IOC Report
server.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\server.exe
C:\Users\user\Desktop\server.exe
malicious

URLs

Name
IP
Malicious
http://62.173.142.51/drew/kjSOZcm1saisXVulw/nMJdjuoxI5rY/D8rf0rwxZvy/xTo4u6qyfG2cqh/DrEm9eSMLtL3Mt_2BWc8v/UHxdAMkcyeaROQd9/EwiLplzlm9gCiDQ/KqEVG_2BN1u2apPrXD/iYwyB9P6y/3dh1O1SBALUj6nSMRJfH/HHlM5d4xQO9d95rkA_2/Bt59zcQMsfJpOgJC8GeSrH/5REGnF8guLwya/xQ1cfd2Y/w3tCRH4bjXIzu_2B_2F_2B5/MmfV_2FK_2/B5ux_2BgxJ6omqMfT/iSBh1mrWB9_2/BRaJgBOq4gEVdF7OIVd_2B/4.jlk
62.173.142.51
malicious
http://62.173.142.51/
unknown
http://62.173
unknown
http://62.173.142.51/drew/kjSOZcm1saisXVulw/nMJdjuoxI5rY/D8rf0rwxZvy/xTo4u6qyfG2cqh/DrEm9eSMLtL3Mt_2
unknown

Domains

Name
IP
Malicious
checklist.skype.com
unknown

IPs

IP
Domain
Country
Malicious
62.173.142.51
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2C68000
heap
page read and write
malicious
2C68000
heap
page read and write
malicious
2C68000
heap
page read and write
malicious
2C68000
heap
page read and write
malicious
2C68000
heap
page read and write
malicious
2C68000
heap
page read and write
malicious
2C68000
heap
page read and write
malicious
2C68000
heap
page read and write
malicious
2C68000
heap
page read and write
malicious
689000
unclassified section
page readonly
223E000
stack
page read and write
40D000
unkown
page write copy
219E000
stack
page read and write
34FE000
stack
page read and write
22B0000
heap
page read and write
30000
heap
page read and write
2689000
heap
page read and write
2C6B000
heap
page read and write
35FF000
stack
page read and write
70E000
heap
page read and write
681000
unclassified section
page execute read
2708000
heap
page read and write
21FE000
stack
page read and write
22D0000
heap
page read and write
9D000
stack
page read and write
560000
heap
page read and write
32BF000
stack
page read and write
680000
unclassified section
page read and write
34BE000
stack
page read and write
407000
unkown
page execute and read and write
540000
direct allocation
page execute and read and write
2870000
heap
page read and write
67C000
stack
page read and write
690000
heap
page read and write
6CA000
heap
page read and write
717000
heap
page read and write
70F000
heap
page read and write
717000
heap
page read and write
373C000
stack
page read and write
40F000
unkown
page write copy
400000
unkown
page execute and read and write
69A000
heap
page read and write
49E000
unkown
page readonly
281C000
stack
page read and write
68A000
unclassified section
page read and write
285E000
stack
page read and write
41F000
unkown
page read and write
706000
heap
page read and write
363E000
stack
page read and write
68C000
unclassified section
page readonly
30BF000
stack
page read and write
19C000
stack
page read and write
31BF000
stack
page read and write
49E000
unkown
page readonly
550000
direct allocation
page read and write
33BA000
stack
page read and write
6BB000
heap
page read and write
6A8000
heap
page execute and read and write
2310000
heap
page read and write
228D000
stack
page read and write
403000
unkown
page execute and read and write
21B0000
heap
page read and write
2C6B000
heap
page read and write
1F0000
heap
page read and write
405000
unkown
page execute and read and write
401000
unkown
page execute read
21A0000
heap
page read and write
400000
unkown
page readonly
There are 58 hidden memdumps, click here to show them.