IOC Report
17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe
"C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe"
malicious

URLs

Name
IP
Malicious
sostener2024.duckdns.org
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
sostener2024.duckdns.org
192.169.69.26
malicious

IPs

IP
Domain
Country
Malicious
192.169.69.26
sostener2024.duckdns.org
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
872000
unkown
page readonly
malicious
7FFD9B804000
trusted library allocation
page read and write
7FFD9B8C6000
trusted library allocation
page execute and read and write
1B9BE000
stack
page read and write
CB0000
heap
page read and write
10C0000
trusted library allocation
page read and write
1B8BE000
stack
page read and write
1B4C0000
heap
page read and write
1165000
heap
page read and write
7FFD9B900000
trusted library allocation
page execute and read and write
7FFD9B890000
trusted library allocation
page read and write
1BABF000
stack
page read and write
7FF4A7B50000
trusted library allocation
page execute and read and write
D24000
heap
page read and write
10B0000
trusted library allocation
page read and write
7FFD9B7E4000
trusted library allocation
page read and write
C50000
heap
page read and write
1B663000
heap
page read and write
CDD000
heap
page read and write
D26000
heap
page read and write
D3A000
heap
page read and write
2B84000
heap
page read and write
C55000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
7FFD9B80D000
trusted library allocation
page execute and read and write
C10000
heap
page read and write
CF3000
heap
page read and write
CDA000
heap
page read and write
C20000
heap
page read and write
1B5C0000
heap
page read and write
D1C000
heap
page read and write
D1E000
heap
page read and write
7FFD9B89C000
trusted library allocation
page execute and read and write
1090000
trusted library allocation
page read and write
7FFD9B896000
trusted library allocation
page read and write
CD3000
heap
page read and write
7FFD9B7FD000
trusted library allocation
page execute and read and write
F7F000
stack
page read and write
870000
unkown
page readonly
12D03000
trusted library allocation
page read and write
7FFD9B7E3000
trusted library allocation
page execute and read and write
7FFD9B7F3000
trusted library allocation
page read and write
2D01000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B7ED000
trusted library allocation
page execute and read and write
CE5000
heap
page read and write
C60000
heap
page read and write
CF0000
heap
page read and write
870000
unkown
page readonly
1160000
heap
page read and write
CC5000
heap
page read and write
C80000
heap
page read and write
12D01000
trusted library allocation
page read and write
10C3000
trusted library allocation
page read and write
87E000
unkown
page readonly
7FFD9B83C000
trusted library allocation
page execute and read and write
7FFD9B800000
trusted library allocation
page read and write
2B0E000
stack
page read and write
1B17D000
stack
page read and write
9C4000
stack
page read and write
2CF0000
heap
page execute and read and write
CBC000
heap
page read and write
1110000
heap
page execute and read and write
2B70000
heap
page read and write
There are 55 hidden memdumps, click here to show them.