IOC Report
server.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\server.exe
C:\Users\user\Desktop\server.exe
malicious

URLs

Name
IP
Malicious
http://62.173.142.51/drew/JmbbhiAvjQPEy2fkKH5/C20MAuPZ3pJbSKGRkKMPd5/SPaafj6VQ7HYu/DXcg7FNf/0ruIDzX_2BCbmxrV40i30pn/_2Fl7_2FNm/RIlbjnVOY4JvDGYwT/ix3pE9ifpnwW/elLfsP9FYx5/Hz_2B8UXu3bbwG/02zNVOFS_2BJ4kciO41Pm/zImHSH7GQInU2lqP/DXjN6xEv0EFAj_2/BIgT9NZXb86r_2B9_2/BglAnU64W/pXOd3Bpq_2B6reFFKiya/vrT62aiDk4ODnu2FLTN/8RaHDJKURayKv5wSn6_2Be/98LSI75Q/Y.jlk
62.173.142.51
malicious
http://94.103
unknown

Domains

Name
IP
Malicious
windowsupdatebg.s.llnwi.net
178.79.225.128
checklist.skype.com
unknown

IPs

IP
Domain
Country
Malicious
62.173.142.51
unknown
Russian Federation
malicious
94.103.183.153
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2D28000
heap
page read and write
malicious
2D28000
heap
page read and write
malicious
2D28000
heap
page read and write
malicious
2D28000
heap
page read and write
malicious
2D28000
heap
page read and write
malicious
2D28000
heap
page read and write
malicious
2D28000
heap
page read and write
malicious
2D28000
heap
page read and write
malicious
2D28000
heap
page read and write
malicious
251D5E13000
heap
page read and write
1835D6B0000
trusted library allocation
page read and write
2C85C9AF000
heap
page read and write
FD7E3FF000
stack
page read and write
5C2000
heap
page read and write
23DB144C000
heap
page read and write
2E1E36E6000
heap
page read and write
2146E24B000
heap
page read and write
1835D8F0000
heap
page readonly
23DB1443000
heap
page read and write
2C85C922000
heap
page read and write
FD7DFFB000
stack
page read and write
4383FE000
stack
page read and write
2146E25C000
heap
page read and write
ECFB77F000
stack
page read and write
23DB147D000
heap
page read and write
1835CC17000
heap
page read and write
1B52A613000
heap
page read and write
290E000
stack
page read and write
1B52A657000
heap
page read and write
25B49240000
heap
page read and write
ECFBA7F000
stack
page read and write
F970B7F000
stack
page read and write
FC2DB1E000
stack
page read and write
27F06FF000
stack
page read and write
58C000
unclassified section
page readonly
2146DFA0000
heap
page read and write
2C85C000000
heap
page read and write
1835C9A0000
trusted library allocation
page read and write
23DB147B000
heap
page read and write
1B52A713000
heap
page read and write
1AC89C3C000
heap
page read and write
1835CC38000
heap
page read and write
36FA000
stack
page read and write
4AB000
unkown
page readonly
2146E1D0000
remote allocation
page read and write
407000
unkown
page execute and read and write
2C85C902000
heap
page read and write
2C85C090000
heap
page read and write
251D5E66000
heap
page read and write
2C85CA13000
heap
page read and write
23DB1C02000
trusted library allocation
page read and write
23DB13D0000
heap
page read and write
23DB1474000
heap
page read and write
1AC8A202000
trusted library allocation
page read and write
1835CB70000
trusted library allocation
page read and write
F97077B000
stack
page read and write
437FDB000
stack
page read and write
ECFB87F000
stack
page read and write
251DE7E000
stack
page read and write
1B52A4E0000
heap
page read and write
4AB000
unkown
page readonly
23DB1433000
heap
page read and write
2146E25B000
heap
page read and write
23DB145B000
heap
page read and write
2C85C690000
trusted library allocation
page read and write
23DB1446000
heap
page read and write
251D6602000
trusted library allocation
page read and write
F9706FE000
stack
page read and write
FC2E07E000
stack
page read and write
507B77F000
stack
page read and write
2146E100000
trusted library allocation
page read and write
ECFB67F000
stack
page read and write
2146E202000
heap
page read and write
2C85C990000
heap
page read and write
9D000
stack
page read and write
2C85CA00000
heap
page read and write
251D5CA0000
heap
page read and write
25B49202000
heap
page read and write
2C85C1E5000
heap
page read and write
1AC89C13000
heap
page read and write
23DB1477000
heap
page read and write
23DB1483000
heap
page read and write
28CE000
stack
page read and write
1835CDC5000
heap
page read and write
2146E318000
heap
page read and write
2146DF90000
heap
page read and write
2146FC02000
trusted library allocation
page read and write
2C85C96F000
heap
page read and write