Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\MSIAB95.exe
|
"C:\Users\user\Desktop\MSIAB95.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
81D000
|
heap
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
400000
|
unkown
|
page readonly
|
||
510000
|
heap
|
page read and write
|
||
2AF1000
|
heap
|
page read and write
|
||
20BF000
|
stack
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
4AC000
|
unkown
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
4AD000
|
unkown
|
page readonly
|
||
7D0000
|
heap
|
page read and write
|
||
2289000
|
heap
|
page read and write
|
||
63D000
|
heap
|
page read and write
|
||
818000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2280000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
810000
|
heap
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
81C000
|
heap
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
62B000
|
heap
|
page read and write
|
||
22C0000
|
trusted library allocation
|
page read and write
|
||
50E000
|
stack
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
4AD000
|
unkown
|
page readonly
|
||
610000
|
trusted library allocation
|
page execute read
|
||
750000
|
heap
|
page read and write
|
||
20C0000
|
heap
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
There are 33 hidden memdumps, click here to show them.