IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://193.169.105.15:3000/download/seyhhdBuild.exeC:
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF6D1C21000
unkown
page execute read
3BE99FE000
stack
page read and write
1A3BBB30000
heap
page read and write
1A3BB962000
heap
page read and write
7FF6D1A21000
unkown
page execute read
1A3BBA20000
trusted library allocation
page read and write
7FF6D1A10000
unkown
page readonly
7FF6D1A10000
unkown
page readonly
1A3BB952000
heap
page read and write
7FF6D1C20000
unkown
page read and write
3BE956B000
stack
page read and write
1A3BB958000
heap
page read and write
7FF6D1A20000
unkown
page readonly
1A3BBA64000
heap
page read and write
7FF6D1A5B000
unkown
page execute read
1A3BB963000
heap
page read and write
1A3BB7B0000
heap
page read and write
3BE98FE000
stack
page read and write
7FF6D1F9B000
unkown
page readonly
1A3BB92C000
heap
page read and write
1A3BB8B0000
heap
page read and write
1A3BB890000
heap
page read and write
1A3BB8E0000
heap
page read and write
1A3BB920000
heap
page read and write
1A3BB900000
trusted library allocation
page read and write
1A3BB952000
heap
page read and write
7FF6D1A55000
unkown
page read and write
1A3BB950000
heap
page read and write
7FF6D1A11000
unkown
page execute read
7FF6D1A1B000
unkown
page readonly
7FF6D1C21000
unkown
page execute read
7FF6D1F9B000
unkown
page readonly
1A3BBA60000
heap
page read and write
7FF6D1A1F000
unkown
page read and write
1A3BBB20000
heap
page read and write
There are 25 hidden memdumps, click here to show them.