IOC Report
DRAKETAX2023.EXE

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DRAKETAX2023.EXE
"C:\Users\user\Desktop\DRAKETAX2023.EXE"

URLs

Name
IP
Malicious
https://aka.ms/dotnet/app-launch-failed
unknown
https://aka.ms/dotnet-core-applaunch?
unknown
https://aka.ms/dotnet-core-applaunch?Architecture:
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
380F000
stack
page read and write
D3A000
unkown
page read and write
D3B000
unkown
page readonly
D21000
unkown
page execute read
34C0000
heap
page read and write
D33000
unkown
page readonly
2FBC000
stack
page read and write
D20000
unkown
page readonly
33EE000
stack
page read and write
D3A000
unkown
page write copy
3460000
heap
page read and write
D20000
unkown
page readonly
3430000
heap
page read and write
342E000
stack
page read and write
D33000
unkown
page readonly
51B0000
heap
page read and write
D3B000
unkown
page readonly
33A0000
heap
page read and write
398F000
stack
page read and write
34C8000
heap
page read and write
337C000
stack
page read and write
D21000
unkown
page execute read
There are 12 hidden memdumps, click here to show them.