Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\download.js"
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2623A93E000
|
heap
|
page read and write
|
||
A9965FF000
|
stack
|
page read and write
|
||
A996AFE000
|
stack
|
page read and write
|
||
2623A8FF000
|
heap
|
page read and write
|
||
2623A93E000
|
heap
|
page read and write
|
||
2623A95E000
|
heap
|
page read and write
|
||
2623A8DC000
|
heap
|
page read and write
|
||
2623A947000
|
heap
|
page read and write
|
||
A9964FE000
|
stack
|
page read and write
|
||
2623E0A0000
|
trusted library allocation
|
page read and write
|
||
2623A860000
|
heap
|
page read and write
|
||
2623DF80000
|
heap
|
page read and write
|
||
2623A920000
|
heap
|
page read and write
|
||
2623A93E000
|
heap
|
page read and write
|
||
2623AC15000
|
heap
|
page read and write
|
||
2623A93E000
|
heap
|
page read and write
|
||
A9967FE000
|
stack
|
page read and write
|
||
2623A93B000
|
heap
|
page read and write
|
||
2623A933000
|
heap
|
page read and write
|
||
2623A916000
|
heap
|
page read and write
|
||
2623A8C0000
|
heap
|
page read and write
|
||
2623A933000
|
heap
|
page read and write
|
||
2623A94F000
|
heap
|
page read and write
|
||
2623A8E1000
|
heap
|
page read and write
|
||
2623A8E1000
|
heap
|
page read and write
|
||
2623A943000
|
heap
|
page read and write
|
||
2623A8EB000
|
heap
|
page read and write
|
||
2623C700000
|
heap
|
page read and write
|
||
2623AC10000
|
heap
|
page read and write
|
||
2623A94D000
|
heap
|
page read and write
|
||
2623A93A000
|
heap
|
page read and write
|
||
2623A880000
|
heap
|
page read and write
|
||
A9969FF000
|
stack
|
page read and write
|
||
2623A933000
|
heap
|
page read and write
|
||
2623A93E000
|
heap
|
page read and write
|
||
2623A8FE000
|
heap
|
page read and write
|
||
2623A90B000
|
heap
|
page read and write
|
||
2623A951000
|
heap
|
page read and write
|
||
A99613A000
|
stack
|
page read and write
|
||
2623A933000
|
heap
|
page read and write
|
||
2623AC19000
|
heap
|
page read and write
|
||
A9968FF000
|
stack
|
page read and write
|
||
2623A90B000
|
heap
|
page read and write
|
||
2623A901000
|
heap
|
page read and write
|
||
2623A948000
|
heap
|
page read and write
|
||
2623ABC4000
|
heap
|
page read and write
|
||
2623A93E000
|
heap
|
page read and write
|
||
2623C701000
|
heap
|
page read and write
|
||
2623ABC0000
|
heap
|
page read and write
|
||
A996BFE000
|
stack
|
page read and write
|
||
2623A96C000
|
heap
|
page read and write
|
||
2623A850000
|
heap
|
page read and write
|
||
2623A8C8000
|
heap
|
page read and write
|
||
2623AC1C000
|
heap
|
page read and write
|
||
2623A96C000
|
heap
|
page read and write
|
||
2623A8EA000
|
heap
|
page read and write
|
There are 46 hidden memdumps, click here to show them.