Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c cd project && registry.exe registry.py & taskkill /F /IM cmd.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\taskkill.exe
|
taskkill /F /IM cmd.exe
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
261FA44C000
|
heap
|
page read and write
|
||
261FA47E000
|
heap
|
page read and write
|
||
261FA4D1000
|
heap
|
page read and write
|
||
261FA479000
|
heap
|
page read and write
|
||
261FA424000
|
heap
|
page read and write
|
||
261FAD98000
|
heap
|
page read and write
|
||
278A6580000
|
heap
|
page read and write
|
||
261FAD97000
|
heap
|
page read and write
|
||
261FA4AF000
|
heap
|
page read and write
|
||
261FA487000
|
heap
|
page read and write
|
||
261FA4A5000
|
heap
|
page read and write
|
||
261FA42A000
|
heap
|
page read and write
|
||
261FA454000
|
heap
|
page read and write
|
||
261FA481000
|
heap
|
page read and write
|
||
261FA4CB000
|
heap
|
page read and write
|
||
261FB0F4000
|
heap
|
page read and write
|
||
261FA4AA000
|
heap
|
page read and write
|
||
261FA474000
|
heap
|
page read and write
|
||
D421A7E000
|
stack
|
page read and write
|
||
261FA4AA000
|
heap
|
page read and write
|
||
261FA456000
|
heap
|
page read and write
|
||
261FA4DB000
|
heap
|
page read and write
|
||
261FA484000
|
heap
|
page read and write
|
||
261FA47E000
|
heap
|
page read and write
|
||
261FA474000
|
heap
|
page read and write
|
||
261FA456000
|
heap
|
page read and write
|
||
261FB0EB000
|
heap
|
page read and write
|
||
261FADAC000
|
heap
|
page read and write
|
||
261FA3FF000
|
heap
|
page read and write
|
||
261FA47E000
|
heap
|
page read and write
|
||
261FAF9E000
|
heap
|
page read and write
|
||
261FAF95000
|
heap
|
page read and write
|
||
261FA4D3000
|
heap
|
page read and write
|
||
261FA4AA000
|
heap
|
page read and write
|
||
266DB02A000
|
heap
|
page read and write
|
||
261FAF9A000
|
heap
|
page read and write
|
||
261FA491000
|
heap
|
page read and write
|
||
261FA4D1000
|
heap
|
page read and write
|
||
261FA3E0000
|
heap
|
page read and write
|
||
261FB0EE000
|
heap
|
page read and write
|
||
BC26DF8000
|
stack
|
page read and write
|
||
D4219FC000
|
stack
|
page read and write
|
||
261FB0E0000
|
heap
|
page read and write
|
||
278A6835000
|
heap
|
page read and write
|
||
261FA481000
|
heap
|
page read and write
|
||
261FA498000
|
heap
|
page read and write
|
||
261FADBB000
|
heap
|
page read and write
|
||
D42197F000
|
stack
|
page read and write
|
||
261FA4B7000
|
heap
|
page read and write
|
||
261FA4D8000
|
heap
|
page read and write
|
||
261FA3E8000
|
heap
|
page read and write
|
||
261FA4D5000
|
heap
|
page read and write
|
||
261FADA9000
|
heap
|
page read and write
|
||
261FA497000
|
heap
|
page read and write
|
||
261FA4DE000
|
heap
|
page read and write
|
||
261FA42C000
|
heap
|
page read and write
|
||
261FAD9D000
|
heap
|
page read and write
|
||
261FA4BA000
|
heap
|
page read and write
|
||
D42187E000
|
stack
|
page read and write
|
||
BC272FE000
|
stack
|
page read and write
|
||
266DB073000
|
heap
|
page read and write
|
||
261FA4AA000
|
heap
|
page read and write
|
||
266DB113000
|
heap
|
page read and write
|
||
261FAD97000
|
heap
|
page read and write
|
||
261FA4CD000
|
heap
|
page read and write
|
||
BC26C7E000
|
stack
|
page read and write
|
||
261FA471000
|
heap
|
page read and write
|
||
261FA459000
|
heap
|
page read and write
|
||
261FA4C5000
|
heap
|
page read and write
|
||
261FA4A4000
|
heap
|
page read and write
|
||
261FA4DB000
|
heap
|
page read and write
|
||
261FA4CD000
|
heap
|
page read and write
|
||
266DB800000
|
heap
|
page read and write
|
||
261FA4D8000
|
heap
|
page read and write
|
||
D421AFF000
|
stack
|
page read and write
|
||
261FA476000
|
heap
|
page read and write
|
||
261FA4DB000
|
heap
|
page read and write
|
||
261FA470000
|
heap
|
page read and write
|
||
261FADB8000
|
heap
|
page read and write
|
||
261FA476000
|
heap
|
page read and write
|
||
261FA489000
|
heap
|
page read and write
|
||
261FA4B2000
|
heap
|
page read and write
|
||
261FA4D8000
|
heap
|
page read and write
|
||
261FA447000
|
heap
|
page read and write
|
||
261FADA1000
|
heap
|
page read and write
|
||
261FAF90000
|
heap
|
page read and write
|
||
261FA487000
|
heap
|
page read and write
|
||
261FAF93000
|
heap
|
page read and write
|
||
261FB0E9000
|
heap
|
page read and write
|
||
261FA476000
|
heap
|
page read and write
|
||
261FADA3000
|
heap
|
page read and write
|
||
261FA4B2000
|
heap
|
page read and write
|
||
261FA48F000
|
heap
|
page read and write
|
||
278A6830000
|
heap
|
page read and write
|
||
261FA471000
|
heap
|
page read and write
|
||
261FA4DE000
|
heap
|
page read and write
|
||
261FA44D000
|
heap
|
page read and write
|
||
261FA471000
|
heap
|
page read and write
|
||
261FA695000
|
heap
|
page read and write
|
||
261FB0EC000
|
heap
|
page read and write
|
||
266DB044000
|
heap
|
page read and write
|
||
261FA4D1000
|
heap
|
page read and write
|
||
261FA4C9000
|
heap
|
page read and write
|
||
261FA471000
|
heap
|
page read and write
|
||
261FA4BE000
|
heap
|
page read and write
|
||
261FA330000
|
heap
|
page read and write
|
||
278A8140000
|
heap
|
page read and write
|
||
261FA465000
|
heap
|
page read and write
|
||
261FA42C000
|
heap
|
page read and write
|
||
261FA49F000
|
heap
|
page read and write
|
||
261FADAC000
|
heap
|
page read and write
|
||
261FA4D3000
|
heap
|
page read and write
|
||
261FA4B4000
|
heap
|
page read and write
|
||
261FA46A000
|
heap
|
page read and write
|
||
261FA49F000
|
heap
|
page read and write
|
||
261FA48F000
|
heap
|
page read and write
|
||
266DB066000
|
heap
|
page read and write
|
||
261FA453000
|
heap
|
page read and write
|
||
261FADB0000
|
heap
|
page read and write
|
||
266DAEB0000
|
heap
|
page read and write
|
||
261FA484000
|
heap
|
page read and write
|
||
261FA47E000
|
heap
|
page read and write
|
||
261FA4CD000
|
heap
|
page read and write
|
||
261FA4CB000
|
heap
|
page read and write
|
||
261FA2E0000
|
heap
|
page read and write
|
||
261FA4C0000
|
heap
|
page read and write
|
||
261FAD90000
|
heap
|
page read and write
|
||
261FA487000
|
heap
|
page read and write
|
||
261FA498000
|
heap
|
page read and write
|
||
261FA45D000
|
heap
|
page read and write
|
||
266DB102000
|
heap
|
page read and write
|
||
F60F89C000
|
stack
|
page read and write
|
||
261FAF92000
|
heap
|
page read and write
|
||
261FA413000
|
heap
|
page read and write
|
||
261FA439000
|
heap
|
page read and write
|
||
261FA4AB000
|
heap
|
page read and write
|
||
261FA4DB000
|
heap
|
page read and write
|
||
261FA497000
|
heap
|
page read and write
|
||
261FA498000
|
heap
|
page read and write
|
||
261FA690000
|
heap
|
page read and write
|
||
261FADA4000
|
heap
|
page read and write
|
||
261FA4C9000
|
heap
|
page read and write
|
||
261FAF97000
|
heap
|
page read and write
|
||
261FA43C000
|
heap
|
page read and write
|
||
261FA4AD000
|
heap
|
page read and write
|
||
261FA4DE000
|
heap
|
page read and write
|
||
261FA47E000
|
heap
|
page read and write
|
||
261FAF97000
|
heap
|
page read and write
|
||
261FA49F000
|
heap
|
page read and write
|
||
261FA459000
|
heap
|
page read and write
|
||
261FA4C6000
|
heap
|
page read and write
|
||
BC26FF7000
|
stack
|
page read and write
|
||
266DB013000
|
heap
|
page read and write
|
||
261FA4DE000
|
heap
|
page read and write
|
||
261FA48C000
|
heap
|
page read and write
|
||
261FA4DB000
|
heap
|
page read and write
|
||
266DB815000
|
heap
|
page read and write
|
||
266DB07B000
|
heap
|
page read and write
|
||
261FA4CB000
|
heap
|
page read and write
|
||
266DAEA0000
|
heap
|
page read and write
|
||
261FAD9E000
|
heap
|
page read and write
|
||
261FA481000
|
heap
|
page read and write
|
||
D4218FB000
|
stack
|
page read and write
|
||
261FA4BB000
|
heap
|
page read and write
|
||
278A65DB000
|
heap
|
page read and write
|
||
261FA490000
|
heap
|
page read and write
|
||
261FA48C000
|
heap
|
page read and write
|
||
266DB055000
|
heap
|
page read and write
|
||
BC26EFB000
|
stack
|
page read and write
|
||
BC271FE000
|
stack
|
page read and write
|
||
261FB0F1000
|
heap
|
page read and write
|
||
261FA4BA000
|
heap
|
page read and write
|
||
261FA4C3000
|
heap
|
page read and write
|
||
261FA481000
|
heap
|
page read and write
|
||
261FA4B2000
|
heap
|
page read and write
|
||
266DB100000
|
heap
|
page read and write
|
||
261FA420000
|
heap
|
page read and write
|
||
261FA49F000
|
heap
|
page read and write
|
||
261FADB1000
|
heap
|
page read and write
|
||
278A65D0000
|
heap
|
page read and write
|
||
261FAF94000
|
heap
|
page read and write
|
||
F60F99F000
|
stack
|
page read and write
|
||
261FA49A000
|
heap
|
page read and write
|
||
D4215FE000
|
stack
|
page read and write
|
||
261FA456000
|
heap
|
page read and write
|
||
261FB0E7000
|
heap
|
page read and write
|
||
261FA471000
|
heap
|
page read and write
|
||
D421577000
|
stack
|
page read and write
|
||
261FA473000
|
heap
|
page read and write
|
||
261FB0F6000
|
heap
|
page read and write
|
||
BC270FE000
|
stack
|
page read and write
|
||
261FAEB0000
|
heap
|
page read and write
|
||
261FA49F000
|
heap
|
page read and write
|
||
261FA418000
|
heap
|
page read and write
|
||
266DB670000
|
trusted library allocation
|
page read and write
|
||
261FA448000
|
heap
|
page read and write
|
||
261FAF9B000
|
heap
|
page read and write
|
||
278A6420000
|
heap
|
page read and write
|
||
261FA4BA000
|
heap
|
page read and write
|
||
261FA465000
|
heap
|
page read and write
|
||
261FA350000
|
heap
|
page read and write
|
||
261FA4CD000
|
heap
|
page read and write
|
||
261FA3FA000
|
heap
|
page read and write
|
||
261FA473000
|
heap
|
page read and write
|
||
261FA441000
|
heap
|
page read and write
|
||
261FA4D3000
|
heap
|
page read and write
|
||
261FA481000
|
heap
|
page read and write
|
||
261FA45E000
|
heap
|
page read and write
|
||
261FA4BC000
|
heap
|
page read and write
|
||
261FAF9A000
|
heap
|
page read and write
|
||
261FA401000
|
heap
|
page read and write
|
||
266DB000000
|
heap
|
page read and write
|
||
261FA4B4000
|
heap
|
page read and write
|
||
261FA4C9000
|
heap
|
page read and write
|
||
F60F91F000
|
stack
|
page read and write
|
||
266DB088000
|
heap
|
page read and write
|
||
BC26CFF000
|
stack
|
page read and write
|
||
266DB802000
|
heap
|
page read and write
|
||
261FA45F000
|
heap
|
page read and write
|
||
261FA4C6000
|
heap
|
page read and write
|
||
261FA4DE000
|
heap
|
page read and write
|
||
261FA4A5000
|
heap
|
page read and write
|
||
261FA4C3000
|
heap
|
page read and write
|
||
266DAF10000
|
heap
|
page read and write
|
||
261FAF9A000
|
heap
|
page read and write
|
||
261FA4B7000
|
heap
|
page read and write
|
||
261FA476000
|
heap
|
page read and write
|
||
278A6560000
|
heap
|
page read and write
|
||
261FA4B0000
|
heap
|
page read and write
|
||
261FA4C6000
|
heap
|
page read and write
|
||
BC269CB000
|
stack
|
page read and write
|
||
261FA48F000
|
heap
|
page read and write
|
||
261FA47D000
|
heap
|
page read and write
|
There are 223 hidden memdumps, click here to show them.