Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\tZz1Ogtr2C.exe
|
"C:\Users\user\Desktop\tZz1Ogtr2C.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B30000
|
direct allocation
|
page read and write
|
||
D11000
|
unkown
|
page execute and read and write
|
||
C0F000
|
heap
|
page read and write
|
||
9A0000
|
direct allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
93C000
|
stack
|
page read and write
|
||
11F9000
|
direct allocation
|
page execute and read and write
|
||
D61000
|
heap
|
page read and write
|
||
C0F000
|
heap
|
page read and write
|
||
C0F000
|
heap
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
C0F000
|
heap
|
page read and write
|
||
BFA000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
10D0000
|
direct allocation
|
page execute and read and write
|
||
9DE000
|
stack
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
F1B000
|
heap
|
page read and write
|
||
F5F000
|
stack
|
page read and write
|
||
126E000
|
direct allocation
|
page execute and read and write
|
||
BFE000
|
heap
|
page read and write
|
||
C15000
|
heap
|
page read and write
|
||
C0F000
|
heap
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
B80000
|
direct allocation
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
C15000
|
heap
|
page read and write
|
||
C0A000
|
heap
|
page read and write
|
||
D66000
|
heap
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
D11000
|
unkown
|
page execute read
|
||
C04000
|
heap
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
D61000
|
heap
|
page read and write
|
||
105F000
|
stack
|
page read and write
|
||
13A1000
|
direct allocation
|
page execute and read and write
|
||
C0A000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
11FD000
|
direct allocation
|
page execute and read and write
|
||
BF0000
|
heap
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
1048000
|
heap
|
page read and write
|
||
139D000
|
direct allocation
|
page execute and read and write
|
||
A1E000
|
stack
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
E89000
|
heap
|
page read and write
|
||
10B9000
|
heap
|
page read and write
|
||
83D000
|
stack
|
page read and write
|
||
C0F000
|
heap
|
page read and write
|
||
1412000
|
direct allocation
|
page execute and read and write
|
There are 47 hidden memdumps, click here to show them.