Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exe
|
"C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pukrilug.duckdns.org
|
150.114.84.125
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
150.114.84.125
|
pukrilug.duckdns.org
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1B440000
|
trusted library section
|
page read and write
|
||
12B71000
|
trusted library allocation
|
page read and write
|
||
2B71000
|
trusted library allocation
|
page read and write
|
||
1B330000
|
trusted library section
|
page read and write
|
||
13248000
|
trusted library allocation
|
page read and write
|
||
2B60000
|
heap
|
page execute and read and write
|
||
7FF84906A000
|
trusted library allocation
|
page read and write
|
||
AF8000
|
heap
|
page read and write
|
||
2F2F000
|
trusted library allocation
|
page read and write
|
||
2F79000
|
trusted library allocation
|
page read and write
|
||
1B7F9000
|
heap
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
2790000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
3017000
|
trusted library allocation
|
page read and write
|
||
1B9A0000
|
heap
|
page read and write
|
||
2F44000
|
trusted library allocation
|
page read and write
|
||
AA5000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
2F66000
|
trusted library allocation
|
page read and write
|
||
1B7DF000
|
stack
|
page read and write
|
||
AAD000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF4122A0000
|
trusted library allocation
|
page execute and read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
1B6DF000
|
stack
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
2F6A000
|
trusted library allocation
|
page read and write
|
||
AC1000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
1B7E0000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
D85000
|
heap
|
page read and write
|
||
7FF84902E000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
unkown
|
page readonly
|
||
28A3000
|
trusted library allocation
|
page read and write
|
||
7FF84900D000
|
trusted library allocation
|
page read and write
|
||
7FF848FE4000
|
trusted library allocation
|
page read and write
|
||
13504000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page execute and read and write
|
||
2F31000
|
trusted library allocation
|
page read and write
|
||
A8C000
|
heap
|
page read and write
|
||
2F75000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
5E2000
|
unkown
|
page readonly
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
2F46000
|
trusted library allocation
|
page read and write
|
||
289E000
|
stack
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
2F64000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
1B7FB000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
1AFEC000
|
stack
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
2F53000
|
trusted library allocation
|
page read and write
|
||
7E1000
|
stack
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
2F84000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
1B80D000
|
heap
|
page read and write
|
||
2F35000
|
trusted library allocation
|
page read and write
|
||
1B5DE000
|
stack
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
2F77000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
trusted library section
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
2F48000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
13550000
|
trusted library allocation
|
page read and write
|
||
B6B000
|
heap
|
page read and write
|
||
2F33000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
2910000
|
heap
|
page execute and read and write
|
||
B7E000
|
heap
|
page read and write
|
||
2F7C000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
2F5B000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
AEE000
|
heap
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
AAF000
|
heap
|
page read and write
|
||
2F6C000
|
trusted library allocation
|
page read and write
|
||
2F59000
|
trusted library allocation
|
page read and write
|
||
2F38000
|
trusted library allocation
|
page read and write
|
||
2F4A000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
AC4000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
There are 101 hidden memdumps, click here to show them.