IOC Report
server.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\server.exe
C:\Users\user\Desktop\server.exe
malicious

URLs

Name
IP
Malicious
http://31.41.
unknown
http://5.44.43.17/drew/f9GHjdJnehI_2BX/Ne5g2ordmIOToC91gh/mNbzuN3c2/5AW_2FtlsPkVoHj0AzU6/Pm6UGSYAVX5awiiNdCX/eNOyKJzs_2F6vuQoDvWCQ0/1kQi8Yq7709M2/upQopQi2/s9QJW0HP19fXNX5NpkaC7rS/XtTUHeQq7L/Mwx2fdHiqqVJIhw5T/ErHqsGRIPLQF/P1EQ7mB71HQ/eppTj5uvam1edz/PvmLkUCCoHuafjeSLYKxe/uQzSahqYp69cTJ2o/M6RFmPe3MSlVrTk/KwEVVAo6CnR9Fpgg/f20Iv.jlk
5.44.43.17

Domains

Name
IP
Malicious
checklist.skype.com
unknown

IPs

IP
Domain
Country
Malicious
5.44.43.17
unknown
Russian Federation
31.41.44.108
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
53D8000
heap
page read and write
malicious
53D8000
heap
page read and write
malicious
53D8000
heap
page read and write
malicious
53D8000
heap
page read and write
malicious
53D8000
heap
page read and write
malicious
53D8000
heap
page read and write
malicious
53D8000
heap
page read and write
malicious
53D8000
heap
page read and write
malicious
53D8000
heap
page read and write
malicious
27696E80000
heap
page read and write
27697105000
heap
page read and write
27696F85000
heap
page read and write
5D2F000
stack
page read and write
2BB0000
heap
page read and write
27697C00000
trusted library allocation
page read and write
4F00000
heap
page read and write
411000
unkown
page write copy
B88257D000
stack
page read and write
4E38000
heap
page read and write
53DB000
heap
page read and write
401000
unkown
page execute read
53DB000
heap
page read and write
4F4E000
stack
page read and write
4940000
heap
page read and write
4E38000
heap
page read and write
27696F30000
trusted library allocation
page read and write
27696F48000
heap
page read and write
4E38000
heap
page read and write
4DB9000
heap
page read and write
30000
heap
page read and write
5B2C000
stack
page read and write
403000
unkown
page execute and read and write
2BC8000
heap
page execute and read and write
27697100000
heap
page read and write
4FE0000
heap
page read and write
2B40000
heap
page read and write
4ECE000
stack
page read and write
27696FA9000
heap
page read and write
27696F8D000
heap
page read and write
4E38000
heap
page read and write
27697110000
trusted library allocation
page read and write
4A40000
heap
page read and write
479C000
stack
page read and write
2B99000
unclassified section
page readonly
498E000
stack
page read and write
27696D40000
heap
page read and write
27696F50000
heap
page read and write
19C000
stack
page read and write
276970D0000
heap
page readonly
47A0000
heap
page read and write
2BDE000
heap
page read and write
5E2E000
stack
page read and write
2AE9000
unkown
page readonly
276970C0000
trusted library allocation
page read and write
2B20000
direct allocation
page execute and read and write
B8826F9000
stack
page read and write
27696FA5000
heap
page read and write
400000
unkown
page readonly
B88247F000
stack
page read and write
4990000
heap
page read and write
2C25000
heap
page read and write
2C17000
heap
page read and write
5A2F000
stack
page read and write
582F000
stack
page read and write
27697E10000
trusted library allocation
page read and write
405000
unkown
page execute and read and write
48AC000
stack
page read and write
1F0000
heap
page read and write
410000
unkown
page write copy
27696EA0000
heap
page read and write
27696F8D000
heap
page read and write
592F000
stack
page read and write
4A1E000
stack
page read and write
27696D50000
trusted library allocation
page read and write
490E000
stack
page read and write
4E38000
heap
page read and write
B8824FF000
stack
page read and write
27696F40000
heap
page read and write
400000
unkown
page execute and read and write
4E38000
heap
page read and write
27696F10000
trusted library allocation
page read and write
27696F20000
trusted library allocation
page read and write
407000
unkown
page execute and read and write
4E38000
heap
page read and write
B88267E000
stack
page read and write
49DE000
stack
page read and write
4E8D000
stack
page read and write
27697E50000
trusted library allocation
page read and write
B8821FB000
stack
page read and write
2BBA000
heap
page read and write
427000
unkown
page read and write
2B90000
unclassified section
page read and write
276970E0000
trusted library allocation
page read and write
2AE9000
unkown
page readonly
B88277F000
stack
page read and write
27697109000
heap
page read and write
2B30000
direct allocation
page read and write
9D000
stack
page read and write
B8825F9000
stack
page read and write
410000
unkown
page read and write
2B9A000
unclassified section
page read and write
40F000
unkown
page execute read
2B91000
unclassified section
page execute read
4E38000
heap
page read and write
27696F8D000
heap
page read and write
2B9C000
unclassified section
page readonly
4E38000
heap
page read and write
5C2A000
stack
page read and write
There are 98 hidden memdumps, click here to show them.