IOC Report
Server.exe.bin.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps21010010Label

Files

File Path
Type
Category
Malicious
Download
Server.exe.bin.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Server.exe.bin.exe
"C:\Users\user\Desktop\Server.exe.bin.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\Desktop\Server.exe.bin.exe" "Server.exe.bin.exe" ENABLE
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0
unknown

Domains

Name
IP
Malicious
many-atlantic.gl.at.ply.gg
147.185.221.27
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.27
many-atlantic.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
CD2000
unkown
page readonly
malicious
C94000
heap
page read and write
AFB000
stack
page read and write
1A70000
trusted library allocation
page execute and read and write
120A000
trusted library allocation
page execute and read and write
C9D000
heap
page read and write
CD8000
heap
page read and write
C9E000
heap
page read and write
CFB000
heap
page read and write
55BB000
stack
page read and write
CAC000
heap
page read and write
CA8000
heap
page read and write
CAA000
heap
page read and write
C5C000
heap
page read and write
CC3000
heap
page read and write
10F9000
stack
page read and write
CB1000
heap
page read and write
CBE000
heap
page read and write
C9D000
heap
page read and write
15D0000
trusted library allocation
page read and write
CAE000
heap
page read and write
D09000
heap
page read and write
CD3000
heap
page read and write
C7B000
heap
page read and write
C9C000
heap
page read and write
CC9000
heap
page read and write
AEE000
stack
page read and write
CC3000
heap
page read and write
D0C000
heap
page read and write
73B000
stack
page read and write
CF7000
heap
page read and write
C6A000
heap
page read and write
CE6000
heap
page read and write
CBC000
heap
page read and write
CDA000
heap
page read and write
3458000
trusted library allocation
page read and write
19C8000
trusted library allocation
page read and write
5295000
heap
page read and write
52A1000
heap
page read and write
C56000
heap
page read and write
C5C000
heap
page read and write
CAC000
heap
page read and write
55FC000
stack
page read and write
34A0000
trusted library allocation
page read and write
CDC000
heap
page read and write
5639000
stack
page read and write
CFC000
heap
page read and write
B40000
heap
page read and write
5290000
heap
page read and write
C7B000
heap
page read and write
CE6000
heap
page read and write
CBD000
heap
page read and write
CC2000
heap
page read and write
CC3000
heap
page read and write
C94000
heap
page read and write
11C0000
trusted library allocation
page read and write
CC0000
heap
page read and write
C60000
heap
page read and write
12BA000
heap
page read and write
D6A000
stack
page read and write
BA0000
heap
page read and write
CB0000
heap
page read and write
52AA000
heap
page read and write
CB8000
heap
page read and write
EDE000
unkown
page read and write
CFC000
heap
page read and write
11EA000
trusted library allocation
page execute and read and write
19BE000
stack
page read and write
5251000
heap
page read and write
BB0000
heap
page read and write
D08000
heap
page read and write
11E2000
trusted library allocation
page execute and read and write
529B000
heap
page read and write
C30000
heap
page read and write
CEA000
heap
page read and write
CD3000
heap
page read and write
CB1000
heap
page read and write
CA3000
heap
page read and write
C5F000
heap
page read and write
11F7000
trusted library allocation
page execute and read and write
5251000
heap
page read and write
CD3000
heap
page read and write
52A7000
heap
page read and write
CB2000
heap
page read and write
DD0000
heap
page read and write
5250000
heap
page read and write
CD0000
heap
page read and write
C6A000
heap
page read and write
D0E000
heap
page read and write
C24000
heap
page read and write
5293000
heap
page read and write
CCB000
heap
page read and write
52A9000
heap
page read and write
52A7000
heap
page read and write
CB7000
heap
page read and write
52AB000
heap
page read and write
11DA000
trusted library allocation
page execute and read and write
11C7000
trusted library allocation
page read and write
1146000
heap
page read and write
5270000
heap
page read and write
C5B000
heap
page read and write
43E1000
trusted library allocation
page read and write
4B20000
heap
page read and write
CEA000
heap
page read and write
CAD000
heap
page read and write
CBB000
heap
page read and write
CFC000
heap
page read and write
4D00000
heap
page read and write
C9C000
heap
page read and write
C48000
heap
page read and write
557D000
stack
page read and write
1260000
heap
page read and write
514F000
stack
page read and write
CB6000
heap
page read and write
CD0000
heap
page read and write
C5F000
heap
page read and write
C59000
heap
page read and write
C5F000
heap
page read and write
CB5000
heap
page read and write
1202000
trusted library allocation
page execute and read and write
5295000
heap
page read and write
CEA000
heap
page read and write
122A000
heap
page read and write
C60000
heap
page read and write
C9D000
heap
page read and write
CD8000
heap
page read and write
CAE000
heap
page read and write
CAD000
heap
page read and write
CD9000
heap
page read and write
CB2000
heap
page read and write
5530000
heap
page read and write
C5A000
heap
page read and write
C30000
heap
page read and write
15E0000
heap
page read and write
5292000
heap
page read and write
1880000
trusted library allocation
page execute and read and write
C7C000
heap
page read and write
CAE000
heap
page read and write
1140000
heap
page read and write
1220000
heap
page read and write
D0E000
heap
page read and write
C68000
heap
page read and write
C6A000
heap
page read and write
CA7000
heap
page read and write
1890000
trusted library allocation
page read and write
7A0000
heap
page read and write
CB5000
heap
page read and write
C57000
heap
page read and write
CA1000
heap
page read and write
5150000
heap
page read and write
AFE000
stack
page read and write
CFC000
heap
page read and write
33E1000
trusted library allocation
page read and write
529D000
heap
page read and write
C6A000
heap
page read and write
52A7000
heap
page read and write
10F6000
stack
page read and write
11E0000
trusted library allocation
page read and write
B3D000
stack
page read and write
CC1000
heap
page read and write
C6A000
heap
page read and write
FDE000
stack
page read and write
CD0000
heap
page read and write
CB1000
heap
page read and write
52A5000
heap
page read and write
C5E000
heap
page read and write
CDC000
unkown
page readonly
C30000
heap
page read and write
C57000
heap
page read and write
CE6000
heap
page read and write
C7B000
heap
page read and write
1A60000
trusted library allocation
page read and write
CA9000
heap
page read and write
CC9000
heap
page read and write
D09000
heap
page read and write
13AE000
stack
page read and write
121B000
trusted library allocation
page execute and read and write
52A4000
heap
page read and write
CBC000
heap
page read and write
CFB000
heap
page read and write
CA7000
heap
page read and write
529B000
heap
page read and write
12A2000
heap
page read and write
CD8000
heap
page read and write
D00000
heap
page read and write
CFC000
heap
page read and write
CB6000
heap
page read and write
CAE000
heap
page read and write
C7B000
heap
page read and write
7EE000
unkown
page read and write
529B000
heap
page read and write
D00000
heap
page read and write
11F0000
trusted library allocation
page read and write
1217000
trusted library allocation
page execute and read and write
CB1000
heap
page read and write
CAE000
heap
page read and write
CD0000
unkown
page readonly
5291000
heap
page read and write
CC9000
heap
page read and write
C45000
heap
page read and write
347C000
trusted library allocation
page read and write
CC0000
heap
page read and write
CC4000
heap
page read and write
159E000
stack
page read and write
52A5000
heap
page read and write
C94000
heap
page read and write
CEA000
heap
page read and write
1212000
trusted library allocation
page read and write
529D000
heap
page read and write
1210000
trusted library allocation
page read and write
CBB000
heap
page read and write
D0A000
heap
page read and write
CD3000
heap
page read and write
1195000
heap
page read and write
BB5000
heap
page read and write
CD8000
heap
page read and write
CEA000
heap
page read and write
CFE000
heap
page read and write
C7B000
heap
page read and write
C6A000
heap
page read and write
CFE000
heap
page read and write
544F000
stack
page read and write
11D2000
trusted library allocation
page execute and read and write
C9D000
heap
page read and write
1A80000
heap
page execute and read and write
CDC000
heap
page read and write
C56000
heap
page read and write
11EC000
trusted library allocation
page execute and read and write
CD3000
heap
page read and write
D03000
heap
page read and write
CAD000
heap
page read and write
CE6000
heap
page read and write
CAD000
heap
page read and write
15B0000
heap
page read and write
122E000
heap
page read and write
C68000
heap
page read and write
56A0000
unclassified section
page read and write
CD4000
heap
page read and write
7F0000
heap
page read and write
12A8000
heap
page read and write
C94000
heap
page read and write
CCC000
heap
page read and write
C9C000
heap
page read and write
5286000
heap
page read and write
C57000
heap
page read and write
3434000
trusted library allocation
page read and write
1540000
heap
page read and write
C5C000
heap
page read and write
CD4000
heap
page read and write
11FA000
trusted library allocation
page execute and read and write
C10000
heap
page read and write
AF3000
stack
page read and write
CDC000
heap
page read and write
DE0000
heap
page read and write
52AA000
heap
page read and write
529B000
heap
page read and write
C21000
heap
page read and write
C9C000
heap
page read and write
C56000
heap
page read and write
CB1000
heap
page read and write
CAD000
heap
page read and write
113E000
stack
page read and write
52A5000
heap
page read and write
CD0000
heap
page read and write
CD1000
heap
page read and write
CB4000
heap
page read and write
CE6000
heap
page read and write
CAD000
heap
page read and write
CA0000
heap
page read and write
CD1000
heap
page read and write
CFC000
heap
page read and write
54DF000
stack
page read and write
52AA000
heap
page read and write
C6A000
heap
page read and write
152E000
stack
page read and write
1190000
heap
page read and write
CCD000
heap
page read and write
18B0000
heap
page read and write
There are 268 hidden memdumps, click here to show them.