IOC Report
1730537046a28265099d74997f6aaf573f6441587128b68a620c5fd7396901e33fe86509f2931.dat-decoded.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1730537046a28265099d74997f6aaf573f6441587128b68a620c5fd7396901e33fe86509f2931.dat-decoded.exe
"C:\Users\user\Desktop\1730537046a28265099d74997f6aaf573f6441587128b68a620c5fd7396901e33fe86509f2931.dat-decoded.exe"
malicious

IPs

IP
Domain
Country
Malicious
104.243.246.120
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
HKEY_CURRENT_USER\SOFTWARE\1df325350b784c
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
92000
unkown
page readonly
malicious
49AC000
stack
page read and write
8F0000
heap
page read and write
682000
trusted library allocation
page execute and read and write
67A000
trusted library allocation
page execute and read and write
C60000
trusted library allocation
page read and write
98000
unkown
page readonly
7A0000
trusted library allocation
page execute and read and write
496B000
stack
page read and write
75C000
stack
page read and write
6CB000
trusted library allocation
page execute and read and write
6A7000
trusted library allocation
page execute and read and write
660000
trusted library allocation
page read and write
49E9000
stack
page read and write
4CCE000
unkown
page read and write
180000
heap
page read and write
1E0000
heap
page execute and read and write
190000
heap
page read and write
620000
heap
page read and write
4A50000
unclassified section
page read and write
4AC0000
heap
page read and write
C90000
heap
page read and write
A20000
heap
page read and write
690000
heap
page read and write
4798000
trusted library allocation
page read and write
C1E000
stack
page read and write
91B000
heap
page read and write
2791000
trusted library allocation
page read and write
85E000
heap
page read and write
6C7000
trusted library allocation
page execute and read and write
920000
heap
page read and write
790000
heap
page read and write
6C2000
trusted library allocation
page read and write
2794000
trusted library allocation
page read and write
492D000
stack
page read and write
680000
trusted library allocation
page read and write
5050000
heap
page read and write
C5C000
stack
page read and write
4AB0000
trusted library allocation
page execute and read and write
4FE0000
heap
page read and write
1DE000
stack
page read and write
672000
trusted library allocation
page execute and read and write
82E000
heap
page read and write
910000
heap
page read and write
70E000
stack
page read and write
3791000
trusted library allocation
page read and write
68A000
trusted library allocation
page execute and read and write
4F9000
stack
page read and write
4F6000
stack
page read and write
810000
trusted library allocation
page read and write
27E5000
trusted library allocation
page read and write
6B2000
trusted library allocation
page execute and read and write
780000
trusted library allocation
page read and write
4AC3000
heap
page read and write
C70000
trusted library allocation
page execute and read and write
6BA000
trusted library allocation
page execute and read and write
90000
unkown
page readonly
4BCE000
stack
page read and write
7F3C0000
trusted library allocation
page execute and read and write
E30000
heap
page read and write
82B000
heap
page read and write
8E6000
heap
page read and write
4AAE000
stack
page read and write
6AA000
trusted library allocation
page execute and read and write
820000
heap
page read and write
696000
heap
page read and write
A30000
heap
page read and write
2809000
trusted library allocation
page read and write
129000
stack
page read and write
4FB0000
heap
page read and write
There are 60 hidden memdumps, click here to show them.