IOC Report
TLS20242025.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TLS20242025.exe
"C:\Users\user\Desktop\TLS20242025.exe"
malicious
C:\Users\user\Desktop\TLS20242025.exe
"C:\Users\user\Desktop\TLS20242025.exe"
malicious

URLs

Name
IP
Malicious
http://aborters.duckdns.org:8081
unknown
malicious
http://anotherarmy.dns.army:8081
unknown
malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:123716%0D%0ADate%20a
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://www.office.com/P
unknown
https://www.office.com/lB
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:123716%0D%0ADate%20and%20Time:%2026/09/2024%20/%2020:05:16%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20123716%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
193.122.130.0
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://chrome.google.com/webstore?hl=enP
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
193.122.130.0

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
193.122.130.0
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TLS20242025_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TLS20242025_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TLS20242025_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TLS20242025_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TLS20242025_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TLS20242025_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TLS20242025_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TLS20242025_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TLS20242025_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TLS20242025_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TLS20242025_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TLS20242025_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TLS20242025_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TLS20242025_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2B11000
trusted library allocation
page read and write
malicious
38E1000
trusted library allocation
page read and write
malicious
621E000
stack
page read and write
3B1F000
trusted library allocation
page read and write
2C1B000
trusted library allocation
page read and write
2CA2000
trusted library allocation
page read and write
2B82000
trusted library allocation
page read and write
2D92000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
5022000
trusted library allocation
page read and write
3B24000
trusted library allocation
page read and write
3D6B000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
2BB4000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
3D97000
trusted library allocation
page read and write
6920000
trusted library allocation
page execute and read and write
68C0000
trusted library allocation
page execute and read and write
3DB8000
trusted library allocation
page read and write
DE5000
heap
page read and write
2BC0000
trusted library allocation
page read and write
5B0D000
heap
page read and write
2DE3000
trusted library allocation
page read and write
3B2B000
trusted library allocation
page read and write
4EE3000
trusted library allocation
page read and write
6840000
trusted library allocation
page execute and read and write
3B11000
trusted library allocation
page read and write
2E0F000
trusted library allocation
page read and write
117F000
stack
page read and write
4CAE000
stack
page read and write
68F0000
trusted library allocation
page read and write
5011000
trusted library allocation
page read and write
5270000
heap
page read and write
3DC4000
trusted library allocation
page read and write
67D0000
trusted library allocation
page execute and read and write
54DE000
stack
page read and write
3CC5000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
3E0E000
trusted library allocation
page read and write
2D1A000
trusted library allocation
page read and write
2C98000
trusted library allocation
page read and write
665F000
stack
page read and write
2D74000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
C5E000
stack
page read and write
5B35000
heap
page read and write
FF4000
trusted library allocation
page read and write
3DC7000
trusted library allocation
page read and write
3BC9000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
2E1E000
trusted library allocation
page read and write
2CCB000
trusted library allocation
page read and write
3E97000
trusted library allocation
page read and write
532000
unkown
page readonly
4FFE000
trusted library allocation
page read and write
3CED000
trusted library allocation
page read and write
3E20000
trusted library allocation
page read and write
ED7000
heap
page read and write
5260000
heap
page read and write
286E000
stack
page read and write
4DCB000
trusted library allocation
page read and write
ED0000
heap
page read and write
4E10000
trusted library allocation
page read and write
D81000
heap
page read and write
3EAC000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
645D000
stack
page read and write
5CB5000
heap
page read and write
6980000
heap
page read and write
6A9000
stack
page read and write
635C000
heap
page read and write
CF7000
heap
page read and write
5DBE000
stack
page read and write
DB9000
heap
page read and write
2BBC000
trusted library allocation
page read and write
4DF2000
trusted library allocation
page read and write
28D0000
heap
page read and write
2D78000
trusted library allocation
page read and write
2DE7000
trusted library allocation
page read and write
B20000
heap
page read and write
3DCA000
trusted library allocation
page read and write
50DE000
stack
page read and write
4ED0000
heap
page execute and read and write
1020000
trusted library allocation
page read and write
6820000
trusted library allocation
page execute and read and write
3E1B000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
2ED3000
trusted library allocation
page read and write
6930000
heap
page read and write
1180000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
3C32000
trusted library allocation
page read and write
A4A000
heap
page read and write
1022000
trusted library allocation
page read and write
2E7D000
trusted library allocation
page read and write
2E9C000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
5B00000
heap
page read and write
A26000
heap
page read and write
A00000
heap
page read and write
3DCF000
trusted library allocation
page read and write
B40000
heap
page read and write
5DF5000
heap
page read and write
26E0000
trusted library allocation
page read and write
9A7000
stack
page read and write
7A7000
stack
page read and write
679E000
stack
page read and write
3BEE000
trusted library allocation
page read and write
530000
unkown
page readonly
29A0000
heap
page execute and read and write
67A0000
trusted library allocation
page read and write
5B80000
heap
page read and write
6800000
trusted library allocation
page read and write
26AD000
trusted library allocation
page execute and read and write
2EAB000
trusted library allocation
page read and write
2B86000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
28AE000
stack
page read and write
3C52000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
2DE5000
trusted library allocation
page read and write
669E000
stack
page read and write
26B0000
trusted library allocation
page read and write
2CC5000
trusted library allocation
page read and write
2EA2000
trusted library allocation
page read and write
67F0000
trusted library allocation
page execute and read and write
101A000
trusted library allocation
page execute and read and write
3C06000
trusted library allocation
page read and write
5280000
heap
page read and write
2BF6000
trusted library allocation
page read and write
50F0000
heap
page read and write
5B21000
heap
page read and write
26B6000
trusted library allocation
page execute and read and write
2C19000
trusted library allocation
page read and write
C10000
heap
page read and write
2CD3000
trusted library allocation
page read and write
A41000
heap
page read and write
A34000
heap
page read and write
2BC8000
trusted library allocation
page read and write
3DC1000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
4E53000
heap
page read and write
8AA000
stack
page read and write
DB7000
heap
page read and write
4E50000
heap
page read and write
5C00000
trusted library allocation
page read and write
26BA000
trusted library allocation
page execute and read and write
2DBB000
trusted library allocation
page read and write
11A0000
heap
page execute and read and write
4FF0000
trusted library allocation
page read and write
DB3000
heap
page read and write
2CA7000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
51E9000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
FC0000
heap
page read and write
67CD000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
3B39000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
5172000
trusted library allocation
page read and write
299E000
stack
page read and write
3BDF000
trusted library allocation
page read and write
509D000
stack
page read and write
501D000
trusted library allocation
page read and write
53BB000
stack
page read and write
6830000
trusted library allocation
page execute and read and write
2E4F000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
2C9C000
trusted library allocation
page read and write
2EA5000
trusted library allocation
page read and write
2BB8000
trusted library allocation
page read and write
5B29000
heap
page read and write
4E25000
trusted library allocation
page read and write
51A0000
heap
page read and write
2C93000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
2DC2000
trusted library allocation
page read and write
4A7D000
stack
page read and write
64DE000
stack
page read and write
1000000
trusted library allocation
page read and write
6EC0000
heap
page read and write
3D1B000
trusted library allocation
page read and write
2DC8000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2E18000
trusted library allocation
page read and write
A0A000
heap
page read and write
4E1F000
trusted library allocation
page read and write
26CB000
trusted library allocation
page execute and read and write
2AAE000
stack
page read and write
2E12000
trusted library allocation
page read and write
4DED000
trusted library allocation
page read and write
11B0000
heap
page read and write
1012000
trusted library allocation
page read and write
B10000
heap
page read and write
6ECE000
heap
page read and write
2DE1000
trusted library allocation
page read and write
2DCE000
trusted library allocation
page read and write
63A3000
heap
page read and write
ABA000
heap
page read and write
28B0000
trusted library allocation
page read and write
3E08000
trusted library allocation
page read and write
1070000
heap
page read and write
53E0000
trusted library allocation
page execute and read and write
2D14000
trusted library allocation
page read and write
2B6C000
trusted library allocation
page read and write
5250000
trusted library section
page readonly
2760000
heap
page execute and read and write
272E000
stack
page read and write
2AEC000
stack
page read and write
2CD8000
trusted library allocation
page read and write
3E3A000
trusted library allocation
page read and write
5016000
trusted library allocation
page read and write
3DBC000
trusted library allocation
page read and write
A0E000
heap
page read and write
2D9B000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
2BCC000
trusted library allocation
page read and write
5174000
trusted library allocation
page read and write
6320000
heap
page read and write
65DE000
stack
page read and write
2CC9000
trusted library allocation
page read and write
DE0000
heap
page read and write
68D7000
trusted library allocation
page read and write
28B5000
trusted library allocation
page read and write
3E13000
trusted library allocation
page read and write
2B78000
trusted library allocation
page read and write
3EBF000
trusted library allocation
page read and write
C5E000
stack
page read and write
4DE1000
trusted library allocation
page read and write
4E04000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
75C2000
trusted library allocation
page read and write
B45000
heap
page read and write
2D96000
trusted library allocation
page read and write
26C2000
trusted library allocation
page read and write
3D4C000
trusted library allocation
page read and write
3B31000
trusted library allocation
page read and write
2CCD000
trusted library allocation
page read and write
4FFB000
trusted library allocation
page read and write
3D37000
trusted library allocation
page read and write
3D18000
trusted library allocation
page read and write
D70000
heap
page read and write
1016000
trusted library allocation
page execute and read and write
2730000
heap
page read and write
5200000
trusted library section
page read and write
4DE6000
trusted library allocation
page read and write
CC8000
heap
page read and write
2D7F000
trusted library allocation
page read and write
661E000
stack
page read and write
67BA000
trusted library allocation
page read and write
3EED000
trusted library allocation
page read and write
4FF6000
trusted library allocation
page read and write
2694000
trusted library allocation
page read and write
67B4000
trusted library allocation
page read and write
631E000
stack
page read and write
5DD0000
heap
page read and write
3C68000
trusted library allocation
page read and write
269D000
trusted library allocation
page execute and read and write
4EE9000
trusted library allocation
page read and write
55DE000
stack
page read and write
3EE9000
trusted library allocation
page read and write
50DE000
stack
page read and write
2D88000
trusted library allocation
page read and write
5CB0000
heap
page read and write
100D000
trusted library allocation
page execute and read and write
A48000
heap
page read and write
5B5F000
heap
page read and write
CAE000
stack
page read and write
ACB000
heap
page read and write
FFD000
trusted library allocation
page execute and read and write
5B5B000
heap
page read and write
2693000
trusted library allocation
page execute and read and write
51C0000
heap
page read and write
5230000
trusted library allocation
page read and write
102B000
trusted library allocation
page execute and read and write
50F3000
heap
page read and write
5DDA000
heap
page read and write
2680000
trusted library allocation
page read and write
FBE000
stack
page read and write
C60000
heap
page read and write
26C7000
trusted library allocation
page execute and read and write
67B6000
trusted library allocation
page read and write
500A000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
5210000
trusted library allocation
page execute and read and write
67C0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page execute and read and write
FF3000
trusted library allocation
page execute and read and write
3CDA000
trusted library allocation
page read and write
2750000
trusted library allocation
page execute and read and write
3E24000
trusted library allocation
page read and write
CC0000
heap
page read and write
26A3000
trusted library allocation
page read and write
1050000
trusted library allocation
page execute and read and write
2B00000
heap
page read and write
1025000
trusted library allocation
page execute and read and write
297D000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
1027000
trusted library allocation
page execute and read and write
2E1A000
trusted library allocation
page read and write
2B8A000
trusted library allocation
page read and write
649F000
stack
page read and write
2BC4000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
2EA7000
trusted library allocation
page read and write
AE7000
heap
page read and write
D5E000
stack
page read and write
500E000
trusted library allocation
page read and write
51E3000
trusted library allocation
page read and write
2690000
trusted library allocation
page read and write
5DC0000
heap
page read and write
CF5000
heap
page read and write
50E0000
trusted library section
page read and write
3B78000
trusted library allocation
page read and write
635A000
heap
page read and write
4FDE000
stack
page read and write
6810000
trusted library allocation
page execute and read and write
4DDE000
trusted library allocation
page read and write
There are 321 hidden memdumps, click here to show them.