|
||
55CD3F9000
|
stack
|
page read and write
|
||
1C968FE5000
|
heap
|
page read and write
|
||
2A0C15D6000
|
heap
|
page read and write
|
||
21B3E702000
|
heap
|
page read and write
|
||
19615F85000
|
heap
|
page read and write
|
||
20127508000
|
heap
|
page read and write
|
||
1C968D88000
|
heap
|
page read and write
|
||
E1965FB000
|
stack
|
page read and write
|
||
6AC9F9E000
|
stack
|
page read and write
|
||
2601B630000
|
heap
|
page read and write
|
||
24635300000
|
heap
|
page read and write
|
||
E1964FF000
|
stack
|
page read and write
|
||
2A0C1530000
|
heap
|
page read and write
|
||
2601D4E5000
|
heap
|
page read and write
|
||
19615F9C000
|
heap
|
page read and write
|
||
2601B636000
|
heap
|
page read and write
|
||
1BB17970000
|
heap
|
page read and write
|
||
1BB17A13000
|
heap
|
page read and write
|
||
1C968F90000
|
trusted library allocation
|
page read and write
|
||
1E1F8A00000
|
heap
|
page read and write
|
||
20127486000
|
heap
|
page read and write
|
||
2601B800000
|
heap
|
page read and write
|
||
1BB18270000
|
trusted library allocation
|
page read and write
|
||
21B3E681000
|
heap
|
page read and write
|
||
1BB17960000
|
heap
|
page read and write
|
||
2601D4C6000
|
heap
|
page read and write
|
||
19615F85000
|
heap
|
page read and write
|
||
19615F9F000
|
heap
|
page read and write
|
||
1C968DCC000
|
heap
|
page read and write
|
||
1E1F8A4E000
|
heap
|
page read and write
|
||
19615F97000
|
heap
|
page read and write
|
||
2A0C15CB000
|
heap
|
page read and write
|
||
2601D500000
|
heap
|
page read and write
|
||
2A0C15E5000
|
heap
|
page read and write
|
||
E1962FE000
|
stack
|
page read and write
|
||
6ACA27E000
|
stack
|
page read and write
|
||
20127468000
|
heap
|
page read and write
|
||
941EFFC000
|
stack
|
page read and write
|
||
19615FAD000
|
heap
|
page read and write
|
||
196156EC000
|
heap
|
page read and write
|
||
1C968FE9000
|
heap
|
page read and write
|
||
A41D9FF000
|
stack
|
page read and write
|
||
19615F70000
|
heap
|
page read and write
|
||
20127513000
|
heap
|
page read and write
|
||
19615F69000
|
heap
|
page read and write
|
||
6AC9F1B000
|
stack
|
page read and write
|
||
1E1F91B0000
|
trusted library allocation
|
page read and write
|
||
19615F6F000
|
heap
|
page read and write
|
||
2463523E000
|
heap
|
page read and write
|
||
19615F69000
|
heap
|
page read and write
|
||
19615F88000
|
heap
|
page read and write
|
||
1BB17A54000
|
heap
|
page read and write
|
||
19615F9C000
|
heap
|
page read and write
|
||
19616402000
|
heap
|
page read and write
|
||
2601D4FC000
|
heap
|
page read and write
|
||
1E1F8A47000
|
heap
|
page read and write
|
||
19615681000
|
heap
|
page read and write
|
||
19615F70000
|
heap
|
page read and write
|
||
2A0C15F0000
|
heap
|
page read and write
|
||
2A0C15FA000
|
heap
|
page read and write
|
||
19616400000
|
heap
|
page read and write
|
||
19615F69000
|
heap
|
page read and write
|
||
576F5CF000
|
stack
|
page read and write
|
||
19615F83000
|
heap
|
page read and write
|
||
2601D64E000
|
unkown
|
page read and write
|
||
2A0C15FF000
|
heap
|
page read and write
|
||
24635257000
|
heap
|
page read and write
|
||
7E1537E000
|
stack
|
page read and write
|
||
19615F9F000
|
heap
|
page read and write
|
||
576F97F000
|
stack
|
page read and write
|
||
1BB17A65000
|
heap
|
page read and write
|
||
20127260000
|
heap
|
page read and write
|
||
1E1F8A48000
|
heap
|
page read and write
|
||
1E1F88A0000
|
heap
|
page read and write
|
||
24635228000
|
heap
|
page read and write
|
||
20127413000
|
heap
|
page read and write
|
||
196156E3000
|
heap
|
page read and write
|
||
7E152FF000
|
stack
|
page read and write
|
||
24635313000
|
heap
|
page read and write
|
||
1BB17A5C000
|
heap
|
page read and write
|
||
19615F9C000
|
heap
|
page read and write
|
||
19615F9F000
|
heap
|
page read and write
|
||
1BB17A63000
|
heap
|
page read and write
|
||
1BB17A00000
|
heap
|
page read and write
|
||
2A0C15E7000
|
heap
|
page read and write
|
||
19615F94000
|
heap
|
page read and write
|
||
1C968F80000
|
trusted library allocation
|
page read and write
|
||
19615F8A000
|
heap
|
page read and write
|
||
7E15677000
|
stack
|
page read and write
|
||
21B3E700000
|
heap
|
page read and write
|
||
2012744E000
|
heap
|
page read and write
|
||
196156C9000
|
heap
|
page read and write
|
||
20127479000
|
heap
|
page read and write
|
||
576F4CB000
|
stack
|
page read and write
|
||
1E1F8B00000
|
heap
|
page read and write
|
||
19615F83000
|
heap
|
page read and write
|
||
1C968DC4000
|
heap
|
page read and write
|
||
24635213000
|
heap
|
page read and write
|
||
20127C02000
|
trusted library allocation
|
page read and write
|
||
2A0C1775000
|
heap
|
page read and write
|
||
1961563C000
|
heap
|
page read and write
|
||
9F7189B000
|
stack
|
page read and write
|
||
6ACA3FF000
|
stack
|
page read and write
|
||
19616402000
|
heap
|
page read and write
|
There are 373 hidden memdumps, click here to show them.