Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\D_47267_1687617Q.exe
|
"C:\Users\user\Desktop\D_47267_1687617Q.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1FB7DE70000
|
direct allocation
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
C000096000
|
direct allocation
|
page read and write
|
||
C0000C4000
|
direct allocation
|
page read and write
|
||
294B7FF000
|
stack
|
page read and write
|
||
A27000
|
unkown
|
page readonly
|
||
C0000CC000
|
direct allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
A37000
|
unkown
|
page write copy
|
||
C000098000
|
direct allocation
|
page read and write
|
||
1FB58A64000
|
direct allocation
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
4A1000
|
unkown
|
page execute read
|
||
C000002000
|
direct allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
A38000
|
unkown
|
page readonly
|
||
99F000
|
unkown
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
1FB58A60000
|
direct allocation
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
711000
|
unkown
|
page readonly
|
||
C000031000
|
direct allocation
|
page read and write
|
||
1FB58AC0000
|
direct allocation
|
page read and write
|
||
294BBFE000
|
stack
|
page read and write
|
||
C00013E000
|
direct allocation
|
page read and write
|
||
A38000
|
unkown
|
page readonly
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C000106000
|
direct allocation
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
9C3000
|
unkown
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
C000041000
|
direct allocation
|
page read and write
|
||
1FB7DE73000
|
direct allocation
|
page read and write
|
||
1FB58970000
|
heap
|
page read and write
|
||
1FB58A6D000
|
direct allocation
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
711000
|
unkown
|
page readonly
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
1FB58AE0000
|
heap
|
page read and write
|
||
9C4000
|
unkown
|
page write copy
|
||
99E000
|
unkown
|
page write copy
|
||
C000128000
|
direct allocation
|
page read and write
|
||
1FB58A68000
|
direct allocation
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
1FB58B39000
|
heap
|
page read and write
|
||
A20000
|
unkown
|
page read and write
|
||
C000102000
|
direct allocation
|
page read and write
|
||
9D5000
|
unkown
|
page write copy
|
||
C000090000
|
direct allocation
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
1FB58A6A000
|
direct allocation
|
page read and write
|
||
C00005A000
|
direct allocation
|
page read and write
|
||
A37000
|
unkown
|
page write copy
|
||
9A0000
|
unkown
|
page write copy
|
||
9D6000
|
unkown
|
page read and write
|
||
A27000
|
unkown
|
page readonly
|
||
9F8000
|
unkown
|
page read and write
|
||
C000108000
|
direct allocation
|
page read and write
|
||
294BDFE000
|
stack
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
C000051000
|
direct allocation
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
99B000
|
unkown
|
page write copy
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
C00002F000
|
direct allocation
|
page read and write
|
||
294BFFF000
|
stack
|
page read and write
|
||
C00004F000
|
direct allocation
|
page read and write
|
||
1FB58B30000
|
heap
|
page read and write
|
||
99B000
|
unkown
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
4A1000
|
unkown
|
page execute read
|
||
1FB7DEB0000
|
direct allocation
|
page read and write
|
||
C0000D1000
|
direct allocation
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
294B9FF000
|
stack
|
page read and write
|
||
C00010E000
|
direct allocation
|
page read and write
|
||
C00014B000
|
direct allocation
|
page read and write
|
||
1FB58B3C000
|
heap
|
page read and write
|
||
9C6000
|
unkown
|
page read and write
|
||
294B3FD000
|
stack
|
page read and write
|
There are 89 hidden memdumps, click here to show them.