IOC Report
Server.exe

loading gif

Files

File Path
Type
Category
Malicious
Server.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Server.exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\73e4ea7af59bea49b79c8c5f799f272d.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\73e4ea7af59bea49b79c8c5f799f272d.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\server.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\server.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Server.exe
"C:\Users\user\Desktop\Server.exe"
malicious
C:\Users\user\AppData\Roaming\server.exe
"C:\Users\user\AppData\Roaming\server.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\server.exe" "server.exe" ENABLE
malicious
C:\Users\user\AppData\Roaming\server.exe
"C:\Users\user\AppData\Roaming\server.exe" ..
malicious
C:\Users\user\AppData\Roaming\server.exe
"C:\Users\user\AppData\Roaming\server.exe" ..
malicious
C:\Users\user\AppData\Roaming\server.exe
"C:\Users\user\AppData\Roaming\server.exe" ..
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
127.0.0.1
malicious
http://go.microsoft.
unknown
https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0
unknown
http://go.microsoft.LinkId=42127
unknown

IPs

IP
Domain
Country
Malicious
127.0.0.1
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
73e4ea7af59bea49b79c8c5f799f272d
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
73e4ea7af59bea49b79c8c5f799f272d

Memdumps

Base Address
Regiontype
Protect
Malicious
FD2000
unkown
page readonly
malicious
26C1000
trusted library allocation
page read and write
malicious
3842000
trusted library allocation
page read and write
F43000
heap
page read and write
F66000
heap
page read and write
4B3E000
stack
page read and write
F6F000
heap
page read and write
19AE000
stack
page read and write
543F000
heap
page read and write
FE5000
heap
page read and write
A62000
trusted library allocation
page execute and read and write
5CCE000
stack
page read and write
7CD000
heap
page read and write
670000
heap
page read and write
832000
trusted library allocation
page execute and read and write
59DE000
stack
page read and write
F8D000
heap
page read and write
4F9000
stack
page read and write
1080000
heap
page read and write
ABE000
stack
page read and write
5431000
heap
page read and write
A60000
trusted library allocation
page execute and read and write
CF7000
trusted library allocation
page execute and read and write
1B70000
trusted library allocation
page read and write
604E000
stack
page read and write
495C000
stack
page read and write
F9F000
heap
page read and write
F9D000
heap
page read and write
49D9000
stack
page read and write
F75000
heap
page read and write
18D2000
trusted library allocation
page execute and read and write
CC6000
trusted library allocation
page execute and read and write
524E000
stack
page read and write
4B80000
heap
page read and write
543F000
heap
page read and write
106D000
stack
page read and write
5F4E000
stack
page read and write
F5C000
heap
page read and write
F3D000
heap
page read and write
133F000
stack
page read and write
4D6E000
stack
page read and write
F9F000
heap
page read and write
14E0000
heap
page read and write
F74000
heap
page read and write
F76000
heap
page read and write
499C000
stack
page read and write
F7A000
heap
page read and write
49FE000
stack
page read and write
2A64000
trusted library allocation
page read and write
F7C000
heap
page read and write
1BD0000
heap
page execute and read and write
F75000
heap
page read and write
195E000
stack
page read and write
1BC0000
heap
page read and write
F76000
heap
page read and write
F70000
heap
page read and write
F8D000
heap
page read and write
7BD000
heap
page read and write
B30000
heap
page execute and read and write
A92000
trusted library allocation
page execute and read and write
1596000
heap
page read and write
FDD000
heap
page read and write
C40000
trusted library allocation
page read and write
491D000
stack
page read and write
F66000
heap
page read and write
13D0000
heap
page read and write
1509000
heap
page read and write
4E30000
heap
page read and write
A72000
trusted library allocation
page execute and read and write
D70000
heap
page execute and read and write
49B0000
heap
page read and write
54FE000
stack
page read and write
EE6000
heap
page read and write
161E000
stack
page read and write
F65000
heap
page read and write
CE2000
trusted library allocation
page execute and read and write
B10000
heap
page read and write
170000
heap
page read and write
32EE000
stack
page read and write
EF0000
heap
page read and write
8A0000
heap
page read and write
573E000
stack
page read and write
55FF000
stack
page read and write
4B1D000
stack
page read and write
FE6000
heap
page read and write
2FB1000
trusted library allocation
page read and write
87B000
trusted library allocation
page execute and read and write
78D000
heap
page read and write
FE3000
heap
page read and write
17B0000
heap
page read and write
FEE000
heap
page read and write
FE3000
heap
page read and write
F47000
heap
page read and write
1F0000
heap
page read and write
2A61000
trusted library allocation
page read and write
F70000
heap
page read and write
872000
trusted library allocation
page read and write
F75000
heap
page read and write
5432000
heap
page read and write
14EE000
heap
page read and write
820000
trusted library allocation
page read and write
1902000
trusted library allocation
page execute and read and write
4C2E000
stack
page read and write
F62000
heap
page read and write
13F0000
heap
page read and write
53BE000
stack
page read and write
FED000
heap
page read and write
4AFE000
stack
page read and write
4D7E000
stack
page read and write
329E000
stack
page read and write
F49000
heap
page read and write
F6D000
heap
page read and write
50EE000
stack
page read and write
1BA0000
trusted library allocation
page read and write
D3E000
stack
page read and write
2791000
trusted library allocation
page read and write
4E6E000
stack
page read and write
1369000
stack
page read and write
F49000
heap
page read and write
FE3000
heap
page read and write
F79000
heap
page read and write
4B60000
trusted library allocation
page execute and read and write
A70000
trusted library allocation
page read and write
F45000
heap
page read and write
F45000
heap
page read and write
543F000
heap
page read and write
F49000
heap
page read and write
D64000
stack
page read and write
3791000
trusted library allocation
page read and write
81D000
heap
page read and write
86A000
trusted library allocation
page execute and read and write
5C8F000
stack
page read and write
4C20000
heap
page read and write
5431000
heap
page read and write
4DE0000
heap
page read and write
171F000
stack
page read and write
784000
heap
page read and write
29C3000
trusted library allocation
page read and write
F3E000
heap
page read and write
F3B000
heap
page read and write
518F000
stack
page read and write
36C1000
trusted library allocation
page read and write
4B50000
heap
page read and write
534E000
stack
page read and write
5ADE000
stack
page read and write
102D000
unkown
page read and write
FDC000
unkown
page readonly
508E000
stack
page read and write
A7C000
trusted library allocation
page execute and read and write
A50000
trusted library allocation
page read and write
4DBE000
stack
page read and write
4B70000
trusted library allocation
page read and write
190000
heap
page read and write
85A000
trusted library allocation
page execute and read and write
DD0000
heap
page read and write
110B000
trusted library allocation
page execute and read and write
F6D000
heap
page read and write
F48000
heap
page read and write
3A64000
trusted library allocation
page read and write
18EC000
trusted library allocation
page execute and read and write
EC5000
heap
page read and write
32A0000
heap
page read and write
ADF000
stack
page read and write
37EB000
trusted library allocation
page read and write
F28000
heap
page read and write
1173000
heap
page read and write
736000
stack
page read and write
14E8000
heap
page read and write
C3E000
stack
page read and write
F63000
heap
page read and write
CBA000
trusted library allocation
page execute and read and write
EB0000
heap
page read and write
109000
stack
page read and write
18EA000
trusted library allocation
page execute and read and write
51A0000
trusted library allocation
page read and write
F68000
heap
page read and write
C60000
heap
page read and write
F34000
heap
page read and write
AEE000
stack
page read and write
4C3E000
stack
page read and write
61FD000
stack
page read and write
EFB000
heap
page read and write
107F000
stack
page read and write
EE0000
heap
page read and write
18BF000
stack
page read and write
F69000
heap
page read and write
FDF000
heap
page read and write
4B00000
heap
page read and write
1910000
trusted library allocation
page read and write
126B000
stack
page read and write
1366000
stack
page read and write
CFB000
trusted library allocation
page execute and read and write
F5F000
heap
page read and write
543F000
heap
page read and write
8C0000
heap
page read and write
F5F000
heap
page read and write
1140000
heap
page read and write
B1E000
stack
page read and write
F66000
heap
page read and write
857000
trusted library allocation
page execute and read and write
F49000
heap
page read and write
F65000
heap
page read and write
5B8E000
stack
page read and write
F74000
heap
page read and write
13E0000
heap
page read and write
860000
trusted library allocation
page read and write
758000
heap
page read and write
CB2000
trusted library allocation
page execute and read and write
5F0E000
stack
page read and write
2794000
trusted library allocation
page read and write
F6D000
heap
page read and write
F5F000
heap
page read and write
5448000
heap
page read and write
877000
trusted library allocation
page execute and read and write
6CE000
stack
page read and write
271F000
stack
page read and write
7E0000
heap
page read and write
46C0000
trusted library allocation
page read and write
2C6E000
stack
page read and write
10F2000
trusted library allocation
page execute and read and write
53BF000
stack
page read and write
FD0000
unkown
page readonly
5440000
heap
page read and write
F11000
heap
page read and write
840000
trusted library allocation
page read and write
5DCE000
stack
page read and write
F5E000
heap
page read and write
57CE000
stack
page read and write
5E0E000
stack
page read and write
A6A000
trusted library allocation
page execute and read and write
814000
heap
page read and write
4B5E000
stack
page read and write
F7A000
heap
page read and write
319E000
unkown
page read and write
3FB1000
trusted library allocation
page read and write
9DE000
stack
page read and write
F5B000
heap
page read and write
F40000
heap
page execute and read and write
F49000
heap
page read and write
11AC000
heap
page read and write
18DA000
trusted library allocation
page execute and read and write
FDE000
heap
page read and write
4EAE000
stack
page read and write
F66000
heap
page read and write
F72000
heap
page read and write
63B000
stack
page read and write
7A0000
heap
page read and write
F8D000
heap
page read and write
5448000
heap
page read and write
F69000
heap
page read and write
190A000
trusted library allocation
page execute and read and write
A70000
heap
page execute and read and write
FE9000
heap
page read and write
BBE000
stack
page read and write
FEE000
heap
page read and write
F9D000
heap
page read and write
B7E000
stack
page read and write
F7A000
heap
page read and write
7E3000
heap
page read and write
B80000
trusted library allocation
page read and write
A76000
trusted library allocation
page execute and read and write
373E000
trusted library allocation
page read and write
FDD000
heap
page read and write
544B000
heap
page read and write
F45000
heap
page read and write
52BE000
stack
page read and write
4EBE000
stack
page read and write
F67000
heap
page read and write
575000
heap
page read and write
CC0000
trusted library allocation
page read and write
4F6000
stack
page read and write
FE1000
heap
page read and write
2FB4000
trusted library allocation
page read and write
F25000
heap
page read and write
F6A000
heap
page read and write
1F5000
heap
page read and write
48C0000
trusted library allocation
page read and write
AAB000
trusted library allocation
page execute and read and write
CC2000
trusted library allocation
page execute and read and write
F7B000
heap
page read and write
F5E000
heap
page read and write
4FEE000
stack
page read and write
1100000
trusted library allocation
page read and write
6D0000
heap
page read and write
F67000
heap
page read and write
F62000
trusted library allocation
page execute and read and write
153E000
stack
page read and write
D66000
stack
page read and write
7B8000
heap
page read and write
1917000
trusted library allocation
page execute and read and write
F6E000
heap
page read and write
84A000
trusted library allocation
page execute and read and write
4BE0000
heap
page read and write
18E0000
trusted library allocation
page read and write
F28000
heap
page read and write
48D0000
heap
page read and write
1120000
heap
page read and write
CA0000
trusted library allocation
page read and write
F66000
heap
page read and write
F11000
heap
page read and write
8B0000
heap
page read and write
EEE000
stack
page read and write
151F000
heap
page read and write
5440000
heap
page read and write
29D5000
trusted library allocation
page read and write
10D6000
trusted library allocation
page execute and read and write
6DE000
heap
page read and write
1FB000
stack
page read and write
485F000
stack
page read and write
842000
trusted library allocation
page execute and read and write
F9D000
heap
page read and write
83A000
trusted library allocation
page execute and read and write
D6B000
stack
page read and write
F8D000
heap
page read and write
F34000
heap
page read and write
F79000
heap
page read and write
5433000
heap
page read and write
DD0000
heap
page read and write
3899000
trusted library allocation
page read and write
F46000
heap
page read and write
CCC000
trusted library allocation
page execute and read and write
F64000
heap
page read and write
7B0000
heap
page read and write
6BE000
stack
page read and write
3795000
trusted library allocation
page read and write
36E7000
trusted library allocation
page read and write
C6B000
stack
page read and write
F11000
heap
page read and write
4631000
trusted library allocation
page read and write
FE2000
heap
page read and write
FDF000
heap
page read and write
F4A000
heap
page read and write
F49000
heap
page read and write
BA0000
heap
page read and write
76D000
heap
page read and write
F05000
heap
page read and write
F34000
heap
page read and write
54BE000
stack
page read and write
5449000
heap
page read and write
543F000
heap
page read and write
4D2F000
stack
page read and write
F41000
heap
page read and write
3FB4000
trusted library allocation
page read and write
1B90000
heap
page read and write
F9E000
heap
page read and write
F50000
trusted library allocation
page read and write
F7A000
heap
page read and write
543F000
heap
page read and write
F7B000
heap
page read and write
3631000
trusted library allocation
page read and write
5445000
heap
page read and write
F67000
heap
page read and write
F3C000
heap
page read and write
F70000
heap
page read and write
4FAE000
stack
page read and write
1DE000
stack
page read and write
11AA000
heap
page read and write
E70000
heap
page read and write
AA7000
trusted library allocation
page execute and read and write
F41000
heap
page read and write
4A1C000
stack
page read and write
F66000
heap
page read and write
EC0000
heap
page read and write
8C5000
heap
page read and write
F28000
heap
page read and write
C6B000
stack
page read and write
175E000
stack
page read and write
86C000
trusted library allocation
page execute and read and write
563E000
stack
page read and write
62FE000
stack
page read and write
F6A000
trusted library allocation
page execute and read and write
F60000
heap
page read and write
B90000
trusted library allocation
page execute and read and write
115D000
heap
page read and write
560000
heap
page read and write
608B000
stack
page read and write
618C000
stack
page read and write
19D0000
heap
page read and write
6DA000
heap
page read and write
F38000
heap
page read and write
F6F000
heap
page read and write
F5B000
heap
page read and write
4C80000
unclassified section
page read and write
D5E000
stack
page read and write
5370000
heap
page read and write
1540000
trusted library allocation
page read and write
750000
heap
page read and write
F70000
heap
page read and write
10D2000
trusted library allocation
page execute and read and write
EF0000
heap
page read and write
F9D000
heap
page read and write
18C0000
trusted library allocation
page read and write
F9D000
heap
page read and write
1107000
trusted library allocation
page execute and read and write
FBF000
heap
page read and write
3794000
trusted library allocation
page read and write
F62000
heap
page read and write
4930000
trusted library allocation
page read and write
5448000
heap
page read and write
46C8000
trusted library allocation
page read and write
180000
heap
page read and write
710000
heap
page read and write
3A61000
trusted library allocation
page read and write
D6E000
stack
page read and write
1148000
heap
page read and write
10DC000
trusted library allocation
page execute and read and write
5190000
trusted library allocation
page execute and read and write
70E000
heap
page read and write
862000
trusted library allocation
page execute and read and write
F69000
heap
page read and write
1550000
heap
page read and write
F34000
heap
page read and write
94E000
stack
page read and write
F62000
heap
page read and write
F70000
heap
page read and write
F76000
heap
page read and write
543F000
heap
page read and write
5410000
heap
page read and write
1360000
heap
page read and write
543E000
heap
page read and write
FEB000
heap
page read and write
154D000
heap
page read and write
F5B000
heap
page read and write
F79000
heap
page read and write
492E000
stack
page read and write
F65000
heap
page read and write
F34000
heap
page read and write
F6B000
heap
page read and write
F75000
heap
page read and write
F77000
heap
page read and write
F69000
heap
page read and write
18E2000
trusted library allocation
page execute and read and write
FBD000
heap
page read and write
FA0000
heap
page read and write
B50000
heap
page read and write
FED000
heap
page read and write
10D0000
trusted library allocation
page read and write
10CE000
stack
page read and write
4F6000
stack
page read and write
191B000
trusted library allocation
page execute and read and write
650000
heap
page read and write
E60000
trusted library allocation
page read and write
F79000
heap
page read and write
1584000
heap
page read and write
F5B000
heap
page read and write
4F9000
stack
page read and write
FDD000
heap
page read and write
F9E000
heap
page read and write
48B0000
trusted library allocation
page execute and read and write
A4F000
stack
page read and write
F7E000
heap
page read and write
FEE000
heap
page read and write
C7F000
stack
page read and write
4C7E000
stack
page read and write
E5E000
stack
page read and write
5432000
heap
page read and write
FEE000
heap
page read and write
F43000
heap
page read and write
F9F000
heap
page read and write
1B80000
trusted library allocation
page execute and read and write
F01000
heap
page read and write
B70000
heap
page read and write
FEC000
heap
page read and write
570000
heap
page read and write
B20000
heap
page read and write
1770000
heap
page read and write
A50000
trusted library allocation
page read and write
544A000
heap
page read and write
13F5000
heap
page read and write
1575000
heap
page read and write
FE3000
heap
page read and write
F67000
heap
page read and write
244F000
stack
page read and write
6FE000
stack
page read and write
There are 464 hidden memdumps, click here to show them.