Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\17324340651fd0721b4a9b07278d0f63e6333ccd4883a9dc52eb27994b32b0d64dfb919b72906.dat-decoded.exe
|
"C:\Users\user\Desktop\17324340651fd0721b4a9b07278d0f63e6333ccd4883a9dc52eb27994b32b0d64dfb919b72906.dat-decoded.exe"
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
deadpoolstart2025.duckdns.org
|
181.71.217.114
|
||
ax-0001.ax-msedge.net
|
150.171.28.10
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
181.71.217.114
|
deadpoolstart2025.duckdns.org
|
Colombia
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
F02000
|
unkown
|
page readonly
|
||
144D000
|
heap
|
page read and write
|
||
7FFD343F0000
|
trusted library allocation
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
1BB00000
|
heap
|
page read and write
|
||
7FF419400000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3426D000
|
trusted library allocation
|
page execute and read and write
|
||
FC0000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
7FFD3425D000
|
trusted library allocation
|
page execute and read and write
|
||
312F000
|
stack
|
page read and write
|
||
7FFD34300000
|
trusted library allocation
|
page read and write
|
||
1743000
|
trusted library allocation
|
page read and write
|
||
7FFD34253000
|
trusted library allocation
|
page execute and read and write
|
||
1B6BC000
|
stack
|
page read and write
|
||
146D000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
7FFD34370000
|
trusted library allocation
|
page execute and read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
1410000
|
trusted library allocation
|
page read and write
|
||
1B4BD000
|
heap
|
page read and write
|
||
1476000
|
heap
|
page read and write
|
||
7FFD34254000
|
trusted library allocation
|
page read and write
|
||
12F4000
|
stack
|
page read and write
|
||
7FFD34260000
|
trusted library allocation
|
page read and write
|
||
13133000
|
trusted library allocation
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
7FFD3430C000
|
trusted library allocation
|
page execute and read and write
|
||
1BA00000
|
heap
|
page read and write
|
||
1770000
|
heap
|
page execute and read and write
|
||
7FFD34310000
|
trusted library allocation
|
page execute and read and write
|
||
1750000
|
heap
|
page execute and read and write
|
||
14B1000
|
heap
|
page read and write
|
||
1BBA9000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
7FFD34336000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34274000
|
trusted library allocation
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
1880000
|
heap
|
page read and write
|
||
1482000
|
heap
|
page read and write
|
||
1885000
|
heap
|
page read and write
|
||
1455000
|
heap
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
FE0000
|
heap
|
page read and write
|
||
14AF000
|
heap
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
13131000
|
trusted library allocation
|
page read and write
|
||
1BBA4000
|
heap
|
page read and write
|
||
1BEFE000
|
stack
|
page read and write
|
||
7FFD34306000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
1BFFE000
|
stack
|
page read and write
|
||
7FFD3427D000
|
trusted library allocation
|
page execute and read and write
|
||
163E000
|
stack
|
page read and write
|
||
1BDFE000
|
stack
|
page read and write
|
||
7FFD34263000
|
trusted library allocation
|
page read and write
|
||
7FFD34270000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
F16000
|
unkown
|
page readonly
|
||
3131000
|
trusted library allocation
|
page read and write
|
||
7FFD342AC000
|
trusted library allocation
|
page execute and read and write
|
There are 52 hidden memdumps, click here to show them.