Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\powershell.exe
|
"C:\Users\user\Desktop\powershell.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FF6A0107000
|
unkown
|
page readonly
|
||
7FF6A00A0000
|
unkown
|
page readonly
|
||
28FDBFB0000
|
heap
|
page read and write
|
||
28FDBED0000
|
heap
|
page read and write
|
||
7FF6A00A1000
|
unkown
|
page execute read
|
||
28FDBFF0000
|
heap
|
page read and write
|
||
28FDBFF8000
|
heap
|
page read and write
|
||
AD2CAFF000
|
stack
|
page read and write
|
||
7FF6A00AC000
|
unkown
|
page readonly
|
||
7FF6A00B5000
|
unkown
|
page readonly
|
||
AD2C7DC000
|
stack
|
page read and write
|
||
7FF6A00B4000
|
unkown
|
page read and write
|
||
7FF6A00AD000
|
unkown
|
page read and write
|
||
7FF6A00B4000
|
unkown
|
page write copy
|
There are 4 hidden memdumps, click here to show them.