Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\j1gw88aHdL.exe
|
"C:\Users\user\Desktop\j1gw88aHdL.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2B84BED5000
|
heap
|
page read and write
|
||
2B84BEDC000
|
heap
|
page read and write
|
||
2B84BED8000
|
heap
|
page read and write
|
||
7FF7D4C34000
|
unkown
|
page readonly
|
||
2B84BECF000
|
heap
|
page read and write
|
||
2B84BEB8000
|
heap
|
page read and write
|
||
7FF7D4C2E000
|
unkown
|
page read and write
|
||
FB177CD000
|
stack
|
page read and write
|
||
7FF7D4BF1000
|
unkown
|
page execute read
|
||
2B84D870000
|
heap
|
page read and write
|
||
7FF7D4C2E000
|
unkown
|
page write copy
|
||
7FF7D4BF1000
|
unkown
|
page execute read
|
||
2B84BECF000
|
heap
|
page read and write
|
||
2B84BEB0000
|
heap
|
page read and write
|
||
FB173E6000
|
stack
|
page read and write
|
||
2B84D760000
|
heap
|
page read and write
|
||
2B84BED8000
|
heap
|
page read and write
|
||
2B84BE50000
|
heap
|
page read and write
|
||
FB179BF000
|
stack
|
page read and write
|
||
2B84BEE3000
|
heap
|
page read and write
|
||
FB175DE000
|
stack
|
page read and write
|
||
7FF7D4BF0000
|
unkown
|
page readonly
|
||
2B84D7D3000
|
heap
|
page read and write
|
||
7FF7D4C32000
|
unkown
|
page read and write
|
||
2B84BEE9000
|
heap
|
page read and write
|
||
2B84D86A000
|
heap
|
page read and write
|
||
2B84BE20000
|
heap
|
page read and write
|
||
2B84BED8000
|
heap
|
page read and write
|
||
2B84BEDD000
|
heap
|
page read and write
|
||
2B84D860000
|
heap
|
page read and write
|
||
7FF7D4C1B000
|
unkown
|
page readonly
|
||
2B84BD40000
|
heap
|
page read and write
|
||
7FF7D4C1B000
|
unkown
|
page readonly
|
||
2B84D7D0000
|
heap
|
page read and write
|
||
7FF7D4C34000
|
unkown
|
page readonly
|
||
7FF7D4BF0000
|
unkown
|
page readonly
|
||
2B84BECC000
|
heap
|
page read and write
|
||
2B84D865000
|
heap
|
page read and write
|
||
2B8508B0000
|
trusted library allocation
|
page read and write
|
There are 29 hidden memdumps, click here to show them.