IOC Report
17377014056a69536ab12b0f859a66de89b12706e344abb5fe3544307ca437beeb04f04531790.dat-decoded.exe

loading gifProcessesURLsIPsMemdumps1010Label

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\17377014056a69536ab12b0f859a66de89b12706e344abb5fe3544307ca437beeb04f04531790.dat-decoded.exe
"C:\Users\user\Desktop\17377014056a69536ab12b0f859a66de89b12706e344abb5fe3544307ca437beeb04f04531790.dat-decoded.exe"
malicious

URLs

Name
IP
Malicious
85.31.47.24
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
85.31.47.24
unknown
Germany
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
222000
unkown
page readonly
malicious
670000
heap
page read and write
1B2C4000
stack
page read and write
3C0000
heap
page read and write
1B0C5000
stack
page read and write
1B3CE000
stack
page read and write
220000
unkown
page readonly
7FF848D73000
trusted library allocation
page execute and read and write
7FF848E56000
trusted library allocation
page execute and read and write
24AE000
stack
page read and write
673000
heap
page read and write
1AF1F000
stack
page read and write
6F2000
heap
page read and write
1B626000
heap
page read and write
7FF848D74000
trusted library allocation
page read and write
2B2F000
trusted library allocation
page read and write
2500000
heap
page execute and read and write
7FF848E26000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
1B61A000
heap
page read and write
C40000
heap
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
6F4000
heap
page read and write
7FF848DCC000
trusted library allocation
page execute and read and write
7FF848D9D000
trusted library allocation
page execute and read and write
1A640000
trusted library allocation
page read and write
12621000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
12618000
trusted library allocation
page read and write
7FF44AB20000
trusted library allocation
page execute and read and write
7FF848D94000
trusted library allocation
page read and write
653000
heap
page read and write
22C000
unkown
page readonly
1BBBB000
stack
page read and write
840000
trusted library allocation
page read and write
12611000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
1AB9D000
stack
page read and write
1A99D000
heap
page read and write
63D000
heap
page read and write
361000
stack
page read and write
7FF848D70000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1B1CA000
stack
page read and write
260E000
stack
page read and write
8C0000
heap
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
1B5CE000
stack
page read and write
1B660000
heap
page read and write
2611000
trusted library allocation
page read and write
8F0000
heap
page read and write
645000
heap
page read and write
220000
unkown
page readonly
65A000
heap
page read and write
3E0000
heap
page read and write
1B62A000
heap
page read and write
600000
heap
page read and write
C85000
heap
page read and write
6A3000
heap
page read and write
24C3000
heap
page read and write
7FF848D90000
trusted library allocation
page read and write
6EE000
heap
page read and write
820000
trusted library allocation
page read and write
7FF848E2C000
trusted library allocation
page execute and read and write
1B4CE000
stack
page read and write
1B5D0000
heap
page read and write
8F5000
heap
page read and write
7FF848E30000
trusted library allocation
page execute and read and write
1AFC0000
heap
page execute and read and write
3B0000
heap
page read and write
7FF848D82000
trusted library allocation
page read and write
C0D000
stack
page read and write
69D000
heap
page read and write
A0D000
stack
page read and write
8A0000
heap
page read and write
C80000
heap
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
630000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
853000
trusted library allocation
page read and write
24C0000
heap
page read and write
1BCBA000
stack
page read and write
1B9BC000
stack
page read and write
7FF848F20000
trusted library allocation
page read and write
B0C000
stack
page read and write
There are 75 hidden memdumps, click here to show them.