Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\jsv.js"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://google.com
|
unknown
|
||
https://aadcdn.msftauth.net/shared/1.0/content/images/appbackgrounds/49_6ffe0a92d779c878835b40171ffc
|
unknown
|
||
https://softwarereviews.s3.amazonaws.com/production/favicons/offerings/3117/original/Sharepoint_icon
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
162F9C6E000
|
heap
|
page read and write
|
||
162F9C60000
|
heap
|
page read and write
|
||
162F9F40000
|
heap
|
page read and write
|
||
162F9D28000
|
heap
|
page read and write
|
||
162F9CBB000
|
heap
|
page read and write
|
||
162FB650000
|
heap
|
page read and write
|
||
162F9D30000
|
heap
|
page read and write
|
||
162F9D28000
|
heap
|
page read and write
|
||
162FBBA5000
|
heap
|
page read and write
|
||
162F9D28000
|
heap
|
page read and write
|
||
162F9C30000
|
heap
|
page read and write
|
||
162F9C59000
|
heap
|
page read and write
|
||
162F9D2C000
|
heap
|
page read and write
|
||
162F9C71000
|
heap
|
page read and write
|
||
313EAFE000
|
stack
|
page read and write
|
||
162F9F45000
|
heap
|
page read and write
|
||
313EDFF000
|
stack
|
page read and write
|
||
162FB9D0000
|
heap
|
page read and write
|
||
162F9B40000
|
heap
|
page read and write
|
||
162F9CAF000
|
heap
|
page read and write
|
||
162FBBBF000
|
heap
|
page read and write
|
||
162FBB9E000
|
heap
|
page read and write
|
||
313EFFE000
|
stack
|
page read and write
|
||
162FB9DB000
|
heap
|
page read and write
|
||
313EEFE000
|
stack
|
page read and write
|
||
162FB9D2000
|
heap
|
page read and write
|
||
162F9D50000
|
heap
|
page read and write
|
||
162FBBA5000
|
heap
|
page read and write
|
||
313EBFE000
|
stack
|
page read and write
|
||
162FBB9E000
|
heap
|
page read and write
|
||
162FB9F0000
|
heap
|
page read and write
|
||
162F9C5A000
|
heap
|
page read and write
|
||
162FBB71000
|
heap
|
page read and write
|
||
162FBBA5000
|
heap
|
page read and write
|
||
162FB9EF000
|
heap
|
page read and write
|
||
162FBB41000
|
heap
|
page read and write
|
||
162F9CFA000
|
heap
|
page read and write
|
||
162FD490000
|
trusted library allocation
|
page read and write
|
||
162F9C60000
|
heap
|
page read and write
|
||
162FD370000
|
heap
|
page read and write
|
||
162F9C70000
|
heap
|
page read and write
|
||
162F9C52000
|
heap
|
page read and write
|
||
162F9D2C000
|
heap
|
page read and write
|
||
162FB654000
|
heap
|
page read and write
|
||
162F9C4D000
|
heap
|
page read and write
|
||
162F9D2C000
|
heap
|
page read and write
|
||
162F9CAF000
|
heap
|
page read and write
|
||
162FB9D9000
|
heap
|
page read and write
|
||
162F9C5F000
|
heap
|
page read and write
|
||
162F9CAF000
|
heap
|
page read and write
|
||
313E73A000
|
stack
|
page read and write
|
||
162FB9D1000
|
heap
|
page read and write
|
||
162FBBA5000
|
heap
|
page read and write
|
||
162F9C52000
|
heap
|
page read and write
|
||
162FBAE0000
|
heap
|
page read and write
|
||
162FB9EF000
|
heap
|
page read and write
|
||
162F9D29000
|
heap
|
page read and write
|
||
162F9D2C000
|
heap
|
page read and write
|
||
162FBB42000
|
heap
|
page read and write
|
||
162FB9D8000
|
heap
|
page read and write
|
||
162F9D2C000
|
heap
|
page read and write
|
||
313F0FF000
|
stack
|
page read and write
|
||
162FBAE1000
|
heap
|
page read and write
|
||
162FB9EF000
|
heap
|
page read and write
|
||
162FBB9E000
|
heap
|
page read and write
|
||
162FB9D6000
|
heap
|
page read and write
|
There are 56 hidden memdumps, click here to show them.