Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\notepad.exe
|
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\Payment Advice for Imax November 23, 2022, 1%3A46%3A16 PM.txt
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
25913A93000
|
heap
|
page read and write
|
||
1B33FE80000
|
heap
|
page read and write
|
||
1B34005A000
|
heap
|
page read and write
|
||
CD8B2FE000
|
stack
|
page read and write
|
||
22408602000
|
heap
|
page read and write
|
||
25913990000
|
trusted library allocation
|
page read and write
|
||
917B4FA000
|
stack
|
page read and write
|
||
2A491D00000
|
heap
|
page read and write
|
||
24156DCB000
|
heap
|
page read and write
|
||
24156C90000
|
heap
|
page read and write
|
||
22408630000
|
heap
|
page read and write
|
||
22408620000
|
heap
|
page read and write
|
||
1DF1F002000
|
heap
|
page read and write
|
||
1B340041000
|
heap
|
page read and write
|
||
25913A2F000
|
heap
|
page read and write
|
||
241587F0000
|
heap
|
page read and write
|
||
1B34007B000
|
heap
|
page read and write
|
||
220F06C0000
|
heap
|
page read and write
|
||
23461E50000
|
trusted library allocation
|
page read and write
|
||
22408590000
|
heap
|
page read and write
|
||
917BAFF000
|
stack
|
page read and write
|
||
220F0902000
|
heap
|
page read and write
|
||
24156D8C000
|
heap
|
page read and write
|
||
24156DC3000
|
heap
|
page read and write
|
||
917BCFF000
|
stack
|
page read and write
|
||
D160AFB000
|
stack
|
page read and write
|
||
23460318000
|
heap
|
page read and write
|
||
22408652000
|
heap
|
page read and write
|
||
25913A3D000
|
heap
|
page read and write
|
||
2A491C02000
|
heap
|
page read and write
|
||
2240863D000
|
heap
|
page read and write
|
||
1B340013000
|
heap
|
page read and write
|
||
C289DFE000
|
stack
|
page read and write
|
||
25913A91000
|
heap
|
page read and write
|
||
20B9C402000
|
heap
|
page read and write
|
||
23460300000
|
heap
|
page read and write
|
||
25914430000
|
heap
|
page read and write
|
||
AE671FE000
|
stack
|
page read and write
|
||
1DF1F066000
|
heap
|
page read and write
|
||
AE6757D000
|
stack
|
page read and write
|
||
24156D9B000
|
heap
|
page read and write
|
||
22408E02000
|
trusted library allocation
|
page read and write
|
||
22408629000
|
heap
|
page read and write
|
||
917B7FF000
|
stack
|
page read and write
|
||
2346025A000
|
heap
|
page read and write
|
||
C289CF9000
|
stack
|
page read and write
|
||
23462210000
|
remote allocation
|
page read and write
|
||
24156D45000
|
heap
|
page read and write
|
||
1DF1F05B000
|
heap
|
page read and write
|
||
23460313000
|
heap
|
page read and write
|
||
CCE6FF000
|
stack
|
page read and write
|
||
D16067B000
|
stack
|
page read and write
|
||
1B340024000
|
heap
|
page read and write
|
||
2A4914CC000
|
heap
|
page read and write
|
||
23460120000
|
heap
|
page read and write
|
||
20B9CA90000
|
remote allocation
|
page read and write
|
||
1B340046000
|
heap
|
page read and write
|
||
20B9C502000
|
heap
|
page read and write
|
||
CD8B07E000
|
stack
|
page read and write
|
||
2A491380000
|
heap
|
page read and write
|
||
1B340802000
|
trusted library allocation
|
page read and write
|
||
CD8AF79000
|
stack
|
page read and write
|
||
25914202000
|
heap
|
page read and write
|
||
AE6747E000
|
stack
|
page read and write
|
||
25913810000
|
heap
|
page read and write
|
||
CD8ADFE000
|
stack
|
page read and write
|
||
20B9C300000
|
heap
|
page read and write
|
||
EA431FE000
|
stack
|
page read and write
|
||
25913A6B000
|
heap
|
page read and write
|
||
24156D40000
|
heap
|
page read and write
|
||
23461BE0000
|
trusted library allocation
|
page read and write
|
||
C2897FB000
|
stack
|
page read and write
|
||
2A4914C9000
|
heap
|
page read and write
|
||
20B9C43D000
|
heap
|
page read and write
|
||
2A491444000
|
heap
|
page read and write
|
||
20B9C400000
|
heap
|
page read and write
|
||
220F0802000
|
heap
|
page read and write
|
||
25913A13000
|
heap
|
page read and write
|
||
20B9C290000
|
heap
|
page read and write
|
||
1B340058000
|
heap
|
page read and write
|
||
1B34005F000
|
heap
|
page read and write
|
||
D160A7C000
|
stack
|
page read and write
|
||
25913A78000
|
heap
|
page read and write
|
||
25913A6E000
|
heap
|
page read and write
|
||
EA436FE000
|
stack
|
page read and write
|
||
20B9C2A0000
|
heap
|
page read and write
|
||
2FF71FE000
|
stack
|
page read and write
|
||
1B34005D000
|
heap
|
page read and write
|
||
23461E10000
|
trusted library allocation
|
page read and write
|
||
25913A00000
|
heap
|
page read and write
|
||
220F0650000
|
heap
|
page read and write
|
||
25914343000
|
heap
|
page read and write
|
||
4792AFE000
|
stack
|
page read and write
|
||
D160DFE000
|
stack
|
page read and write
|
||
1B340059000
|
heap
|
page read and write
|
||
D1608FE000
|
stack
|
page read and write
|
||
25913A87000
|
heap
|
page read and write
|
||
23460259000
|
heap
|
page read and write
|
||
220F0870000
|
heap
|
page read and write
|
||
20B9CA90000
|
remote allocation
|
page read and write
|
||
25913A8A000
|
heap
|
page read and write
|
||
917BBFF000
|
stack
|
page read and write
|
||
CCE27E000
|
stack
|
page read and write
|
||
220F1002000
|
trusted library allocation
|
page read and write
|
||
1B34004F000
|
heap
|
page read and write
|
||
1B340062000
|
heap
|
page read and write
|
||
EA432FF000
|
stack
|
page read and write
|
||
2A4914BB000
|
heap
|
page read and write
|
||
1B34006C000
|
heap
|
page read and write
|
||
917B9FF000
|
stack
|
page read and write
|
||
23461BC0000
|
trusted library allocation
|
page read and write
|
||
1DF1F070000
|
heap
|
page read and write
|
||
20B9CA90000
|
remote allocation
|
page read and write
|
||
25914413000
|
heap
|
page read and write
|
||
1B340060000
|
heap
|
page read and write
|
||
D16047C000
|
stack
|
page read and write
|
||
1B340074000
|
heap
|
page read and write
|