Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\17305370450a724087c7f6981143cf069ec0c685c80f69cbd81880d785e4b0d131e53bb2a9297.dat-decoded.exe
|
"C:\Users\user\Desktop\17305370450a724087c7f6981143cf069ec0c685c80f69cbd81880d785e4b0d131e53bb2a9297.dat-decoded.exe"
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
upe2023.duckdns.org
|
24.152.38.77
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
24.152.38.77
|
upe2023.duckdns.org
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\6a2634340fbf8a0a2c038c6263d49fd1
|
[kl]
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1D2000
|
unkown
|
page readonly
|
||
5150000
|
trusted library allocation
|
page execute and read and write
|
||
823000
|
heap
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
49AB000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
heap
|
page read and write
|
||
49A0000
|
trusted library allocation
|
page read and write
|
||
49A6000
|
trusted library allocation
|
page read and write
|
||
630000
|
trusted library allocation
|
page read and write
|
||
634000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
4A47000
|
trusted library allocation
|
page read and write
|
||
568000
|
stack
|
page read and write
|
||
ADB000
|
trusted library allocation
|
page execute and read and write
|
||
AC6000
|
trusted library allocation
|
page execute and read and write
|
||
770000
|
trusted library allocation
|
page read and write
|
||
B9C000
|
stack
|
page read and write
|
||
4D5C000
|
stack
|
page read and write
|
||
49E0000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
77D000
|
trusted library allocation
|
page execute and read and write
|
||
34C1000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
heap
|
page execute and read and write
|
||
86E000
|
heap
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
49C1000
|
trusted library allocation
|
page read and write
|
||
ACA000
|
trusted library allocation
|
page execute and read and write
|
||
78B000
|
heap
|
page read and write
|
||
AD2000
|
trusted library allocation
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
64D000
|
trusted library allocation
|
page execute and read and write
|
||
44C8000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
4A50000
|
trusted library allocation
|
page read and write
|
||
773000
|
trusted library allocation
|
page read and write
|
||
85D000
|
heap
|
page read and write
|
||
49CD000
|
trusted library allocation
|
page read and write
|
||
24BE000
|
stack
|
page read and write
|
||
7FA60000
|
trusted library allocation
|
page execute and read and write
|
||
644000
|
trusted library allocation
|
page read and write
|
||
643000
|
trusted library allocation
|
page execute and read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
24C1000
|
trusted library allocation
|
page read and write
|
||
87B000
|
heap
|
page read and write
|
||
49C6000
|
trusted library allocation
|
page read and write
|
||
49A4000
|
trusted library allocation
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
5880000
|
heap
|
page read and write
|
||
640000
|
trusted library allocation
|
page read and write
|
||
49BE000
|
trusted library allocation
|
page read and write
|
||
4D19000
|
stack
|
page read and write
|
||
B00000
|
trusted library allocation
|
page execute and read and write
|
||
4A80000
|
heap
|
page read and write
|
||
7C8000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
5B10000
|
heap
|
page read and write
|
||
7A7000
|
heap
|
page read and write
|
||
7C2000
|
heap
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
49D2000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
AD7000
|
trusted library allocation
|
page execute and read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
7BF000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page execute and read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
C09000
|
trusted library allocation
|
page read and write
|
||
4A3C000
|
stack
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
49AE000
|
trusted library allocation
|
page read and write
|
||
5B15000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
46A000
|
stack
|
page read and write
|
||
4ECA000
|
stack
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
49B2000
|
trusted library allocation
|
page read and write
|
||
812000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
4A73000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
There are 81 hidden memdumps, click here to show them.