IOC Report
1727269807db8b68b2c9b1c9bdd42030655a5e439e971ba77503b2390bf7da0c0928072d74511.dat-decoded.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1727269807db8b68b2c9b1c9bdd42030655a5e439e971ba77503b2390bf7da0c0928072d74511.dat-decoded.exe
"C:\Users\user\Desktop\1727269807db8b68b2c9b1c9bdd42030655a5e439e971ba77503b2390bf7da0c0928072d74511.dat-decoded.exe"
malicious

URLs

Name
IP
Malicious
135.224.23.113
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
135.224.23.113
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
A62000
unkown
page readonly
malicious
2E71000
trusted library allocation
page read and write
malicious
1BC1C000
stack
page read and write
1C33A000
stack
page read and write
7FF848E22000
trusted library allocation
page read and write
1BC20000
heap
page read and write
F50000
heap
page read and write
1090000
trusted library allocation
page read and write
1B2ED000
stack
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
1B914000
stack
page read and write
A60000
unkown
page readonly
12E78000
trusted library allocation
page read and write
EEC000
heap
page read and write
11DD000
stack
page read and write
1BE30000
heap
page read and write
10D5000
heap
page read and write
7FF848E34000
trusted library allocation
page read and write
F21000
heap
page read and write
1BB1C000
stack
page read and write
1395000
heap
page read and write
1B81A000
stack
page read and write
10D0000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
FA2000
heap
page read and write
BA4000
stack
page read and write
7FF848E10000
trusted library allocation
page read and write
1B713000
heap
page read and write
2EB6000
trusted library allocation
page read and write
12DE000
stack
page read and write
12E7E000
trusted library allocation
page read and write
1BC7B000
heap
page read and write
1060000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
2E0E000
stack
page read and write
F54000
heap
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
2DCE000
stack
page read and write
F0A000
heap
page read and write
1350000
heap
page execute and read and write
EFF000
heap
page read and write
2C70000
heap
page read and write
FE0000
heap
page read and write
EF5000
heap
page read and write
1BC72000
heap
page read and write
1C43E000
stack
page read and write
FA4000
heap
page read and write
EE0000
heap
page read and write
1320000
heap
page read and write
1020000
heap
page read and write
1093000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1C23C000
stack
page read and write
1B710000
heap
page read and write
A60000
unkown
page readonly
7FF4EA510000
trusted library allocation
page execute and read and write
F13000
heap
page read and write
2C8E000
heap
page read and write
12E71000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1390000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
7FF848EC0000
trusted library allocation
page read and write
1BC35000
heap
page read and write
F24000
heap
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
1BC88000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
BF0000
heap
page read and write
F11000
heap
page read and write
1C03C000
stack
page read and write
2C3F000
stack
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF848FC1000
trusted library allocation
page read and write
1AEA0000
trusted library allocation
page read and write
2E60000
heap
page execute and read and write
FB9000
heap
page read and write
1BA1E000
stack
page read and write
1C13C000
stack
page read and write
1000000
heap
page read and write
There are 75 hidden memdumps, click here to show them.