Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\notepad.exe
|
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\text_0.txt
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fWindowsOnlyEOL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fPasteOriginalEOL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fReverse
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fWrapAround
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fMatchCase
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1DE6B0D0000
|
heap
|
page read and write
|
||
1DE696F5000
|
heap
|
page read and write
|
||
1DE6D730000
|
heap
|
page read and write
|
||
2370CFE000
|
stack
|
page read and write
|
||
1DE6CF30000
|
trusted library allocation
|
page read and write
|
||
1DE695A0000
|
heap
|
page read and write
|
||
1DE6AF60000
|
trusted library allocation
|
page read and write
|
||
2370A78000
|
stack
|
page read and write
|
||
1DE6AF80000
|
heap
|
page read and write
|
||
1DE694C0000
|
heap
|
page read and write
|
||
2370BFE000
|
stack
|
page read and write
|
||
1DE69678000
|
heap
|
page read and write
|
||
1DE696ED000
|
heap
|
page read and write
|
||
1DE6B0DC000
|
heap
|
page read and write
|
||
1DE6AFC0000
|
heap
|
page read and write
|
||
1DE69670000
|
heap
|
page read and write
|
||
1DE696AD000
|
heap
|
page read and write
|
||
1DE6B0D5000
|
heap
|
page read and write
|
||
1DE6AFC3000
|
heap
|
page read and write
|
||
1DE696A0000
|
heap
|
page read and write
|
||
1DE696C5000
|
heap
|
page read and write
|
||
1DE695E0000
|
heap
|
page read and write
|
There are 12 hidden memdumps, click here to show them.