Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\dmB3aYi8Bo.exe
|
"C:\Users\user\Desktop\dmB3aYi8Bo.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
179D248D000
|
heap
|
page read and write
|
||
743B57B000
|
stack
|
page read and write
|
||
743BAFF000
|
stack
|
page read and write
|
||
6F4973B000
|
stack
|
page read and write
|
||
B2D0D7B000
|
stack
|
page read and write
|
||
219F0A24000
|
heap
|
page read and write
|
||
6F49DF7000
|
stack
|
page read and write
|
||
E3F000
|
stack
|
page read and write
|
||
219F09C0000
|
trusted library allocation
|
page read and write
|
||
6F49CFE000
|
stack
|
page read and write
|
||
1AE27302000
|
heap
|
page read and write
|
||
179D245C000
|
heap
|
page read and write
|
||
219F0A02000
|
heap
|
page read and write
|
||
179D2413000
|
heap
|
page read and write
|
||
1AE27100000
|
heap
|
page read and write
|
||
1AE27200000
|
heap
|
page read and write
|
||
1AE27C02000
|
trusted library allocation
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
6CD000
|
stack
|
page read and write
|
||
1AE27170000
|
heap
|
page read and write
|
||
B2D0C7B000
|
stack
|
page read and write
|
||
B2D0B7F000
|
stack
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
743B97B000
|
stack
|
page read and write
|
||
6F49FFF000
|
stack
|
page read and write
|
||
1AE2724A000
|
heap
|
page read and write
|
||
219F0B02000
|
heap
|
page read and write
|
||
12E1000
|
unkown
|
page readonly
|
||
BBE000
|
stack
|
page read and write
|
||
219F0A80000
|
heap
|
page read and write
|
||
179D2482000
|
heap
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
219F0B08000
|
heap
|
page read and write
|
||
179D2402000
|
heap
|
page read and write
|
||
219F0A70000
|
heap
|
page read and write
|
||
1AE2723C000
|
heap
|
page read and write
|
||
1AE27308000
|
heap
|
page read and write
|
||
219F0A52000
|
heap
|
page read and write
|
||
12E0000
|
unkown
|
page write copy
|
||
219F0A4F000
|
heap
|
page read and write
|
||
12D7000
|
unkown
|
page readonly
|
||
F3E000
|
stack
|
page read and write
|
||
219F0B13000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
1AE27270000
|
heap
|
page read and write
|
||
12DE000
|
unkown
|
page write copy
|
||
12B0000
|
unkown
|
page readonly
|
||
12D7000
|
unkown
|
page readonly
|
||
179D2513000
|
heap
|
page read and write
|
||
B2D0E77000
|
stack
|
page read and write
|
||
219F0A4C000
|
heap
|
page read and write
|
||
179D2457000
|
heap
|
page read and write
|
||
7CC000
|
stack
|
page read and write
|
||
743BBF7000
|
stack
|
page read and write
|
||
6F49C7B000
|
stack
|
page read and write
|
||
1AE27213000
|
heap
|
page read and write
|
||
219F1402000
|
trusted library allocation
|
page read and write
|
||
219F0920000
|
heap
|
page read and write
|
||
219F0A4D000
|
heap
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
6F497BE000
|
stack
|
page read and write
|
||
219F0A4A000
|
heap
|
page read and write
|
||
219F0A49000
|
heap
|
page read and write
|
||
1AE27229000
|
heap
|
page read and write
|
||
12E1000
|
unkown
|
page readonly
|
||
12DE000
|
unkown
|
page read and write
|
||
12C0000
|
unkown
|
page execute read
|
||
B2D0AFE000
|
stack
|
page read and write
|
||
219F0A13000
|
heap
|
page read and write
|
||
179D2508000
|
heap
|
page read and write
|
||
179D2464000
|
heap
|
page read and write
|
||
743BCFE000
|
stack
|
page read and write
|
||
179D2460000
|
heap
|
page read and write
|
||
219F0930000
|
heap
|
page read and write
|
||
179D2300000
|
heap
|
page read and write
|
||
219F0A8A000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
179D2500000
|
heap
|
page read and write
|
||
179D243C000
|
heap
|
page read and write
|
||
1AE2724E000
|
heap
|
page read and write
|
||
1AE27110000
|
heap
|
page read and write
|
||
1AE2724D000
|
heap
|
page read and write
|
||
12C0000
|
unkown
|
page execute read
|
||
C4A000
|
heap
|
page read and write
|
||
743BA7B000
|
stack
|
page read and write
|
||
179D2E02000
|
trusted library allocation
|
page read and write
|
||
B2D0A7B000
|
stack
|
page read and write
|
||
179D242C000
|
heap
|
page read and write
|
||
179D2390000
|
trusted library allocation
|
page read and write
|
||
12DB000
|
unkown
|
page write copy
|
||
743B87E000
|
stack
|
page read and write
|
||
12DB000
|
unkown
|
page read and write
|
||
219F0A50000
|
heap
|
page read and write
|
||
12B1000
|
unkown
|
page execute read
|
||
1AE27300000
|
heap
|
page read and write
|
||
179D2360000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
219F0A00000
|
heap
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
6F49A7E000
|
stack
|
page read and write
|
||
12B0000
|
unkown
|
page readonly
|
||
219F0A6D000
|
heap
|
page read and write
|
||
219F0B00000
|
heap
|
page read and write
|
||
743B5FF000
|
stack
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
219F0A6D000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
179D22F0000
|
heap
|
page read and write
|
||
1AE2724B000
|
heap
|
page read and write
|
||
1AE27281000
|
heap
|
page read and write
|
||
6F49B7B000
|
stack
|
page read and write
|
||
219F0A3C000
|
heap
|
page read and write
|
||
1AE27251000
|
heap
|
page read and write
|
||
B2D107F000
|
stack
|
page read and write
|
||
219F0990000
|
heap
|
page read and write
|
||
12B1000
|
unkown
|
page execute read
|
||
1AE2724F000
|
heap
|
page read and write
|
||
743BDFF000
|
stack
|
page read and write
|
||
1AE271A0000
|
trusted library allocation
|
page read and write
|
||
1AE2728C000
|
heap
|
page read and write
|
||
179D2429000
|
heap
|
page read and write
|
||
179D2502000
|
heap
|
page read and write
|
||
179D2400000
|
heap
|
page read and write
|
||
B2D0F7F000
|
stack
|
page read and write
|
||
1AE27249000
|
heap
|
page read and write
|
||
219F0A4B000
|
heap
|
page read and write
|
||
6F49EFE000
|
stack
|
page read and write
|
||
1AE27313000
|
heap
|
page read and write
|
There are 118 hidden memdumps, click here to show them.