Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Document-v23-08-15.js"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://fwaax.life/merd.php
|
104.21.20.51
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
fwaax.life
|
104.21.20.51
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.20.51
|
fwaax.life
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
|
JScriptSetScriptStateStarted
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1623F145000
|
heap
|
page read and write
|
||
16240C07000
|
heap
|
page read and write
|
||
1623EEF2000
|
heap
|
page read and write
|
||
16240C00000
|
heap
|
page read and write
|
||
1623EEAD000
|
heap
|
page read and write
|
||
2062CFE000
|
stack
|
page read and write
|
||
1623EEF6000
|
heap
|
page read and write
|
||
162407A0000
|
heap
|
page read and write
|
||
1623EF0C000
|
heap
|
page read and write
|
||
1623EF09000
|
heap
|
page read and write
|
||
1623EEC7000
|
heap
|
page read and write
|
||
1623F14A000
|
heap
|
page read and write
|
||
20632FE000
|
stack
|
page read and write
|
||
1623EF02000
|
heap
|
page read and write
|
||
1623EEBE000
|
heap
|
page read and write
|
||
1623EED8000
|
heap
|
page read and write
|
||
1623EED8000
|
heap
|
page read and write
|
||
1623ED60000
|
heap
|
page read and write
|
||
162407A4000
|
heap
|
page read and write
|
||
1623EED2000
|
heap
|
page read and write
|
||
1623EEAE000
|
heap
|
page read and write
|
||
1623EEC1000
|
heap
|
page read and write
|
||
1623EED5000
|
heap
|
page read and write
|
||
1623EEF6000
|
heap
|
page read and write
|
||
1623F14B000
|
heap
|
page read and write
|
||
1623EF02000
|
heap
|
page read and write
|
||
1623EEFA000
|
heap
|
page read and write
|
||
1623EE9E000
|
heap
|
page read and write
|
||
1623EE9F000
|
heap
|
page read and write
|
||
2062DFF000
|
stack
|
page read and write
|
||
1623EE40000
|
heap
|
page read and write
|
||
20629FE000
|
stack
|
page read and write
|
||
1623EEF6000
|
heap
|
page read and write
|
||
1623EECC000
|
heap
|
page read and write
|
||
20628F9000
|
stack
|
page read and write
|
||
1623F140000
|
heap
|
page read and write
|
||
1623EE8D000
|
heap
|
page read and write
|
||
1623EEC7000
|
heap
|
page read and write
|
||
1623EEC8000
|
heap
|
page read and write
|
||
1623EF10000
|
heap
|
page read and write
|
||
1623EECC000
|
heap
|
page read and write
|
||
16242520000
|
heap
|
page read and write
|
||
1623EE9A000
|
heap
|
page read and write
|
||
1623EEB2000
|
heap
|
page read and write
|
||
16240C02000
|
heap
|
page read and write
|
||
1623EEA5000
|
heap
|
page read and write
|
||
16240C14000
|
heap
|
page read and write
|
||
1623EED5000
|
heap
|
page read and write
|
||
1623EEF6000
|
heap
|
page read and write
|
||
1623EEFF000
|
heap
|
page read and write
|
||
1623EEFF000
|
heap
|
page read and write
|
||
1623EE91000
|
heap
|
page read and write
|
||
2062FFE000
|
stack
|
page read and write
|
||
1623EE70000
|
heap
|
page read and write
|
||
1623EEBD000
|
heap
|
page read and write
|
||
16240C14000
|
heap
|
page read and write
|
||
1623EEA5000
|
heap
|
page read and write
|
||
16240C02000
|
heap
|
page read and write
|
||
1623F14D000
|
heap
|
page read and write
|
||
1623EF70000
|
heap
|
page read and write
|
||
162426A0000
|
trusted library allocation
|
page read and write
|
||
1623EEFF000
|
heap
|
page read and write
|
||
2062AFE000
|
stack
|
page read and write
|
||
1623EED8000
|
heap
|
page read and write
|
||
1623EEFF000
|
heap
|
page read and write
|
||
1623EEFA000
|
heap
|
page read and write
|
||
1623EEFF000
|
heap
|
page read and write
|
||
1623EEFF000
|
heap
|
page read and write
|
||
1623EE9B000
|
heap
|
page read and write
|
||
16240C01000
|
heap
|
page read and write
|
||
16240C06000
|
heap
|
page read and write
|
||
1623EED8000
|
heap
|
page read and write
|
||
1623EEB0000
|
heap
|
page read and write
|
||
1623EED4000
|
heap
|
page read and write
|
||
2062EFF000
|
stack
|
page read and write
|
||
16240C0B000
|
heap
|
page read and write
|
||
20630FE000
|
stack
|
page read and write
|
||
16240C0B000
|
heap
|
page read and write
|
There are 68 hidden memdumps, click here to show them.