Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\DRAKETAX2023.EXE
|
"C:\Users\user\Desktop\DRAKETAX2023.EXE"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://aka.ms/dotnet/app-launch-failed
|
unknown
|
||
https://aka.ms/dotnet-core-applaunch?
|
unknown
|
||
https://aka.ms/dotnet-core-applaunch?Architecture:
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
380F000
|
stack
|
page read and write
|
||
D3A000
|
unkown
|
page read and write
|
||
D3B000
|
unkown
|
page readonly
|
||
D21000
|
unkown
|
page execute read
|
||
34C0000
|
heap
|
page read and write
|
||
D33000
|
unkown
|
page readonly
|
||
2FBC000
|
stack
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
33EE000
|
stack
|
page read and write
|
||
D3A000
|
unkown
|
page write copy
|
||
3460000
|
heap
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
3430000
|
heap
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
D33000
|
unkown
|
page readonly
|
||
51B0000
|
heap
|
page read and write
|
||
D3B000
|
unkown
|
page readonly
|
||
33A0000
|
heap
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
34C8000
|
heap
|
page read and write
|
||
337C000
|
stack
|
page read and write
|
||
D21000
|
unkown
|
page execute read
|
There are 12 hidden memdumps, click here to show them.