Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RKVaYznwyT.exe
|
"C:\Users\user\Desktop\RKVaYznwyT.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\HOSTNAME.EXE
|
hostname
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C000048000
|
direct allocation
|
page read and write
|
||
C0000D0000
|
direct allocation
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
C00002B000
|
direct allocation
|
page read and write
|
||
C000074000
|
direct allocation
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
C00009E000
|
direct allocation
|
page read and write
|
||
C000040000
|
direct allocation
|
page read and write
|
||
6F9000
|
unkown
|
page write copy
|
||
C0000D6000
|
direct allocation
|
page read and write
|
||
C0000CC000
|
direct allocation
|
page read and write
|
||
1B1000
|
direct allocation
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
70F000
|
unkown
|
page read and write
|
||
C0000D8000
|
direct allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
A5D000
|
stack
|
page read and write
|
||
81A000
|
unkown
|
page write copy
|
||
C0000C4000
|
direct allocation
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
C00012E000
|
direct allocation
|
page read and write
|
||
1A4000
|
direct allocation
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
561000
|
unkown
|
page readonly
|
||
C000116000
|
direct allocation
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
C0000DE000
|
direct allocation
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
E2F000
|
stack
|
page read and write
|
||
C00007C000
|
direct allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
D678F3C000
|
stack
|
page read and write
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
C000039000
|
direct allocation
|
page read and write
|
||
1A9000
|
direct allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
C0000EC000
|
direct allocation
|
page read and write
|
||
C0000DC000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
B30000
|
heap
|
page read and write
|
||
C0000D4000
|
direct allocation
|
page read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
72C000
|
unkown
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
2B580930000
|
heap
|
page read and write
|
||
B3C000
|
heap
|
page read and write
|
||
2B580870000
|
heap
|
page read and write
|
||
6F8000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
C000029000
|
direct allocation
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
C00010E000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
D678FBF000
|
stack
|
page read and write
|
||
1E2F000
|
stack
|
page read and write
|
||
C0000FE000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
102F000
|
stack
|
page read and write
|
||
216F000
|
stack
|
page read and write
|
||
777000
|
unkown
|
page readonly
|
||
C000056000
|
direct allocation
|
page read and write
|
||
1E0000
|
direct allocation
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
729000
|
unkown
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
D67927F000
|
stack
|
page read and write
|
||
C000042000
|
direct allocation
|
page read and write
|
||
A60000
|
direct allocation
|
page read and write
|
||
80000
|
heap
|
page read and write
|
||
C0000AE000
|
direct allocation
|
page read and write
|
||
6F6000
|
unkown
|
page write copy
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
C0000DA000
|
direct allocation
|
page read and write
|
||
81B000
|
unkown
|
page readonly
|
||
704000
|
unkown
|
page write copy
|
||
81B000
|
unkown
|
page readonly
|
||
B25000
|
heap
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
C0000EA000
|
direct allocation
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
C00003B000
|
direct allocation
|
page read and write
|
||
C00002E000
|
direct allocation
|
page read and write
|
||
2B580939000
|
heap
|
page read and write
|
||
2B580890000
|
heap
|
page read and write
|
||
2B580790000
|
heap
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
2B580B40000
|
heap
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
A90000
|
direct allocation
|
page read and write
|
||
72D000
|
unkown
|
page readonly
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
B39000
|
heap
|
page read and write
|
||
A80000
|
direct allocation
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
72D000
|
unkown
|
page readonly
|
||
2B580B45000
|
heap
|
page read and write
|
||
A68000
|
direct allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
1A0000
|
direct allocation
|
page read and write
|
||
C0000D2000
|
direct allocation
|
page read and write
|
||
6F1000
|
unkown
|
page write copy
|
||
C000080000
|
direct allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
C000070000
|
direct allocation
|
page read and write
|
||
C00006D000
|
direct allocation
|
page read and write
|
||
1C2F000
|
stack
|
page read and write
|
||
C0000CA000
|
direct allocation
|
page read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
C000130000
|
direct allocation
|
page read and write
|
||
C000024000
|
direct allocation
|
page read and write
|
||
81A000
|
unkown
|
page write copy
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
777000
|
unkown
|
page readonly
|
||
C000128000
|
direct allocation
|
page read and write
|
||
C0000A2000
|
direct allocation
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
702000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
6F1000
|
unkown
|
page read and write
|
||
1A2F000
|
stack
|
page read and write
|
||
C0000E2000
|
direct allocation
|
page read and write
|
||
707000
|
unkown
|
page read and write
|
||
561000
|
unkown
|
page readonly
|
There are 127 hidden memdumps, click here to show them.