IOC Report
EDownloader.exe

loading gif

Files

File Path
Type
Category
Malicious
EDownloader.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\Desktop\EasyLog.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EDownloader.exe
"C:\Users\user\Desktop\EDownloader.exe"

URLs

Name
IP
Malicious
https://www.google.com/https://www.baidu.com/GMT
unknown
https://www.google.com/
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown
https://curl.haxx.se/docs/http-cookies.html#
unknown
https://www.baidu.com/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
B8E000
stack
page read and write
D13000
heap
page read and write
621000
unkown
page readonly
CCA000
heap
page read and write
CC0000
heap
page read and write
521000
unkown
page execute read
654000
unkown
page read and write
FBE000
stack
page read and write
BD0000
heap
page read and write
621000
unkown
page readonly
C90000
heap
page read and write
654000
unkown
page write copy
D09000
heap
page read and write
EBE000
stack
page read and write
D12000
heap
page read and write
C34000
heap
page read and write
2C10000
trusted library allocation
page read and write
520000
unkown
page readonly
521000
unkown
page execute read
C20000
heap
page read and write
D06000
heap
page read and write
C40000
heap
page read and write
655000
unkown
page write copy
C99000
heap
page read and write
658000
unkown
page readonly
D2F000
heap
page read and write
C95000
heap
page read and write
BCE000
stack
page read and write
6F6000
stack
page read and write
7FB000
stack
page read and write
D09000
heap
page read and write
656000
unkown
page read and write
658000
unkown
page readonly
CCE000
heap
page read and write
D2F000
heap
page read and write
A60000
heap
page read and write
520000
unkown
page readonly
D15000
heap
page read and write
C30000
heap
page read and write
B40000
heap
page read and write
There are 30 hidden memdumps, click here to show them.