Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Project1.exe
|
"C:\Users\user\Desktop\Project1.exe"
|
||
C:\Users\user\Desktop\Project1.exe
|
"C:\Users\user\Desktop\Project1.exe"
|
||
C:\Users\user\Desktop\Project1.exe
|
"C:\Users\user\Desktop\Project1.exe"
|
||
C:\Users\user\Desktop\Project1.exe
|
"C:\Users\user\Desktop\Project1.exe"
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5DE000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
7D3000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
7DD000
|
heap
|
page read and write
|
||
7F5000
|
heap
|
page read and write
|
||
7F3000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
5DF000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
2320000
|
direct allocation
|
page read and write
|
||
2330000
|
direct allocation
|
page read and write
|
||
66C000
|
heap
|
page read and write
|
||
23AE000
|
stack
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
55E000
|
stack
|
page read and write
|
||
68A000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
A93000
|
heap
|
page read and write
|
||
29DF000
|
stack
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
68C000
|
heap
|
page read and write
|
||
85F000
|
stack
|
page read and write
|
||
1C172110000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
93F000
|
stack
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
23E3000
|
heap
|
page read and write
|
||
23D8000
|
direct allocation
|
page read and write
|
||
A5F000
|
stack
|
page read and write
|
||
691000
|
heap
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
51E000
|
stack
|
page read and write
|
||
1C1720A0000
|
heap
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
AC3000
|
direct allocation
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
5B9000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2C2F000
|
stack
|
page read and write
|
||
598000
|
heap
|
page read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
5D7000
|
heap
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
26CE000
|
stack
|
page read and write
|
||
40D0000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
7D7000
|
heap
|
page read and write
|
||
5E1000
|
heap
|
page read and write
|
||
2334000
|
direct allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
68F000
|
heap
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
233C000
|
direct allocation
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
23DC000
|
direct allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
1C172119000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
AB0000
|
direct allocation
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
23D0000
|
direct allocation
|
page read and write
|
||
23E3000
|
direct allocation
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
478000
|
unkown
|
page read and write
|
||
478000
|
unkown
|
page write copy
|
||
23E0000
|
direct allocation
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
67E000
|
heap
|
page read and write
|
||
B79000
|
heap
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
677000
|
heap
|
page read and write
|
||
23C0000
|
heap
|
page read and write
|
||
4190000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
7CE000
|
heap
|
page read and write
|
||
5CA000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
AB8000
|
direct allocation
|
page read and write
|
||
5BE000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
5CF000
|
heap
|
page read and write
|
||
7D2000
|
heap
|
page read and write
|
||
7DD000
|
heap
|
page read and write
|
||
4EE000
|
stack
|
page read and write
|
||
67D000
|
heap
|
page read and write
|
||
66C000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
264E000
|
stack
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
681000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
485000
|
unkown
|
page readonly
|
||
97000
|
stack
|
page read and write
|
||
4DE000
|
stack
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
679000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
478000
|
unkown
|
page read and write
|
||
5E1000
|
heap
|
page read and write
|
||
698000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
ABC000
|
direct allocation
|
page read and write
|
||
478000
|
unkown
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
2B1F000
|
stack
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
5D5000
|
heap
|
page read and write
|
||
5E2000
|
heap
|
page read and write
|
||
2B1F000
|
stack
|
page read and write
|
||
AB0000
|
direct allocation
|
page execute and read and write
|
||
47D000
|
unkown
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
5FC000
|
heap
|
page read and write
|
||
5C7000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
7D9000
|
heap
|
page read and write
|
||
B33AD0C000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
AB8000
|
direct allocation
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
29DF000
|
stack
|
page read and write
|
||
1C172070000
|
heap
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
23E3000
|
direct allocation
|
page read and write
|
||
5D6000
|
heap
|
page read and write
|
||
5FC000
|
heap
|
page read and write
|
||
5B1000
|
heap
|
page read and write
|
||
5F3000
|
heap
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
AB4000
|
direct allocation
|
page read and write
|
||
5D3000
|
heap
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
23DE000
|
direct allocation
|
page read and write
|
||
67B000
|
heap
|
page read and write
|
||
5BA000
|
heap
|
page read and write
|
||
7F2000
|
heap
|
page read and write
|
||
B33AD8E000
|
stack
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
23D8000
|
direct allocation
|
page read and write
|
||
7D6000
|
heap
|
page read and write
|
||
51E000
|
stack
|
page read and write
|
||
7CE000
|
heap
|
page read and write
|
||
A7F000
|
stack
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
7A0000
|
direct allocation
|
page execute and read and write
|
||
7F2000
|
heap
|
page read and write
|
||
7EB000
|
heap
|
page read and write
|
||
AB3000
|
heap
|
page read and write
|
||
B33B0FE000
|
stack
|
page read and write
|
||
23C0000
|
trusted library allocation
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
5D8000
|
heap
|
page read and write
|
||
7C9000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
23D4000
|
direct allocation
|
page read and write
|
||
7E1000
|
heap
|
page read and write
|
||
485000
|
unkown
|
page readonly
|
||
2A1E000
|
stack
|
page read and write
|
||
5B9000
|
heap
|
page read and write
|
||
5DD000
|
heap
|
page read and write
|
||
1C172080000
|
heap
|
page read and write
|
||
2340000
|
direct allocation
|
page read and write
|
||
4130000
|
trusted library allocation
|
page read and write
|
||
7DD000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
68F000
|
heap
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
2338000
|
direct allocation
|
page read and write
|
||
B33B07E000
|
stack
|
page read and write
|
||
47D000
|
unkown
|
page read and write
|
||
1C172490000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
7E9000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
5B1000
|
heap
|
page read and write
|
||
BD9000
|
heap
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
1C173AE0000
|
heap
|
page read and write
|
||
26E3000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
5B6000
|
heap
|
page read and write
|
||
5D5000
|
heap
|
page read and write
|
||
B75000
|
heap
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
7D7000
|
heap
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
AA0000
|
direct allocation
|
page execute and read and write
|
||
AAF000
|
stack
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
7DB000
|
heap
|
page read and write
|
||
478000
|
unkown
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
5B6000
|
heap
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
2510000
|
heap
|
page read and write
|
||
5BA000
|
heap
|
page read and write
|
||
87F000
|
stack
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
47D000
|
unkown
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
7D6000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
4DE000
|
stack
|
page read and write
|
||
4110000
|
trusted library allocation
|
page read and write
|
||
485000
|
unkown
|
page readonly
|
||
5B5000
|
heap
|
page read and write
|
||
268E000
|
stack
|
page read and write
|
||
7DE000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
B89000
|
heap
|
page read and write
|
||
668000
|
heap
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
5FC000
|
heap
|
page read and write
|
||
2440000
|
direct allocation
|
page execute and read and write
|
||
B49000
|
heap
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
67D000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2600000
|
trusted library allocation
|
page read and write
|
||
5D8000
|
heap
|
page read and write
|
||
67D000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
7B7000
|
heap
|
page read and write
|
||
1C172495000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
There are 254 hidden memdumps, click here to show them.