sargx digital garden

Home

❯

Computer $h1t

❯

Blue Team

❯

Reverse

❯

Malware Analysis

❯

Memory Map Checks

Memory Map Checks

Feb 17, 20261 min read

https://docs.microsoft.com/en-us/sysinternals/downloads/vmmap


Example:

Malware replaced the existing ntdll image on explorer.exe with a newly created section containing an inline hook on NtClose() and code responsible for starting svchost.exe. Output of VMmap indicates that an image of ntdll no longer exists and replaced with a shared Executable/Readable/Writable section after this injection.

Memory Map of Explorer.exe (Before Infection)

Memory Map of Explorer.exe (After Infection)

https://standa-note.blogspot.com/2015/03/


🌱 Back to Garden


Graph View

Backlinks

  • Malware Analysis

Created with Quartz v4.5.2 © 2026

  • GitHub
  • Discord Community