IOC Report
server.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\server.exe
C:\Users\user\Desktop\server.exe
malicious

URLs

Name
IP
Malicious
http://62.173.142.81/drew/I7U6Mmh_2/FlKCcCvddS2IkyhwmZhI/_2BnhFHclgzHZzSm1pz/IqwUwcf_2FOd8gS4FMlTC_/2BvcUI51vMc8r/suycgkYX/cZV8UZtrltZ4gcEVM5eiX0K/R8EhhQWcO2/VNo_2Fqah4SvEVbxz/wWOUzBOqDpod/WDVr2wrvR3Y/HsF0WzspqprqGt/jOCmPbtKRTDFN85npSKPi/bt89T8vUv5SwQ97g/AKkdy2tkCMuBk2l/mwXR08zcp_2FWg_2Fs/Xeh1WbyLh/PXYBkYg4ElsUFknKnI2W/_2FJmsR6G_2F/BQ3Eo_2F/X.jlk
62.173.142.81
malicious
http://62.173
unknown

Domains

Name
IP
Malicious
checklist.skype.com
unknown

IPs

IP
Domain
Country
Malicious
62.173.142.81
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2B88000
heap
page read and write
malicious
2B88000
heap
page read and write
malicious
2B88000
heap
page read and write
malicious
2B88000
heap
page read and write
malicious
2B88000
heap
page read and write
malicious
2B88000
heap
page read and write
malicious
2B88000
heap
page read and write
malicious
2B88000
heap
page read and write
malicious
2B88000
heap
page read and write
malicious
218C7780000
heap
page read and write
218C775B000
heap
page read and write
21A57102000
heap
page read and write
2778000
heap
page read and write
218C7C89000
heap
page read and write
2A61A5AF000
heap
page read and write
1EA03508000
heap
page read and write
218C7772000
heap
page read and write
218C772A000
heap
page read and write
A618D7F000
stack
page read and write
218C7762000
heap
page read and write
DE13779000
stack
page read and write
2A61A5B3000
heap
page read and write
218C7774000
heap
page read and write
218C7729000
heap
page read and write
2A61A59E000
heap
page read and write
2A61A5B3000
heap
page read and write
2A61A59F000
heap
page read and write
218C772E000
heap
page read and write
218C7729000
heap
page read and write
202B6702000
heap
page read and write
218C774D000
heap
page read and write
218C7729000
heap
page read and write
218C7C58000
heap
page read and write
6F9E58E000
stack
page read and write
218C7CD8000
heap
page read and write
2A61A5B2000
heap
page read and write
345E000
stack
page read and write
21A56EA0000
heap
page read and write
218C7732000
heap
page read and write
231E000
stack
page read and write
5BA000
unclassified section
page read and write
218C7763000
heap
page read and write
218C7762000
heap
page read and write
218C772D000
heap
page read and write
218C772E000
heap
page read and write
218C776E000
heap
page read and write
2A61A58E000
heap
page read and write
218C7783000
heap
page read and write
2A61A5B2000
heap
page read and write
218C6D4A000
heap
page read and write
218C7C00000
heap
page read and write
218C772E000
heap
page read and write
218C775D000
heap
page read and write
218C7775000
heap
page read and write
218C7CEE000
heap
page read and write
29A3AFF0000
trusted library allocation
page read and write
2A61AA02000
heap
page read and write
1EA03390000
trusted library allocation
page read and write
30000
heap
page read and write
218C7CCB000
heap
page read and write
2A61A5B5000
heap
page read and write
218C772A000
heap
page read and write
21A57802000
trusted library allocation
page read and write
2EE13677000
heap
page read and write
2A61A55B000
heap
page read and write
218C7783000
heap
page read and write
202B6664000
heap
page read and write
198EA7F000
stack
page read and write
218C7CD1000
heap
page read and write
218C7735000
heap
page read and write
218C7CBE000
heap
page read and write
218C7CE7000
heap
page read and write
2A61A5B5000
heap
page read and write
218C7771000
heap
page read and write
218C775A000
heap
page read and write
1EA0345A000
heap
page read and write
218C777F000
heap
page read and write
218C7752000
heap
page read and write
2A61A5B4000
heap
page read and write
218C7778000
heap
page read and write
1EA03460000
heap
page read and write
218C7CC5000
heap
page read and write
DE1347B000
stack
page read and write
218C777E000
heap
page read and write
CD7B0F9000
stack
page read and write
218C7763000
heap
page read and write
218C7763000
heap
page read and write
29A3B355000
heap
page read and write
218C777B000
heap
page read and write
218C777F000
heap
page read and write
218C6CAE000
heap
page read and write