IOC Report
server.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\server.exe
C:\Users\user\Desktop\server.exe
malicious

URLs

Name
IP
Malicious
http://62.173.142.51/drew/LtSfNQUl38_2FDY/ZDiSMzVFZT8P12cRCR/wFifr57eD/E3QMnm3R09oCMKEqF_2B/hL6JR5JZ5RzfthDXDEL/QXKRNOEf5KUe4lOcOOnAWe/S7o7DbUVctcaA/rpMZ8DLG/JY7e7d4k8lkZ3XBI4AKdEOg/JVfUtdkUf4/lNi_2BCjIiDW9oaJC/JQY6K3BrLDok/oxD2Jl0W61e/9srw8Wtoy2vC2X/zMM4BIJQlabgMVrliSBbF/6bQOsnbMJ830WmQE/8fSuWxKUlXv_2FI/uixxrgswLUL3BF62nt/g_2FwBw.jlk
62.173.142.51
malicious
http://94.103.183.153/drew/45gwNn56tT_2B9DMppZLO6W/TY9yvuDrMO/NH6qQboGYLppgh3VY/fD0WTQxe_2Fc/8f_2F5pvK0k/5pc3M5q5_2FYt3/4jI4o0hOzWp0EtrTpDvY_/2BQflNotHm9IIPtO/mq9Dn1qgGdHgrmy/Xs1KDbSG454LVnULzq/seDw5rP1a/cxTqaNB2y_2FVHNjeaDU/t9me_2FSk8oJCJKH9Zx/OgVVwZaLyIQ6GcJMvVJZLX/3Iqej_2B4U8Se/qkLHdDp4/xkbU42A8qDuBydy0uePKn7_/2FGqiSuVoF/gyerokGYzhvdYj/f.jlk
94.103.183.153
malicious
http://94.103
unknown

Domains

Name
IP
Malicious
checklist.skype.com
unknown

IPs

IP
Domain
Country
Malicious
62.173.142.51
unknown
Russian Federation
malicious
94.103.183.153
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2E28000
heap
page read and write
malicious
2E28000
heap
page read and write
malicious
2E28000
heap
page read and write
malicious
2E28000
heap
page read and write
malicious
2E28000
heap
page read and write
malicious
2E28000
heap
page read and write
malicious
2E28000
heap
page read and write
malicious
2E28000
heap
page read and write
malicious
2E28000
heap
page read and write
malicious
21F0000
heap
page read and write
60A000
heap
page read and write
21EE000
stack
page read and write
403000
unkown
page execute and read and write
2E2B000
heap
page read and write
19C000
stack
page read and write
682000
heap
page read and write
377F000
stack
page read and write
2A30000
heap
page read and write
68B000
heap
page read and write
337F000
stack
page read and write
2230000
heap
page read and write
42C000
unkown
page read and write
600000
heap
page read and write
357A000
stack
page read and write
550000
direct allocation
page execute and read and write
9D000
stack
page read and write
23AE000
stack
page read and write
57A000
unclassified section
page read and write
41A000
unkown
page write copy
2E2B000
heap
page read and write
401000
unkown
page execute read
405000
unkown
page execute and read and write
57C000
unclassified section
page readonly
233C000
stack
page read and write
4AB000
unkown
page readonly
2480000
heap
page read and write
367F000
stack
page read and write
29CE000
stack
page read and write
4A9000
unkown
page read and write
400000
unkown
page execute and read and write
2878000
heap
page read and write
675000
heap
page read and write
41A000
unkown
page write copy
682000
heap
page read and write
21AE000
stack
page read and write
27F9000
heap
page read and write
245D000
stack
page read and write
5CC000
stack
page read and write
571000
unclassified section
page execute read
675000
heap
page read and write
560000
direct allocation
page read and write
30000
heap
page read and write
570000
unclassified section
page read and write
40F000
unkown
page execute read
2E2B000
heap
page read and write
407000
unkown
page execute and read and write
579000
unclassified section
page readonly
327F000
stack
page read and write
347C000
stack
page read and write
2360000
heap
page read and write
620000
heap
page execute and read and write
633000
heap
page read and write
23EE000
stack
page read and write
298F000
stack
page read and write
2410000
heap
page read and write
66A000
heap
page read and write
4AB000
unkown
page readonly
580000
heap
page read and write
400000
unkown
page readonly
686000
heap
page read and write
1F0000
heap
page read and write
2A0E000
stack
page read and write
There are 62 hidden memdumps, click here to show them.