Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\FATURA VE BELGELER.exe
|
"C:\Users\user\Desktop\FATURA VE BELGELER.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2779BAFD000
|
trusted library allocation
|
page read and write
|
||
277ABAE1000
|
trusted library allocation
|
page read and write
|
||
27799E20000
|
unkown
|
page readonly
|
||
277B3B10000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
DDEC4FE000
|
stack
|
page read and write
|
||
2779A110000
|
heap
|
page read and write
|
||
277B4760000
|
trusted library section
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page read and write
|
||
DDEC7FB000
|
stack
|
page read and write
|
||
7FFB1E3C2000
|
unkown
|
page readonly
|
||
7FFAACC56000
|
trusted library allocation
|
page read and write
|
||
DDEC6FE000
|
stack
|
page read and write
|
||
7FFAACCC0000
|
trusted library allocation
|
page execute and read and write
|
||
2779A1B3000
|
trusted library allocation
|
page read and write
|
||
277B4770000
|
heap
|
page read and write
|
||
7FFAACD56000
|
trusted library allocation
|
page read and write
|
||
7FFAACBA4000
|
trusted library allocation
|
page read and write
|
||
277B43B0000
|
heap
|
page execute and read and write
|
||
2779A130000
|
heap
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page read and write
|
||
27799F31000
|
heap
|
page read and write
|
||
7FFAACBCB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB1E3C0000
|
unkown
|
page read and write
|
||
2779A0E0000
|
heap
|
page read and write
|
||
7FFB1E3B6000
|
unkown
|
page readonly
|
||
27799E22000
|
unkown
|
page readonly
|
||
27799F64000
|
heap
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
7FFAACD5C000
|
trusted library allocation
|
page read and write
|
||
27799F13000
|
heap
|
page read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page read and write
|
||
7FFAACC86000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD46000
|
trusted library allocation
|
page read and write
|
||
7FFAACC5C000
|
trusted library allocation
|
page execute and read and write
|
||
277ABAF1000
|
trusted library allocation
|
page read and write
|
||
277B43C0000
|
trusted library section
|
page read and write
|
||
277ABAE8000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF430B50000
|
trusted library allocation
|
page execute and read and write
|
||
277B440C000
|
trusted library section
|
page read and write
|
||
7FFB1E3C5000
|
unkown
|
page readonly
|
||
DDEC183000
|
stack
|
page read and write
|
||
7FFAACBB8000
|
trusted library allocation
|
page read and write
|
||
7FFAACBBD000
|
trusted library allocation
|
page execute and read and write
|
||
2779A180000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3A1000
|
unkown
|
page execute read
|
||
2779A1A0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD92000
|
trusted library allocation
|
page read and write
|
||
2779A0F0000
|
heap
|
page read and write
|
||
2779BA10000
|
trusted library section
|
page read and write
|
||
2779A0E5000
|
heap
|
page read and write
|
||
27799FD4000
|
heap
|
page read and write
|
||
7FFB1E3A0000
|
unkown
|
page readonly
|
||
27799E2C000
|
unkown
|
page readonly
|
||
7FFAACBA2000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC4000
|
trusted library allocation
|
page read and write
|
||
27799EF0000
|
heap
|
page read and write
|
||
27799F1D000
|
heap
|
page read and write
|
||
27799F5C000
|
heap
|
page read and write
|
||
27799F33000
|
heap
|
page read and write
|
||
7FFAACBCD000
|
trusted library allocation
|
page execute and read and write
|
||
277ABE91000
|
trusted library allocation
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
277B43CD000
|
trusted library section
|
page read and write
|
||
27799F1B000
|
heap
|
page read and write
|
||
7FFAACBA3000
|
trusted library allocation
|
page execute and read and write
|
||
27799EFC000
|
heap
|
page read and write
|
||
27799E30000
|
unkown
|
page readonly
|
||
277B3E6C000
|
heap
|
page read and write
|
||
2779A260000
|
heap
|
page read and write
|
||
2779A000000
|
heap
|
page read and write
|
||
2779BAE1000
|
trusted library allocation
|
page read and write
|
||
2779A1B0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBAD000
|
trusted library allocation
|
page execute and read and write
|
||
2779A230000
|
heap
|
page execute and read and write
|
||
277AD673000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB2000
|
trusted library allocation
|
page read and write
|
||
2779A265000
|
heap
|
page read and write
|
||
7FFAACBFC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
27799FE3000
|
heap
|
page read and write
|
||
277AC03A000
|
trusted library allocation
|
page read and write
|
||
277AD0CB000
|
trusted library allocation
|
page read and write
|
||
277ABAFE000
|
trusted library allocation
|
page read and write
|
||
2779BAD0000
|
heap
|
page read and write
|
||
27799F5E000
|
heap
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page execute and read and write
|
||
277ABAED000
|
trusted library allocation
|
page read and write
|
There are 81 hidden memdumps, click here to show them.