Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\3oqXgfRHnU.hta"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
769000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
60E0000
|
heap
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
4CEE000
|
trusted library allocation
|
page read and write
|
||
613C000
|
heap
|
page read and write
|
||
2D4A000
|
heap
|
page read and write
|
||
4D08000
|
trusted library allocation
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
4D46000
|
trusted library allocation
|
page read and write
|
||
4D28000
|
trusted library allocation
|
page read and write
|
||
4B56000
|
heap
|
page read and write
|
||
62A0000
|
trusted library allocation
|
page read and write
|
||
5383000
|
heap
|
page read and write
|
||
6132000
|
heap
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
6150000
|
heap
|
page read and write
|
||
85B0000
|
trusted library section
|
page readonly
|
||
4CD0000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
6296000
|
trusted library allocation
|
page read and write
|
||
2F6A000
|
heap
|
page read and write
|
||
7F9C0000
|
trusted library allocation
|
page execute read
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
6141000
|
heap
|
page read and write
|
||
AB10000
|
trusted library allocation
|
page read and write
|
||
533A000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
4CF8000
|
trusted library allocation
|
page read and write
|
||
4B5F000
|
heap
|
page read and write
|
||
2D59000
|
heap
|
page read and write
|
||
62A8000
|
trusted library allocation
|
page read and write
|
||
543B000
|
stack
|
page read and write
|
||
2D63000
|
heap
|
page read and write
|
||
2D6D000
|
heap
|
page read and write
|
||
4D3C000
|
trusted library allocation
|
page read and write
|
||
2C90000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
6102000
|
heap
|
page read and write
|
||
2F66000
|
heap
|
page read and write
|
||
6138000
|
heap
|
page read and write
|
||
4D4C000
|
trusted library allocation
|
page read and write
|
||
567F000
|
stack
|
page read and write
|
||
AB00000
|
trusted library allocation
|
page read and write
|
||
4B54000
|
heap
|
page read and write
|
||
51FB000
|
stack
|
page read and write
|
||
2D2A000
|
heap
|
page read and write
|
||
2CF5000
|
heap
|
page read and write
|
||
84AE000
|
stack
|
page read and write
|
||
7F9B1000
|
trusted library allocation
|
page execute read
|
||
4CC0000
|
heap
|
page read and write
|
||
2D3A000
|
heap
|
page read and write
|
||
2D56000
|
heap
|
page read and write
|
||
4CE8000
|
trusted library allocation
|
page read and write
|
||
4CEA000
|
trusted library allocation
|
page read and write
|
||
614F000
|
heap
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
61F2000
|
trusted library allocation
|
page read and write
|
||
2D31000
|
heap
|
page read and write
|
||
6146000
|
heap
|
page read and write
|
||
4D18000
|
trusted library allocation
|
page read and write
|
||
2D1F000
|
heap
|
page read and write
|
||
85AC000
|
stack
|
page read and write
|
||
6410000
|
trusted library allocation
|
page execute
|
||
53A3000
|
heap
|
page read and write
|
||
62A4000
|
trusted library allocation
|
page read and write
|
||
628F000
|
stack
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
4CFE000
|
trusted library allocation
|
page read and write
|
||
9F92000
|
trusted library allocation
|
page read and write
|
||
6138000
|
heap
|
page read and write
|
||
4D48000
|
trusted library allocation
|
page read and write
|
||
4F74000
|
heap
|
page read and write
|
||
AB00000
|
trusted library allocation
|
page read and write
|
||
60E5000
|
heap
|
page read and write
|
||
60EB000
|
heap
|
page read and write
|
||
4D0C000
|
trusted library allocation
|
page read and write
|
||
5320000
|
heap
|
page read and write
|
||
4D4A000
|
trusted library allocation
|
page read and write
|
||
2D5F000
|
heap
|
page read and write
|
||
2D4D000
|
heap
|
page read and write
|
||
4CEC000
|
trusted library allocation
|
page read and write
|
||
62EE000
|
stack
|
page read and write
|
||
2D37000
|
heap
|
page read and write
|
||
50BC000
|
stack
|
page read and write
|
||
623E000
|
stack
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
2CEC000
|
heap
|
page read and write
|
||
6114000
|
heap
|
page read and write
|
||
553F000
|
stack
|
page read and write
|
||
532C000
|
heap
|
page read and write
|
||
AAA0000
|
heap
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
6139000
|
heap
|
page read and write
|
||
2CEF000
|
heap
|
page read and write
|
||
2B3A000
|
stack
|
page read and write
|
||
6132000
|
heap
|
page read and write
|
||
4D3E000
|
trusted library allocation
|
page read and write
|
||
6129000
|
heap
|
page read and write
|
||
2D63000
|
heap
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
2D25000
|
heap
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
6153000
|
heap
|
page read and write
|
||
63EF000
|
stack
|
page read and write
|
||
2CE2000
|
heap
|
page read and write
|
||
4D0E000
|
trusted library allocation
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
4CFC000
|
trusted library allocation
|
page read and write
|
||
4CFA000
|
trusted library allocation
|
page read and write
|
||
6138000
|
heap
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
4CF2000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
2CA8000
|
heap
|
page read and write
|
||
A8D1000
|
heap
|
page read and write
|
||
6132000
|
heap
|
page read and write
|
||
6134000
|
heap
|
page read and write
|
||
629B000
|
trusted library allocation
|
page read and write
|
||
4F5B000
|
stack
|
page read and write
|
||
51BF000
|
stack
|
page read and write
|
||
A8A0000
|
heap
|
page read and write
|
||
2EFB000
|
heap
|
page read and write
|
||
4F1F000
|
stack
|
page read and write
|
||
6141000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
2EF6000
|
heap
|
page read and write
|
||
2EF3000
|
heap
|
page read and write
|
||
53ED000
|
heap
|
page read and write
|
||
4D0A000
|
trusted library allocation
|
page read and write
|
||
2D6D000
|
heap
|
page read and write
|
||
53ED000
|
heap
|
page read and write
|
||
53A3000
|
heap
|
page read and write
|
||
2D1C000
|
heap
|
page read and write
|
||
2D2F000
|
heap
|
page read and write
|
||
2CBE000
|
heap
|
page read and write
|
||
6294000
|
trusted library allocation
|
page read and write
|
There are 133 hidden memdumps, click here to show them.