Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe
|
"C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sostener2024.duckdns.org
|
|||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sostener2024.duckdns.org
|
192.169.69.26
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.169.69.26
|
sostener2024.duckdns.org
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
872000
|
unkown
|
page readonly
|
||
7FFD9B804000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C6000
|
trusted library allocation
|
page execute and read and write
|
||
1B9BE000
|
stack
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
1B8BE000
|
stack
|
page read and write
|
||
1B4C0000
|
heap
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page read and write
|
||
1BABF000
|
stack
|
page read and write
|
||
7FF4A7B50000
|
trusted library allocation
|
page execute and read and write
|
||
D24000
|
heap
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7E4000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
1B663000
|
heap
|
page read and write
|
||
CDD000
|
heap
|
page read and write
|
||
D26000
|
heap
|
page read and write
|
||
D3A000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B80D000
|
trusted library allocation
|
page execute and read and write
|
||
C10000
|
heap
|
page read and write
|
||
CF3000
|
heap
|
page read and write
|
||
CDA000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
1B5C0000
|
heap
|
page read and write
|
||
D1C000
|
heap
|
page read and write
|
||
D1E000
|
heap
|
page read and write
|
||
7FFD9B89C000
|
trusted library allocation
|
page execute and read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
7FFD9B896000
|
trusted library allocation
|
page read and write
|
||
CD3000
|
heap
|
page read and write
|
||
7FFD9B7FD000
|
trusted library allocation
|
page execute and read and write
|
||
F7F000
|
stack
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
12D03000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7E3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7F3000
|
trusted library allocation
|
page read and write
|
||
2D01000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7ED000
|
trusted library allocation
|
page execute and read and write
|
||
CE5000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
1160000
|
heap
|
page read and write
|
||
CC5000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
12D01000
|
trusted library allocation
|
page read and write
|
||
10C3000
|
trusted library allocation
|
page read and write
|
||
87E000
|
unkown
|
page readonly
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
1B17D000
|
stack
|
page read and write
|
||
9C4000
|
stack
|
page read and write
|
||
2CF0000
|
heap
|
page execute and read and write
|
||
CBC000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page execute and read and write
|
||
2B70000
|
heap
|
page read and write
|
There are 55 hidden memdumps, click here to show them.