Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\INQUIRY 2024-SP000422-B(01) INQ24-_1.exe
|
"C:\Users\user\Desktop\INQUIRY 2024-SP000422-B(01) INQ24-_1.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
14E0000
|
direct allocation
|
page read and write
|
||
E31000
|
unkown
|
page execute and read and write
|
||
15D0000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
1540000
|
direct allocation
|
page read and write
|
||
1B5D000
|
direct allocation
|
page execute and read and write
|
||
E31000
|
unkown
|
page execute read
|
||
1CFD000
|
direct allocation
|
page execute and read and write
|
||
19AE000
|
heap
|
page read and write
|
||
15EE000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
15DE000
|
heap
|
page read and write
|
||
18CF000
|
stack
|
page read and write
|
||
15EE000
|
heap
|
page read and write
|
||
1A1F000
|
heap
|
page read and write
|
||
1540000
|
direct allocation
|
page read and write
|
||
15DA000
|
heap
|
page read and write
|
||
15F4000
|
heap
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
1540000
|
direct allocation
|
page read and write
|
||
19AA000
|
heap
|
page read and write
|
||
FDD000
|
stack
|
page read and write
|
||
19CF000
|
stack
|
page read and write
|
||
1B59000
|
direct allocation
|
page execute and read and write
|
||
1881000
|
heap
|
page read and write
|
||
1D72000
|
direct allocation
|
page execute and read and write
|
||
1540000
|
direct allocation
|
page read and write
|
||
15EE000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
15EE000
|
heap
|
page read and write
|
||
15E9000
|
heap
|
page read and write
|
||
1A30000
|
direct allocation
|
page execute and read and write
|
||
1330000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
145E000
|
stack
|
page read and write
|
||
1540000
|
direct allocation
|
page read and write
|
||
16D1000
|
heap
|
page read and write
|
||
15E3000
|
heap
|
page read and write
|
||
15F4000
|
heap
|
page read and write
|
||
15EE000
|
heap
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
16D1000
|
heap
|
page read and write
|
||
15E3000
|
heap
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
15EE000
|
heap
|
page read and write
|
||
1540000
|
direct allocation
|
page read and write
|
||
15E9000
|
heap
|
page read and write
|
||
1BCE000
|
direct allocation
|
page execute and read and write
|
||
16DE000
|
heap
|
page read and write
|
||
1D01000
|
direct allocation
|
page execute and read and write
|
||
1420000
|
direct allocation
|
page read and write
|
||
1801000
|
heap
|
page read and write
|
There are 45 hidden memdumps, click here to show them.