IOC Report
xPvEDYX7g1YE.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\xPvEDYX7g1YE.exe
"C:\Users\user\Desktop\xPvEDYX7g1YE.exe"
malicious

Domains

Name
IP
Malicious
firmes777.duckdns.org
179.13.0.175
malicious

IPs

IP
Domain
Country
Malicious
179.13.0.175
firmes777.duckdns.org
Colombia
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
432000
unkown
page readonly
malicious
26C0000
heap
page read and write
2870000
heap
page execute and read and write
A5A000
heap
page read and write
CBE000
stack
page read and write
3881000
trusted library allocation
page read and write
A23000
trusted library allocation
page execute and read and write
2881000
trusted library allocation
page read and write
4D36000
heap
page read and write
840000
heap
page read and write
A38000
heap
page read and write
A6B000
heap
page read and write
C4A000
trusted library allocation
page execute and read and write
1000000
heap
page read and write
D20000
heap
page read and write
8D0000
heap
page read and write
905000
heap
page read and write
4EEC000
stack
page read and write
900000
heap
page read and write
280E000
stack
page read and write
2628000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
4CC0000
heap
page read and write
5D9000
stack
page read and write
C5B000
trusted library allocation
page execute and read and write
C2E000
stack
page read and write
A30000
heap
page read and write
D10000
trusted library allocation
page read and write
A69000
heap
page read and write
A51000
heap
page read and write
4DC000
stack
page read and write
A10000
trusted library allocation
page read and write
4D4E000
heap
page read and write
88E000
stack
page read and write
430000
unkown
page readonly
A24000
trusted library allocation
page read and write
A2D000
trusted library allocation
page execute and read and write
C57000
trusted library allocation
page execute and read and write
CFE000
stack
page read and write
C47000
trusted library allocation
page execute and read and write
FD0000
trusted library allocation
page read and write
C42000
trusted library allocation
page read and write
A4E000
heap
page read and write
4DE0000
heap
page execute and read and write
9E0000
heap
page read and write
D00000
trusted library allocation
page execute and read and write
442000
unkown
page readonly
497E000
stack
page read and write
27CE000
stack
page read and write
There are 39 hidden memdumps, click here to show them.