IOC Report
Scan 4405.vbs

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\Scan 4405.vbs"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1BB17A7A000
heap
page read and write
2A0C15E0000
heap
page read and write
20127448000
heap
page read and write
2601D4C0000
heap
page read and write
1C969CF0000
trusted library allocation
page read and write
A40C0FF000
stack
page read and write
19615FBE000
heap
page read and write
19615FA4000
heap
page read and write
2A0C1770000
heap
page read and write
2601D5E4000
unkown
page read and write
19615629000
heap
page read and write
19615F91000
heap
page read and write
1BB17A3C000
heap
page read and write
24635302000
heap
page read and write
19615F94000
heap
page read and write
19615F13000
heap
page read and write
576F54F000
stack
page read and write
2601B610000
heap
page read and write
2601D5C0000
unkown
page read and write
196153D0000
heap
page read and write
2A0C15E1000
heap
page read and write
21B3E648000
heap
page read and write
196156A9000
heap
page read and write
21B3E670000
heap
page read and write
6ACA4FB000
stack
page read and write
196156DB000
heap
page read and write
E19637E000
stack
page read and write
E1966F7000
stack
page read and write
1961567C000
heap
page read and write
196156C1000
heap
page read and write
9F71DFB000
stack
page read and write
19615F8A000
heap
page read and write
19615F69000
heap
page read and write
19615688000
heap
page read and write
196156B3000
heap
page read and write
2601B9F0000
heap
page read and write
1E1F8A8C000
heap
page read and write
21B3E675000
heap
page read and write
2601D4FC000
heap
page read and write
1E1F9202000
trusted library allocation
page read and write
1E1F8A4B000
heap
page read and write
A40C1F9000
stack
page read and write
24635110000
heap
page read and write
1E1F8A13000
heap
page read and write
21B3E650000
heap
page read and write
19615DA0000
remote allocation
page read and write
2A0C15F0000
heap
page read and write
20127470000
heap
page read and write
1C968EC0000
trusted library allocation
page read and write
19615FBE000
heap
page read and write
19615F88000
heap
page read and write
1E1F8A51000
heap
page read and write
21B3E651000
heap
page read and write
55CD07B000
stack
page read and write
19615F4F000
heap
page read and write
20127502000
heap
page read and write
24635202000
heap
page read and write
19615F83000
heap
page read and write
19616402000
heap
page read and write
19615F8A000
heap
page read and write
19615F88000
heap
page read and write
E19627B000
stack
page read and write
19615FAE000
heap
page read and write
A40C2FF000
stack
page read and write
19616402000
heap
page read and write
2A0C15FA000
heap
page read and write
24635200000
heap
page read and write
19615F76000
heap
page read and write
19615540000
trusted library allocation
page read and write
21B3E629000
heap
page read and write
2A0C15E3000
heap
page read and write
9F721FF000
stack
page read and write
19616403000
heap
page read and write
A40C17F000
stack
page read and write
A40C27E000
stack
page read and write
201271F0000
heap
page read and write
1C968BE0000
heap
page read and write
1BB17A5F000
heap
page read and write
20127468000
heap
page read and write
1BB17B02000
heap
page read and write
21B3E5E0000
heap
page read and write
19615FAD000
heap
page read and write
196156DB000
heap
page read and write
2601D4E0000
heap
page read and write
1E1F8B13000
heap
page read and write
19615FAD000
heap
page read and write
2601B9F5000
heap
page read and write
1E1F8A3C000
heap
page read and write
21B3E580000
heap
page read and write
A41D8FD000
stack
page read and write
1E1F88B0000
heap
page read and write
19615F87000
heap
page read and write
19615F63000
heap
page read and write
1E1F8B02000
heap
page read and write
246351A0000
trusted library allocation
page read and write
19615F86000
heap
page read and write
19615F88000
heap
page read and write
1E1F8A7C000
heap
page read and write
19615F00000
heap
page read and write
1BB17A62000
heap
page read and write
19615F65000
heap
page read and write
19615F0F000
heap
page read and write
19615F94000
heap
page read and write
9F7191F000
stack
page read and write
19616402000
heap
page read and write
196156AE000
heap
page read and write
24635100000
heap
page read and write
21B3E647000
heap
page read and write
19615F9C000
heap
page read and write
19615DA0000
remote allocation
page read and write
A40C07A000
stack
page read and write
19615FC9000
heap
page read and write
6ACA5F7000
stack
page read and write
19615DA0000
remote allocation
page read and write
1BB17A29000
heap
page read and write
2A0C15D2000
heap
page read and write
19615E02000
heap
page read and write
19615F67000
heap
page read and write
21B3E600000
heap
page read and write
20127454000
heap
page read and write
19615F88000
heap
page read and write
576FB77000
stack
page read and write
941EEFB000
stack
page read and write
20127447000
heap
page read and write
2A0C13E0000
heap
page read and write
21B3E708000
heap
page read and write
19615F87000
heap
page read and write
19615702000
heap
page read and write
196156C8000
heap
page read and write
19615F70000
heap
page read and write
A41D4F9000
stack
page read and write
9F71EF7000
stack
page read and write
20127360000
trusted library allocation
page read and write
196156F6000
heap
page read and write
2601B5A0000
heap
page read and write
19615613000
heap
page read and write
1BB17B08000
heap
page read and write
A41DCFF000
stack
page read and write
19615F65000
heap
page read and write
7E1577F000
stack
page read and write
19615F70000
heap
page read and write
1E1F8A88000
heap
page read and write
1C968F60000
trusted library allocation
page read and write
1BB17B13000
heap
page read and write
1C969AE0000
trusted library allocation
page read and write
19615F91000
heap
page read and write
1C968FE0000
heap
page read and write
1C968EB0000
trusted library allocation
page read and write
E1967FE000
stack
page read and write
55CD2FE000
stack
page read and write
1E1F8910000
heap
page read and write
2601D4C5000
heap
page read and write
E1968FF000
stack
page read and write
2601D4D2000
heap
page read and write
19615F83000
heap
page read and write
2A0C1510000
heap
page read and write
19615FA6000
heap
page read and write
2601D4C9000
heap
page read and write
7E1557B000
stack
page read and write
21B3E674000
heap
page read and write
1C968DCC000
heap
page read and write
19615600000
heap
page read and write
19615FC3000
heap
page read and write
21B3E570000
heap
page read and write
1E1F8A54000
heap
page read and write
19615F6E000
heap
page read and write
20127400000
heap
page read and write
576FC78000
stack
page read and write
576F8FD000
stack
page read and write
941E9CC000
stack
page read and write
2A0C15C0000
heap
page read and write
9F720FF000
stack
page read and write
19615F11000
heap
page read and write
6ACA6FE000
stack
page read and write
941F1FF000
stack
page read and write
1C968D90000
heap
page read and write
19615F83000
heap
page read and write
1BB17B00000
heap
page read and write
1C968D20000
heap
page read and write
21B3E64C000
heap
page read and write
19615FAD000
heap
page read and write
576FD7F000
stack
page read and write
1C968D80000
heap
page read and write
941F0FB000
stack
page read and write
19615F83000
heap
page read and write
1E1F8A29000
heap
page read and write
1C968BF0000
trusted library allocation
page read and write
19615F8A000
heap
page read and write
19615F8A000
heap
page read and write
9F7199E000
stack
page read and write
19615F8A000
heap
page read and write
576FEFF000
unkown
page read and write
24635C02000
trusted library allocation
page read and write
21B3E655000
heap
page read and write
A41DBFE000
stack
page read and write
55CD1F9000
stack
page read and write
1E1F8B08000
heap
page read and write
55CD379000
stack
page read and write
19615F83000
heap
page read and write
1C968F20000
trusted library allocation
page read and write
7E1527B000
stack
page read and write
20127500000
heap
page read and write
19615F88000
heap
page read and write
E19647B000
stack
page read and write
1E1F8A70000
heap
page read and write
20127200000
heap
page read and write
19615670000
heap
page read and write
55CD279000
stack
page read and write
1C968D40000
heap
page read and write
1C968F70000
heap
page readonly
19615F8A000
heap
page read and write
19615F83000
heap
page read and write
19615FC3000
heap
page read and write
2601D5D1000
unkown
page read and write
2601D4C3000
heap
page read and write
21B3F002000
trusted library allocation
page read and write
21B3EE80000
trusted library allocation
page read and write
24635170000
heap
page read and write
19615FB4000
heap
page read and write
19616419000
heap
page read and write
19615FBE000
heap
page read and write
19615F6E000
heap
page read and write
19615F5D000
heap
page read and write
2601D500000
heap
page read and write
7E1587F000
stack
page read and write
19615F9F000
heap
page read and write
20127429000
heap
page read and write
2012743C000
heap
page read and write
1C968FF0000
trusted library allocation
page read and write
19615440000
heap
page read and write
576FA78000
stack
page read and write
1C968DCC000
heap
page read and write
19615F65000
heap
page read and write
1BB18402000
trusted library allocation
page read and write
19616402000
heap
page read and write
21B3E63C000
heap
page read and write
2A0C15E8000
heap
page read and write
19615FA6000
heap
page read and write
2A0C15FE000
heap
page read and write
2601D4CB000
heap
page read and write
21B3E613000
heap
page read and write
1BB179D0000
heap
page read and write
19615F6F000
heap
page read and write
576FE79000
stack
page read and write
2601D4C4000
heap
page read and write
19615F88000
heap
page read and write
19615F88000
heap
page read and write
6ACA7FF000
stack
page read and write
2A0C15F0000
heap
page read and write
19615F83000
heap
page read and write
A40C37C000
stack
page read and write
19616402000
heap
page read and write
19615F8A000
heap
page read and write
19615FA5000
heap
page read and write
2601B63A000
heap
page read and write
2601D4F1000
heap
page read and write
19615FAE000
heap
page read and write
19615F88000
heap
page read and write
19615F65000
heap
page read and write
2601D4D5000
heap
page read and write
19615F6C000
heap
page read and write
2A0C15D7000
heap
page read and write
19616420000
heap
page read and write
19615F6E000
heap
page read and write
2601D170000
heap
page read and write
19615F88000
heap
page read and write
2A0C15FA000
heap
page read and write
196153E0000
heap
page read and write
19615FBE000
heap
page read and write
19615F8A000
heap
page read and write
19615F65000
heap
page read and write
19616403000
heap
page read and write
21B3E713000
heap
page read and write
2463527A000
heap
page read and write
1BB17A83000
heap
page read and write
2601B722000
heap
page read and write
1BB17A60000
heap
page read and write
9F71FFE000
stack
page read and write
19615713000
heap
page read and write
55CD3F9000
stack
page read and write
1C968FE5000
heap
page read and write
2A0C15D6000
heap
page read and write
21B3E702000
heap
page read and write
19615F85000
heap
page read and write
20127508000
heap
page read and write
1C968D88000
heap
page read and write
E1965FB000
stack
page read and write
6AC9F9E000
stack
page read and write
2601B630000
heap
page read and write
24635300000
heap
page read and write
E1964FF000
stack
page read and write
2A0C1530000
heap
page read and write
2601D4E5000
heap
page read and write
19615F9C000
heap
page read and write
2601B636000
heap
page read and write
1BB17970000
heap
page read and write
1BB17A13000
heap
page read and write
1C968F90000
trusted library allocation
page read and write
1E1F8A00000
heap
page read and write
20127486000
heap
page read and write
2601B800000
heap
page read and write
1BB18270000
trusted library allocation
page read and write
21B3E681000
heap
page read and write
1BB17960000
heap
page read and write
2601D4C6000
heap
page read and write
19615F85000
heap
page read and write
19615F9F000
heap
page read and write
1C968DCC000
heap
page read and write
1E1F8A4E000
heap
page read and write
19615F97000
heap
page read and write
2A0C15CB000
heap
page read and write
2601D500000
heap
page read and write
2A0C15E5000
heap
page read and write
E1962FE000
stack
page read and write
6ACA27E000
stack
page read and write
20127468000
heap
page read and write
941EFFC000
stack
page read and write
19615FAD000
heap
page read and write
196156EC000
heap
page read and write
1C968FE9000
heap
page read and write
A41D9FF000
stack
page read and write
19615F70000
heap
page read and write
20127513000
heap
page read and write
19615F69000
heap
page read and write
6AC9F1B000
stack
page read and write
1E1F91B0000
trusted library allocation
page read and write
19615F6F000
heap
page read and write
2463523E000
heap
page read and write
19615F69000
heap
page read and write
19615F88000
heap
page read and write
1BB17A54000
heap
page read and write
19615F9C000
heap
page read and write
19616402000
heap
page read and write
2601D4FC000
heap
page read and write
1E1F8A47000
heap
page read and write
19615681000
heap
page read and write
19615F70000
heap
page read and write
2A0C15F0000
heap
page read and write
2A0C15FA000
heap
page read and write
19616400000
heap
page read and write
19615F69000
heap
page read and write
576F5CF000
stack
page read and write
19615F83000
heap
page read and write
2601D64E000
unkown
page read and write
2A0C15FF000
heap
page read and write
24635257000
heap
page read and write
7E1537E000
stack
page read and write
19615F9F000
heap
page read and write
576F97F000
stack
page read and write
1BB17A65000
heap
page read and write
20127260000
heap
page read and write
1E1F8A48000
heap
page read and write
1E1F88A0000
heap
page read and write
24635228000
heap
page read and write
20127413000
heap
page read and write
196156E3000
heap
page read and write
7E152FF000
stack
page read and write
24635313000
heap
page read and write
1BB17A5C000
heap
page read and write
19615F9C000
heap
page read and write
19615F9F000
heap
page read and write
1BB17A63000
heap
page read and write
1BB17A00000
heap
page read and write
2A0C15E7000
heap
page read and write
19615F94000
heap
page read and write
1C968F80000
trusted library allocation
page read and write
19615F8A000
heap
page read and write
7E15677000
stack
page read and write
21B3E700000
heap
page read and write
2012744E000
heap
page read and write
196156C9000
heap
page read and write
20127479000
heap
page read and write
576F4CB000
stack
page read and write
1E1F8B00000
heap
page read and write
19615F83000
heap
page read and write
1C968DC4000
heap
page read and write
24635213000
heap
page read and write
20127C02000
trusted library allocation
page read and write
2A0C1775000
heap
page read and write
1961563C000
heap
page read and write
9F7189B000
stack
page read and write
6ACA3FF000
stack
page read and write
19616402000
heap
page read and write
There are 373 hidden memdumps, click here to show them.