IOC Report
server.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\server.exe
C:\Users\user\Desktop\server.exe
malicious

URLs

Name
IP
Malicious
http://62.173.142.51/drew/HAyCvnAuEOt2F7C/qtqWyxm4JAodLmr2fA/5rIXi6c7a/A8VZuoBaw9m9tdhD88nR/7GG7oRWMVub4oY7_2BO/OtqOu0B56I1LS_2FdHx85_/2FJqjErmgnBnc/fR5wyLVd/zR03KdsDmrJhOpNTELG8Ap7/tRbeA0rm1D/Ahqeb_2B_2Fx66NAH/sAJz2fkfv30m/_2B2yXv1C0u/OTAlb_2Bjz3Xu9/n7nMr5QIveWoLOKJgWpZZ/FZTPBpvOXNqs9vrA/ayBpSg1Jbp3hq/vUJdeVU7/u.jlk
62.173.142.51
malicious
http://94.103
unknown

Domains

Name
IP
Malicious
checklist.skype.com
unknown

IPs

IP
Domain
Country
Malicious
62.173.142.51
unknown
Russian Federation
malicious
94.103.183.153
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
2190000
direct allocation
page execute and read and write
malicious
35B8000
heap
page read and write
malicious
35B8000
heap
page read and write
malicious
2F3CDBD0000
trusted library allocation
page read and write
F9F7B7F000
stack
page read and write
2F3CDC5F000
heap
page read and write
21EC000
stack
page read and write
2F3CDD10000
trusted library allocation
page read and write
35BB000
heap
page read and write
283E000
stack
page read and write
370E000
stack
page read and write
2BDC000
unclassified section
page readonly
6A4000
heap
page read and write
98000
stack
page read and write
2F3CDB40000
heap
page read and write
2200000
direct allocation
page read and write
2153000
heap
page read and write
21F6000
heap
page read and write
2F3CEA60000
unclassified section
page read and write
2F3CDC00000
trusted library allocation
page read and write
47A000
unkown
page write copy
394F000
stack
page read and write
630000
heap
page read and write
20F0000
direct allocation
page execute and read and write
63A000
heap
page read and write
F9F7C79000
stack
page read and write
2C3E000
stack
page read and write
31BC000
stack
page read and write
3029000
heap
page read and write
2F3CDC77000
heap
page read and write
30000
heap
page read and write
405000
unkown
page execute and read and write
F9F7A7B000
stack
page read and write
35BB000
heap
page read and write
2BD9000
unclassified section
page readonly
2F3CEA80000
heap
page readonly
2F3CDB75000
heap
page read and write
403000
unkown
page execute and read and write
293F000
stack
page read and write
F9F7D79000
stack
page read and write
2F3CEAA0000
trusted library allocation
page read and write
5C0000
heap
page read and write
27FC000
stack
page read and write
2BF0000
heap
page read and write
2F3CD9E0000
heap
page read and write
2F3CDB70000
heap
page read and write
30A8000
heap
page read and write
6AF000
heap
page read and write
2F3CE850000
trusted library allocation
page read and write
6BE000
heap
page read and write
2BBF000
stack
page read and write
2F3CDC5F000
heap
page read and write
2C7D000
stack
page read and write
F9F7BFA000
stack
page read and write
36CA000
stack
page read and write
2F3CDC5F000
heap
page read and write
2180000
heap
page read and write
2BDA000
unclassified section
page read and write
694000
heap
page read and write
F9F7CFF000
stack
page read and write
400000
unkown
page readonly
2F3CDC10000
heap
page read and write
2170000
direct allocation
page execute and read and write
65E000
heap
page read and write
F9F7DFF000
stack
page read and write
20E0000
heap
page read and write
2F3CEA90000
trusted library allocation
page read and write
2F3CDB20000
heap
page read and write
31C0000
heap
page read and write
401000
unkown
page execute read
2F3CDC57000
heap
page read and write
2F3CDBE0000
trusted library allocation
page read and write
2F3CDC18000
heap
page read and write
477000
unkown
page write copy
2F3CDBC0000
trusted library allocation
page read and write
21F0000
heap
page read and write
407000
unkown
page execute and read and write
19C000
stack
page read and write
2F3CDB79000
heap
page read and write
2150000
heap
page read and write
297E000
stack
page read and write
30A8000
heap
page read and write
2A7F000
stack
page read and write
F9F7AFF000
stack
page read and write
2F3CD9F0000
trusted library allocation
page read and write
384E000
stack
page read and write
400000
unkown
page execute and read and write
21A0000
direct allocation
page execute and read and write
2BD1000
unclassified section
page execute read
47F000
unkown
page readonly
6B7000
heap
page read and write
2ABE000
stack
page read and write
2BD0000
unclassified section
page read and write
477000
unkown
page read and write