Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\powershell.exe
|
"C:\Users\user\Desktop\powershell.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FF6D72A1000
|
unkown
|
page execute read
|
||
1BDCC9B8000
|
heap
|
page read and write
|
||
1BDCC980000
|
heap
|
page read and write
|
||
7FF6D72AC000
|
unkown
|
page read and write
|
||
1BDCC990000
|
heap
|
page read and write
|
||
7FF6D7306000
|
unkown
|
page readonly
|
||
7FF6D72B4000
|
unkown
|
page readonly
|
||
7FF6D72A0000
|
unkown
|
page readonly
|
||
1068DBC000
|
stack
|
page read and write
|
||
1BDCC9B0000
|
heap
|
page read and write
|
||
7FF6D72AB000
|
unkown
|
page readonly
|
||
7FF6D72B3000
|
unkown
|
page read and write
|
||
7FF6D72B3000
|
unkown
|
page write copy
|
There are 3 hidden memdumps, click here to show them.