IOC Report
17305370450a724087c7f6981143cf069ec0c685c80f69cbd81880d785e4b0d131e53bb2a9297.dat-decoded.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\17305370450a724087c7f6981143cf069ec0c685c80f69cbd81880d785e4b0d131e53bb2a9297.dat-decoded.exe
"C:\Users\user\Desktop\17305370450a724087c7f6981143cf069ec0c685c80f69cbd81880d785e4b0d131e53bb2a9297.dat-decoded.exe"
malicious

Domains

Name
IP
Malicious
upe2023.duckdns.org
24.152.38.77
malicious

IPs

IP
Domain
Country
Malicious
24.152.38.77
upe2023.duckdns.org
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\6a2634340fbf8a0a2c038c6263d49fd1
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
1D2000
unkown
page readonly
malicious
5150000
trusted library allocation
page execute and read and write
823000
heap
page read and write
ABE000
stack
page read and write
C10000
heap
page read and write
49AB000
trusted library allocation
page read and write
5B00000
heap
page read and write
49A0000
trusted library allocation
page read and write
49A6000
trusted library allocation
page read and write
630000
trusted library allocation
page read and write
634000
trusted library allocation
page read and write
4A60000
trusted library allocation
page read and write
4A47000
trusted library allocation
page read and write
568000
stack
page read and write
ADB000
trusted library allocation
page execute and read and write
AC6000
trusted library allocation
page execute and read and write
770000
trusted library allocation
page read and write
B9C000
stack
page read and write
4D5C000
stack
page read and write
49E0000
trusted library allocation
page read and write
4A70000
heap
page read and write
77D000
trusted library allocation
page execute and read and write
34C1000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
4DC0000
heap
page execute and read and write
86E000
heap
page read and write
BD0000
trusted library allocation
page read and write
5160000
heap
page read and write
49C1000
trusted library allocation
page read and write
ACA000
trusted library allocation
page execute and read and write
78B000
heap
page read and write
AD2000
trusted library allocation
page read and write
656000
heap
page read and write
64D000
trusted library allocation
page execute and read and write
44C8000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
650000
heap
page read and write
4A50000
trusted library allocation
page read and write
773000
trusted library allocation
page read and write
85D000
heap
page read and write
49CD000
trusted library allocation
page read and write
24BE000
stack
page read and write
7FA60000
trusted library allocation
page execute and read and write
644000
trusted library allocation
page read and write
643000
trusted library allocation
page execute and read and write
C00000
trusted library allocation
page read and write
24C1000
trusted library allocation
page read and write
87B000
heap
page read and write
49C6000
trusted library allocation
page read and write
49A4000
trusted library allocation
page read and write
B5E000
stack
page read and write
5880000
heap
page read and write
640000
trusted library allocation
page read and write
49BE000
trusted library allocation
page read and write
4D19000
stack
page read and write
B00000
trusted library allocation
page execute and read and write
4A80000
heap
page read and write
7C8000
heap
page read and write
610000
heap
page read and write
4FCE000
stack
page read and write
5B10000
heap
page read and write
7A7000
heap
page read and write
7C2000
heap
page read and write
4A40000
trusted library allocation
page read and write
465E000
stack
page read and write
78E000
heap
page read and write
5170000
trusted library allocation
page read and write
49D2000
trusted library allocation
page read and write
AC0000
trusted library allocation
page read and write
AD7000
trusted library allocation
page execute and read and write
1D0000
unkown
page readonly
7BF000
heap
page read and write
B10000
heap
page execute and read and write
4D9E000
stack
page read and write
C09000
trusted library allocation
page read and write
4A3C000
stack
page read and write
BF0000
trusted library allocation
page read and write
49AE000
trusted library allocation
page read and write
5B15000
heap
page read and write
BA0000
heap
page read and write
46A000
stack
page read and write
4ECA000
stack
page read and write
5D0000
heap
page read and write
76E000
stack
page read and write
4FD0000
heap
page read and write
49B2000
trusted library allocation
page read and write
812000
heap
page read and write
5E0000
heap
page read and write
780000
heap
page read and write
4A73000
heap
page read and write
BC0000
heap
page read and write
There are 81 hidden memdumps, click here to show them.