Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\download.js"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1A7FE260000
|
heap
|
page read and write
|
||
1A7FE23F000
|
heap
|
page read and write
|
||
1A7FE247000
|
heap
|
page read and write
|
||
1A7FE248000
|
heap
|
page read and write
|
||
1A7FE1EF000
|
heap
|
page read and write
|
||
1A7FE2C0000
|
heap
|
page read and write
|
||
1A7FFF90000
|
heap
|
page read and write
|
||
1A7FE217000
|
heap
|
page read and write
|
||
1A7FE234000
|
heap
|
page read and write
|
||
1A7FFB34000
|
heap
|
page read and write
|
||
1A7FE4A5000
|
heap
|
page read and write
|
||
1A7FE1E2000
|
heap
|
page read and write
|
||
1A7FE1C0000
|
heap
|
page read and write
|
||
1A7FE4AC000
|
heap
|
page read and write
|
||
1A7FE1FF000
|
heap
|
page read and write
|
||
1A7FE23F000
|
heap
|
page read and write
|
||
9EE04FE000
|
stack
|
page read and write
|
||
9EDFDFD000
|
stack
|
page read and write
|
||
9EE00FE000
|
stack
|
page read and write
|
||
9EE01FE000
|
stack
|
page read and write
|
||
1A781960000
|
trusted library allocation
|
page read and write
|
||
1A7FE202000
|
heap
|
page read and write
|
||
9EE02FE000
|
stack
|
page read and write
|
||
1A7FE247000
|
heap
|
page read and write
|
||
1A7FE23F000
|
heap
|
page read and write
|
||
1A7FE200000
|
heap
|
page read and write
|
||
1A7FE234000
|
heap
|
page read and write
|
||
1A7FE4A9000
|
heap
|
page read and write
|
||
1A7FE1E2000
|
heap
|
page read and write
|
||
1A7FE247000
|
heap
|
page read and write
|
||
1A7FE1A0000
|
heap
|
page read and write
|
||
1A7FE23F000
|
heap
|
page read and write
|
||
1A7FE247000
|
heap
|
page read and write
|
||
1A7FE244000
|
heap
|
page read and write
|
||
1A7FE234000
|
heap
|
page read and write
|
||
1A7FE1EF000
|
heap
|
page read and write
|
||
1A7FE20C000
|
heap
|
page read and write
|
||
1A7FE23F000
|
heap
|
page read and write
|
||
1A780001000
|
heap
|
page read and write
|
||
1A7FE1EF000
|
heap
|
page read and write
|
||
1A7FE1DD000
|
heap
|
page read and write
|
||
1A780000000
|
heap
|
page read and write
|
||
1A7FE248000
|
heap
|
page read and write
|
||
9EDFCFA000
|
stack
|
page read and write
|
||
1A7FE0C0000
|
heap
|
page read and write
|
||
1A7FE24F000
|
heap
|
page read and write
|
||
1A7FE247000
|
heap
|
page read and write
|
||
1A7FE23A000
|
heap
|
page read and write
|
||
1A7FE247000
|
heap
|
page read and write
|
||
1A7FE220000
|
heap
|
page read and write
|
||
1A7FE4A0000
|
heap
|
page read and write
|
||
1A7FE20C000
|
heap
|
page read and write
|
||
9EE03FE000
|
stack
|
page read and write
|
||
9EDFEFE000
|
stack
|
page read and write
|
||
1A7FE23F000
|
heap
|
page read and write
|
||
1A7FFB30000
|
heap
|
page read and write
|
||
1A7FE234000
|
heap
|
page read and write
|
||
1A7FE23C000
|
heap
|
page read and write
|
||
1A7FE1EE000
|
heap
|
page read and write
|
||
1A7FE247000
|
heap
|
page read and write
|
There are 50 hidden memdumps, click here to show them.