Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.17202.22243.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.17202.22243.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
14287181000
|
trusted library allocation
|
page read and write
|
||
14286F60000
|
heap
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
14285745000
|
heap
|
page read and write
|
||
142870C0000
|
heap
|
page execute and read and write
|
||
14285730000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
2A328FD000
|
stack
|
page read and write
|
||
1429FA00000
|
heap
|
page read and write
|
||
1428551B000
|
heap
|
page read and write
|
||
142854BC000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
142854B0000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E34000
|
trusted library allocation
|
page read and write
|
||
142854F2000
|
heap
|
page read and write
|
||
1429F960000
|
trusted library section
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1429F190000
|
trusted library allocation
|
page read and write
|
||
7FF425170000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
14285523000
|
heap
|
page read and write
|
||
2A32532000
|
stack
|
page read and write
|
||
142854ED000
|
heap
|
page read and write
|
||
7FF848FDF000
|
trusted library allocation
|
page read and write
|
||
7FF848FC9000
|
trusted library allocation
|
page read and write
|
||
1429936D000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
2A32BFE000
|
stack
|
page read and write
|
||
14285740000
|
heap
|
page read and write
|
||
14285420000
|
unkown
|
page readonly
|
||
142856F0000
|
heap
|
page read and write
|
||
14287161000
|
trusted library allocation
|
page read and write
|
||
14287150000
|
heap
|
page execute and read and write
|
||
2A331FA000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
142855B0000
|
heap
|
page read and write
|
||
14286F13000
|
trusted library allocation
|
page read and write
|
||
14286F00000
|
trusted library allocation
|
page read and write
|
||
14285690000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
142856C5000
|
heap
|
page read and write
|
||
2A329FE000
|
stack
|
page read and write
|
||
2A32CFB000
|
stack
|
page read and write
|
||
142856C0000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
142854CE000
|
heap
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
142873DD000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
14285422000
|
unkown
|
page readonly
|
||
7FF848E28000
|
trusted library allocation
|
page read and write
|
||
142856D0000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
2A332FC000
|
stack
|
page read and write
|
||
142854D9000
|
heap
|
page read and write
|
||
14286F70000
|
heap
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page execute and read and write
|
||
142854EF000
|
heap
|
page read and write
|
||
14297168000
|
trusted library allocation
|
page read and write
|
||
14286F10000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
14285589000
|
heap
|
page read and write
|
||
7FF848FC4000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
142855A8000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
14297161000
|
trusted library allocation
|
page read and write
|
||
1428559B000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
1428551D000
|
heap
|
page read and write
|
||
14298C98000
|
trusted library allocation
|
page read and write
|
There are 69 hidden memdumps, click here to show them.