IOC Report
Server_v0.0.0.0.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Server_v0.0.0.0.exe
"C:\Users\user\Desktop\Server_v0.0.0.0.exe"
malicious
C:\Users\user\Desktop\Server_v0.0.0.0.exe
"C:\Users\user\Desktop\Server_v0.0.0.0.exe"
malicious
C:\Users\user\Desktop\Server_v0.0.0.0.exe
"C:\Users\user\Desktop\Server_v0.0.0.0.exe"
malicious

Domains

Name
IP
Malicious
govpet.mysynology.net
45.88.88.7
malicious

IPs

IP
Domain
Country
Malicious
45.88.88.7
govpet.mysynology.net
Bulgaria
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Server.exe
HKEY_CURRENT_USER\SOFTWARE\6a2634340fbf8a0a2c038c6263d49fd1
[kl]
HKEY_CURRENT_USER\SOFTWARE\6a2634340fbf8a0a2c038c6263d49fd1
[kl]
HKEY_CURRENT_USER\SOFTWARE\6a2634340fbf8a0a2c038c6263d49fd1
[kl]
HKEY_CURRENT_USER\SOFTWARE\6a2634340fbf8a0a2c038c6263d49fd1
[kl]
HKEY_CURRENT_USER\SOFTWARE\6a2634340fbf8a0a2c038c6263d49fd1
[kl]
HKEY_CURRENT_USER\SOFTWARE\6a2634340fbf8a0a2c038c6263d49fd1
[kl]
HKEY_CURRENT_USER\SOFTWARE\6a2634340fbf8a0a2c038c6263d49fd1
[kl]
HKEY_CURRENT_USER\SOFTWARE\6a2634340fbf8a0a2c038c6263d49fd1
[kl]
HKEY_CURRENT_USER\SOFTWARE\6a2634340fbf8a0a2c038c6263d49fd1
[kl]
HKEY_CURRENT_USER\SOFTWARE\6a2634340fbf8a0a2c038c6263d49fd1
[kl]
HKEY_CURRENT_USER\SOFTWARE\6a2634340fbf8a0a2c038c6263d49fd1
[kl]
HKEY_CURRENT_USER\SOFTWARE\6a2634340fbf8a0a2c038c6263d49fd1
[kl]
HKEY_CURRENT_USER\SOFTWARE\6a2634340fbf8a0a2c038c6263d49fd1
[kl]
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3A2000
unkown
page readonly
malicious
2A30000
trusted library allocation
page execute and read and write
B42000
trusted library allocation
page read and write
2830000
trusted library allocation
page read and write
C23000
heap
page read and write
5300000
trusted library allocation
page read and write
26FD000
trusted library allocation
page read and write
B36000
trusted library allocation
page execute and read and write
E10000
trusted library allocation
page execute and read and write
4F80000
trusted library allocation
page read and write
36F1000
trusted library allocation
page read and write
AF8000
heap
page read and write
4A8C000
stack
page read and write
27B6000
trusted library allocation
page read and write
11D0000
heap
page read and write
3A0000
unkown
page readonly
4F3E000
trusted library allocation
page read and write
4C0E000
trusted library allocation
page read and write
2530000
heap
page read and write
25B0000
trusted library allocation
page read and write
9A0000
heap
page read and write
11B0000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page read and write
B7A000
heap
page read and write
27BB000
trusted library allocation
page read and write
27D6000
trusted library allocation
page read and write
4BF4000
trusted library allocation
page read and write
4F3A000
trusted library allocation
page read and write
2801000
trusted library allocation
page read and write
4F2E000
trusted library allocation
page read and write
5C50000
heap
page read and write
51D0000
trusted library allocation
page read and write
4C22000
trusted library allocation
page read and write
4F52000
trusted library allocation
page read and write
3801000
trusted library allocation
page read and write
2580000
trusted library allocation
page read and write
4BFE000
trusted library allocation
page read and write
2812000
trusted library allocation
page read and write
5370000
heap
page read and write
4D23000
heap
page read and write
C40000
heap
page read and write
2BE9000
trusted library allocation
page read and write
4D5C000
stack
page read and write
B88000
heap
page read and write
7A0000
heap
page read and write
4FD7000
trusted library allocation
page read and write
5590000
heap
page read and write
288E000
stack
page read and write
830000
heap
page read and write
5A8E000
stack
page read and write
4F32000
trusted library allocation
page read and write
3A51000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
4ED0000
heap
page read and write
5DE0000
heap
page read and write
259D000
trusted library allocation
page execute and read and write
DA2000
heap
page read and write
298E000
stack
page read and write
27CE000
trusted library allocation
page read and write
27F0000
trusted library allocation
page read and write
AF4000
heap
page read and write
B50000
heap
page read and write
5023000
heap
page read and write
5D2E000
stack
page read and write
598E000
stack
page read and write
55DE000
stack
page read and write
B30000
trusted library allocation
page read and write
27E2000
trusted library allocation
page read and write
4808000
trusted library allocation
page read and write
7F570000
trusted library allocation
page execute and read and write
5330000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
4CA000
stack
page read and write
5310000
trusted library allocation
page execute and read and write
B14000
trusted library allocation
page read and write
4F24000
trusted library allocation
page read and write
5330000
heap
page read and write
4C60000
trusted library allocation
page read and write
DE9000
heap
page read and write
2806000
trusted library allocation
page execute and read and write
4C1D000
trusted library allocation
page read and write
990000
heap
page read and write
4F46000
trusted library allocation
page read and write
2A40000
heap
page execute and read and write
502E000
stack
page read and write
5380000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
D38000
heap
page read and write
2590000
trusted library allocation
page read and write
A6A000
heap
page read and write
7EFF0000
trusted library allocation
page execute and read and write
B1D000
heap
page read and write
4F20000
trusted library allocation
page read and write
4D20000
heap
page read and write
4EBC000
stack
page read and write
537E000
stack
page read and write
4C17000
trusted library allocation
page read and write
B3A000
trusted library allocation
page execute and read and write
258D000
trusted library allocation
page execute and read and write
25B2000
trusted library allocation
page read and write
C95000
heap
page read and write
995000
heap
page read and write
B60000
heap
page read and write
B10000
trusted library allocation
page read and write
D70000
heap
page execute and read and write
4DA0000
heap
page read and write
26F1000
trusted library allocation
page read and write
27F0000
heap
page execute and read and write
52B0000
trusted library allocation
page read and write
C90000
heap
page read and write
5020000
heap
page read and write
5317000
trusted library allocation
page read and write
279C000
stack
page read and write
B47000
trusted library allocation
page execute and read and write
E30000
heap
page read and write
2840000
heap
page read and write
B17000
heap
page read and write
4C11000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
4BF6000
trusted library allocation
page read and write
2803000
trusted library allocation
page read and write
DFC000
stack
page read and write
488E000
stack
page read and write
B32000
heap
page read and write
738000
stack
page read and write
2584000
trusted library allocation
page read and write
11C4000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
53D0000
heap
page read and write
518F000
stack
page read and write
865000
heap
page read and write
E36000
heap
page read and write
B4B000
trusted library allocation
page execute and read and write
530E000
stack
page read and write
4F4D000
trusted library allocation
page read and write
281B000
trusted library allocation
page execute and read and write
51FE000
stack
page read and write
25A0000
trusted library allocation
page read and write
B04000
trusted library allocation
page read and write
4C02000
trusted library allocation
page read and write
4C3B000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
D9D000
heap
page read and write
AE0000
heap
page read and write
51E0000
heap
page execute and read and write
275F000
stack
page read and write
4F2B000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
55F0000
heap
page read and write
27B4000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
25B7000
trusted library allocation
page execute and read and write
A4A000
heap
page read and write
2630000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
4F41000
trusted library allocation
page read and write
4C39000
trusted library allocation
page read and write
AC9000
heap
page read and write
27BE000
trusted library allocation
page read and write
800000
heap
page read and write
5C8000
stack
page read and write
2570000
trusted library allocation
page read and write
856000
heap
page read and write
DBE000
stack
page read and write
46F8000
trusted library allocation
page read and write
26F3000
trusted library allocation
page read and write
A40000
heap
page read and write
D36000
heap
page read and write
4F60000
trusted library allocation
page read and write
4E69000
stack
page read and write
C37000
heap
page read and write
27DD000
trusted library allocation
page read and write
E00000
heap
page read and write
B85000
heap
page read and write
A86000
heap
page read and write
B1D000
trusted library allocation
page execute and read and write
4F26000
trusted library allocation
page read and write
2620000
trusted library allocation
page execute and read and write
4F49000
stack
page read and write
4F69000
trusted library allocation
page read and write
5AAE000
stack
page read and write
25AA000
trusted library allocation
page execute and read and write
4F10000
trusted library allocation
page read and write
4C05000
trusted library allocation
page read and write
4D9E000
stack
page read and write
B00000
trusted library allocation
page read and write
5D00000
heap
page read and write
5040000
heap
page read and write
501C000
stack
page read and write
5CD0000
heap
page read and write
11D6000
heap
page read and write
C33000
heap
page read and write
4EF0000
trusted library allocation
page read and write
DC2000
heap
page read and write
C01000
heap
page read and write
4CE9000
trusted library allocation
page read and write
D00000
heap
page read and write
25A6000
trusted library allocation
page execute and read and write
E40000
heap
page read and write
9B0000
heap
page read and write
4D10000
heap
page execute and read and write
5320000
trusted library allocation
page read and write
C06000
heap
page read and write
4B8E000
stack
page read and write
51C9000
stack
page read and write
7FA000
stack
page read and write
27B0000
trusted library allocation
page read and write
A75000
heap
page read and write
CE0000
heap
page read and write
25BB000
trusted library allocation
page execute and read and write
D08000
heap
page read and write
4C0A000
trusted library allocation
page read and write
52CE000
stack
page read and write
B23000
trusted library allocation
page read and write
11C3000
trusted library allocation
page execute and read and write
261E000
stack
page read and write
4D6C000
stack
page read and write
4FC0000
trusted library allocation
page read and write
2593000
trusted library allocation
page read and write
7F330000
trusted library allocation
page execute and read and write
280A000
trusted library allocation
page execute and read and write
2650000
heap
page read and write
25D0000
trusted library allocation
page read and write
52EC000
stack
page read and write
2817000
trusted library allocation
page execute and read and write
11B3000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
555E000
stack
page read and write
2998000
trusted library allocation
page read and write
B58000
heap
page read and write
4CEB000
trusted library allocation
page read and write
2A51000
trusted library allocation
page read and write
27F3000
trusted library allocation
page read and write
E00000
heap
page read and write
5F2E000
stack
page read and write
950000
heap
page read and write
2A52000
trusted library allocation
page read and write
4DA3000
heap
page read and write
523E000
stack
page read and write
11C0000
trusted library allocation
page read and write
B2D000
trusted library allocation
page execute and read and write
4FBC000
stack
page read and write
63A000
stack
page read and write
4C67000
trusted library allocation
page read and write
527E000
stack
page read and write
F00000
heap
page read and write
27C2000
trusted library allocation
page read and write
27D1000
trusted library allocation
page read and write
4E70000
heap
page execute and read and write
27FD000
trusted library allocation
page execute and read and write
860000
heap
page read and write
51CE000
stack
page read and write
4BF0000
trusted library allocation
page read and write
A82000
heap
page read and write
2810000
trusted library allocation
page read and write
BFE000
heap
page read and write
2574000
trusted library allocation
page read and write
A80000
heap
page read and write
27CA000
trusted library allocation
page read and write
5340000
trusted library allocation
page execute and read and write
5309000
trusted library allocation
page read and write
B13000
trusted library allocation
page execute and read and write
D60000
trusted library allocation
page read and write
7B0000
heap
page read and write
11CD000
trusted library allocation
page execute and read and write
4F8C000
stack
page read and write
A4E000
heap
page read and write
AF7000
stack
page read and write
4FE0000
trusted library allocation
page execute and read and write
508B000
stack
page read and write
5CE0000
heap
page read and write
5E2F000
stack
page read and write
E10000
heap
page read and write
2583000
trusted library allocation
page execute and read and write
4F70000
trusted library allocation
page read and write
B26000
heap
page read and write
499E000
stack
page read and write
52C0000
heap
page read and write
26EE000
stack
page read and write
5570000
trusted library allocation
page read and write
4FCC000
stack
page read and write
850000
heap
page read and write
4BFB000
trusted library allocation
page read and write
There are 276 hidden memdumps, click here to show them.