Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\server.exe
|
C:\Users\user\Desktop\server.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://checklist.skype.com/drew/8GsEYWG5R7vgd6ovGci/nrUBbPIi4nn3B9s17IICy8/dABAhwF5Li84O/L9tQ_2Fw/xJ
|
unknown
|
||
http://checklist.skype.com/drew/8GsEYWG5R7vgd6ovGci/nrUBbPIi4nn3B9s17IICy8/dABAhwF5Li84O/L9tQ_2Fw/
|
unknown
|
||
http://checklist.skype.com/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
checklist.skype.com
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
842697D000
|
stack
|
page read and write
|
||
16DAF413000
|
heap
|
page read and write
|
||
1E185057000
|
heap
|
page read and write
|
||
40D000
|
unkown
|
page write copy
|
||
25FA4047000
|
heap
|
page read and write
|
||
FDAD9FF000
|
stack
|
page read and write
|
||
222A000
|
unclassified section
|
page read and write
|
||
2EB56275000
|
heap
|
page read and write
|
||
2B0E2E2A000
|
heap
|
page read and write
|
||
84267FD000
|
stack
|
page read and write
|
||
2229000
|
unclassified section
|
page readonly
|
||
1E18505C000
|
heap
|
page read and write
|
||
16DAF44B000
|
heap
|
page read and write
|
||
1001FE000
|
stack
|
page read and write
|
||
2B0E2E69000
|
heap
|
page read and write
|
||
25FA4118000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
6DE4DF9000
|
stack
|
page read and write
|
||
1E184D90000
|
heap
|
page read and write
|
||
2EB56A02000
|
trusted library allocation
|
page read and write
|
||
FDADEFE000
|
stack
|
page read and write
|
||
1FBA08B9000
|
heap
|
page read and write
|
||
FDADCFC000
|
stack
|
page read and write
|
||
1791D402000
|
trusted library allocation
|
page read and write
|
||
16DAF439000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
25FA3F30000
|
heap
|
page read and write
|
||
FAB5A7F000
|
stack
|
page read and write
|
||
221C000
|
stack
|
page read and write
|
||
2B0E37C9000
|
heap
|
page read and write
|
||
16DAF469000
|
heap
|
page read and write
|
||
2B0E2E67000
|
heap
|
page read and write
|
||
25FA4113000
|
heap
|
page read and write
|
||
16DAF46A000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1506ED02000
|
heap
|
page read and write
|
||
16DAF446000
|
heap
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
5DFD3FE000
|
stack
|
page read and write
|
||
33DD000
|
stack
|
page read and write
|
||
1E185002000
|
heap
|
page read and write
|
||
100A7D000
|
stack
|
page read and write
|
||
2B0E3771000
|
heap
|
page read and write
|
||
2B0E2E2C000
|
heap
|
page read and write
|
||
10057E000
|
stack
|
page read and write
|
||
1791CC44000
|
heap
|
page read and write
|
||
34DA000
|
stack
|
page read and write
|
||
25FA4089000
|
heap
|
page read and write
|
||
2EB56265000
|
heap
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
2B0E2BF0000
|
heap
|
page read and write
|
||
2EB56100000
|
heap
|
page read and write
|
||
8426A7F000
|
stack
|
page read and write
|
||
1791CC52000
|
heap
|
page read and write
|
||
2B0E2E92000
|
heap
|
page read and write
|
||
16DAFC02000
|
trusted library allocation
|
page read and write
|
||
842687B000
|
stack
|
page read and write
|
||
16DAF447000
|
heap
|
page read and write
|
||
379E000
|
stack
|
page read and write
|
||
2B0E3830000
|
heap
|
page read and write
|
||
1FBA086D000
|
heap
|
page read and write
|
||
5DFD5FE000
|
stack
|
page read and write
|
||
6DE478B000
|
stack
|
page read and write
|
||
5DFD4FE000
|
stack
|
page read and write
|
||
16DAF2F0000
|
heap
|
page read and write
|
||
16DAF400000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
2EB5626F000
|
heap
|
page read and write
|
||
84266FC000
|
stack
|
page read and write
|
||
2B0E2C50000
|
heap
|
page read and write
|
||
25FA4048000
|
heap
|
page read and write
|
||
500000
|
direct allocation
|
page execute and read and write
|
||
1506EC28000
|
heap
|
page read and write
|
||
25FA4063000
|
heap
|
page read and write
|
||
25FA3F20000
|
heap
|
page read and write
|
||
2B0E37B7000
|
heap
|
page read and write
|
||
16DAF46C000
|
heap
|
page read and write
|
||
5DFCF3E000
|
stack
|
page read and write
|
||
222C000
|
unclassified section
|
page readonly
|
||
361F000
|
stack
|
page read and write
|
||
16DAF467000
|
heap
|
page read and write
|
||
1E185000000
|
heap
|
page read and write
|
||
2220000
|
unclassified section
|
page read and write
|
||
25FA5B40000
|
remote allocation
|
page read and write
|
||
25FA4072000
|
heap
|
page read and write
|
||
2758000
|
heap
|
page read and write
|
||
2EB5626C000
|
heap
|
page read and write
|
||
25FA3F90000
|
heap
|
page read and write
|
||
211C000
|
stack
|
page read and write
|
||
16DAF300000
|
heap
|
page read and write
|
||
16DAF483000
|
heap
|
page read and write
|
||
25FA4002000
|
heap
|
page read and write
|
||
16DAF47C000
|