Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2D71CB16000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
2D71ACE9000
|
unkown
|
page readonly
|
||
2D71AF00000
|
heap
|
page read and write
|
||
2D71B1D0000
|
heap
|
page read and write
|
||
2D71ACE4000
|
unkown
|
page readonly
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
2D72CE28000
|
trusted library allocation
|
page read and write
|
||
2D71ACB0000
|
unkown
|
page readonly
|
||
2D71AE80000
|
heap
|
page read and write
|
||
7FF848FEB000
|
trusted library allocation
|
page read and write
|
||
2D71C900000
|
trusted library allocation
|
page read and write
|
||
2D71C7F8000
|
heap
|
page read and write
|
||
2D71AEA0000
|
heap
|
page read and write
|
||
2D71AFC5000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
E42A2FF000
|
stack
|
page read and write
|
||
2D72CB5A000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
2D71AE70000
|
heap
|
page read and write
|
||
E42A5FB000
|
stack
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
2D71AFDD000
|
heap
|
page read and write
|
||
2D71B1A0000
|
trusted library allocation
|
page read and write
|
||
2D71AF41000
|
heap
|
page read and write
|
||
2D735BB0000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
2D71AF6F000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
2D71AD90000
|
heap
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
2D71B1D5000
|
heap
|
page read and write
|
||
2D72CAF1000
|
trusted library allocation
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
2D73D310000
|
trusted library allocation
|
page read and write
|
||
E42AAFA000
|
stack
|
page read and write
|
||
2D72CF18000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
2D71ACE6000
|
unkown
|
page readonly
|
||
2D7352B1000
|
trusted library allocation
|
page read and write
|
||
E42A9FD000
|
stack
|
page read and write
|
||
2D71ACF2000
|
unkown
|
page readonly
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
2D71AF2A000
|
heap
|
page read and write
|
||
7FF848FA7000
|
trusted library allocation
|
page read and write
|
||
2D72CB9C000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FAC000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
2D71AF75000
|
heap
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
7FF492100000
|
trusted library allocation
|
page execute and read and write
|
||
2D71AE75000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
2D71C960000
|
heap
|
page read and write
|
||
2D71AF0C000
|
heap
|
page read and write
|
||
E42A4FE000
|
stack
|
page read and write
|
||
2D71AEC0000
|
heap
|
page read and write
|
||
2D71AF43000
|
heap
|
page read and write
|
||
2D72CB95000
|
trusted library allocation
|
page read and write
|
||
2D71CF58000
|
trusted library allocation
|
page read and write
|
||
2D71AF6C000
|
heap
|
page read and write
|
||
2D71CAE0000
|
heap
|
page execute and read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
2D71B1C0000
|
trusted library allocation
|
page read and write
|
||
2D71AF2C000
|
heap
|
page read and write
|
||
2D72CAF7000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
2D71CAF1000
|
trusted library allocation
|
page read and write
|
||
E429FF3000
|
stack
|
page read and write
|
||
2D72CB90000
|
trusted library allocation
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
E42ABFC000
|
stack
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page read and write
|
||
2D71C9F0000
|
trusted library section
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
2D71C903000
|
trusted library allocation
|
page read and write
|
||
2D7351B0000
|
heap
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page execute and read and write
|
||
2D71ACB2000
|
unkown
|
page readonly
|
||
2D71CF5A000
|
trusted library allocation
|
page read and write
|
||
2D71ACED000
|
unkown
|
page readonly
|
||
2D71C9E0000
|
heap
|
page execute and read and write
|
There are 78 hidden memdumps, click here to show them.