IOC Report
17324340651fd0721b4a9b07278d0f63e6333ccd4883a9dc52eb27994b32b0d64dfb919b72906.dat-decoded.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\17324340651fd0721b4a9b07278d0f63e6333ccd4883a9dc52eb27994b32b0d64dfb919b72906.dat-decoded.exe
"C:\Users\user\Desktop\17324340651fd0721b4a9b07278d0f63e6333ccd4883a9dc52eb27994b32b0d64dfb919b72906.dat-decoded.exe"
malicious

Domains

Name
IP
Malicious
deadpoolstart2025.duckdns.org
181.71.217.114
malicious
ax-0001.ax-msedge.net
150.171.28.10
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
181.71.217.114
deadpoolstart2025.duckdns.org
Colombia
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
F02000
unkown
page readonly
malicious
144D000
heap
page read and write
7FFD343F0000
trusted library allocation
page read and write
F00000
unkown
page readonly
1BB00000
heap
page read and write
7FF419400000
trusted library allocation
page execute and read and write
7FFD3426D000
trusted library allocation
page execute and read and write
FC0000
heap
page read and write
FA0000
heap
page read and write
7FFD3425D000
trusted library allocation
page execute and read and write
312F000
stack
page read and write
7FFD34300000
trusted library allocation
page read and write
1743000
trusted library allocation
page read and write
7FFD34253000
trusted library allocation
page execute and read and write
1B6BC000
stack
page read and write
146D000
heap
page read and write
F90000
heap
page read and write
7FFD34370000
trusted library allocation
page execute and read and write
1430000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
1B4BD000
heap
page read and write
1476000
heap
page read and write
7FFD34254000
trusted library allocation
page read and write
12F4000
stack
page read and write
7FFD34260000
trusted library allocation
page read and write
13133000
trusted library allocation
page read and write
17C0000
heap
page read and write
7FFD3430C000
trusted library allocation
page execute and read and write
1BA00000
heap
page read and write
1770000
heap
page execute and read and write
7FFD34310000
trusted library allocation
page execute and read and write
1750000
heap
page execute and read and write
14B1000
heap
page read and write
1BBA9000
heap
page read and write
1440000
heap
page read and write
7FFD34336000
trusted library allocation
page execute and read and write
7FFD34274000
trusted library allocation
page read and write
14B4000
heap
page read and write
1880000
heap
page read and write
1482000
heap
page read and write
1885000
heap
page read and write
1455000
heap
page read and write
F00000
unkown
page readonly
FE0000
heap
page read and write
14AF000
heap
page read and write
FE5000
heap
page read and write
1740000
trusted library allocation
page read and write
13131000
trusted library allocation
page read and write
1BBA4000
heap
page read and write
1BEFE000
stack
page read and write
7FFD34306000
trusted library allocation
page read and write
13D0000
heap
page read and write
1BFFE000
stack
page read and write
7FFD3427D000
trusted library allocation
page execute and read and write
163E000
stack
page read and write
1BDFE000
stack
page read and write
7FFD34263000
trusted library allocation
page read and write
7FFD34270000
trusted library allocation
page read and write
1484000
heap
page read and write
F16000
unkown
page readonly
3131000
trusted library allocation
page read and write
7FFD342AC000
trusted library allocation
page execute and read and write
There are 52 hidden memdumps, click here to show them.