IOC Report
server.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\server.exe
C:\Users\user\Desktop\server.exe
malicious

URLs

Name
IP
Malicious
http://checklist.skype.com/drew/8GsEYWG5R7vgd6ovGci/nrUBbPIi4nn3B9s17IICy8/dABAhwF5Li84O/L9tQ_2Fw/xJ
unknown
http://checklist.skype.com/drew/8GsEYWG5R7vgd6ovGci/nrUBbPIi4nn3B9s17IICy8/dABAhwF5Li84O/L9tQ_2Fw/
unknown
http://checklist.skype.com/
unknown

Domains

Name
IP
Malicious
checklist.skype.com
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
842697D000
stack
page read and write
16DAF413000
heap
page read and write
1E185057000
heap
page read and write
40D000
unkown
page write copy
25FA4047000
heap
page read and write
FDAD9FF000
stack
page read and write
222A000
unclassified section
page read and write
2EB56275000
heap
page read and write
2B0E2E2A000
heap
page read and write
84267FD000
stack
page read and write
2229000
unclassified section
page readonly
1E18505C000
heap
page read and write
16DAF44B000
heap
page read and write
1001FE000
stack
page read and write
2B0E2E69000
heap
page read and write
25FA4118000
heap
page read and write
9D000
stack
page read and write
6DE4DF9000
stack
page read and write
1E184D90000
heap
page read and write
2EB56A02000
trusted library allocation
page read and write
FDADEFE000
stack
page read and write
1FBA08B9000
heap
page read and write
FDADCFC000
stack
page read and write
1791D402000
trusted library allocation
page read and write
16DAF439000
heap
page read and write
401000
unkown
page execute read
25FA3F30000
heap
page read and write
FAB5A7F000
stack
page read and write
221C000
stack
page read and write
2B0E37C9000
heap
page read and write
16DAF469000
heap
page read and write
2B0E2E67000
heap
page read and write
25FA4113000
heap
page read and write
16DAF46A000
heap
page read and write
400000
unkown
page readonly
1506ED02000
heap
page read and write
16DAF446000
heap
page read and write
32DF000
stack
page read and write
5DFD3FE000
stack
page read and write
33DD000
stack
page read and write
1E185002000
heap
page read and write
100A7D000
stack
page read and write
2B0E3771000
heap
page read and write
2B0E2E2C000
heap
page read and write
10057E000
stack
page read and write
1791CC44000
heap
page read and write
34DA000
stack
page read and write
25FA4089000
heap
page read and write
2EB56265000
heap
page read and write
30DF000
stack
page read and write
2B0E2BF0000
heap
page read and write
2EB56100000
heap
page read and write
8426A7F000
stack
page read and write
1791CC52000
heap
page read and write
2B0E2E92000
heap
page read and write
16DAFC02000
trusted library allocation
page read and write
842687B000
stack
page read and write
16DAF447000
heap
page read and write
379E000
stack
page read and write
2B0E3830000
heap
page read and write
1FBA086D000
heap
page read and write
5DFD5FE000
stack
page read and write
6DE478B000
stack
page read and write
5DFD4FE000
stack
page read and write
16DAF2F0000
heap
page read and write
16DAF400000
heap
page read and write
2C90000
heap
page read and write
2EB5626F000
heap
page read and write
84266FC000
stack
page read and write
2B0E2C50000
heap
page read and write
25FA4048000
heap
page read and write
500000
direct allocation
page execute and read and write
1506EC28000
heap
page read and write
25FA4063000
heap
page read and write
25FA3F20000
heap
page read and write
2B0E37B7000
heap
page read and write
16DAF46C000
heap
page read and write
5DFCF3E000
stack
page read and write
222C000
unclassified section
page readonly
361F000
stack
page read and write
16DAF467000
heap
page read and write
1E185000000
heap
page read and write
2220000
unclassified section
page read and write
25FA5B40000
remote allocation
page read and write
25FA4072000
heap
page read and write
2758000
heap
page read and write
2EB5626C000
heap
page read and write
25FA3F90000
heap
page read and write
211C000
stack
page read and write
16DAF300000
heap
page read and write
16DAF483000
heap
page read and write
25FA4002000
heap
page read and write
16DAF47C000
heap
page read and write
25FA5B40000
remote allocation
page read and write
1FBA1100000
heap
page read and write
16DAF47D000
heap
page read and write
1506EA70000
heap
page read and write
2B0E3827000
heap
page read and write
2B0E3754000
heap
page read and write
1FBA1112000
heap
page read and write
2360000
heap
page read and write
16DAF448000
heap
page read and write
25FA4048000
heap
page read and write
2C6D000
stack
page read and write
77D000
heap
page read and write
2260000
heap
page read and write
2EB56860000
trusted library allocation
page read and write
5DFCEBB000
stack
page read and write
26D9000
heap
page read and write
2B0E2E76000
heap
page read and write
1791CBE0000
trusted library allocation
page read and write
BFF427F000
stack
page read and write
16DAF44F000
heap
page read and write
16DAF440000
heap
page read and write
2B0E3802000
heap
page read and write
BFF3DF9000
stack
page read and write
16DAF454000
heap
page read and write
2280000
heap
page read and write
2221000
unclassified section
page execute read
1E185020000
heap
page read and write
1E185029000
heap
page read and write
25FA5B40000
remote allocation
page read and write
2B0E2F8C000
heap
page read and write
FDADAFF000
stack
page read and write
6DE4EFF000
stack
page read and write
25FA4058000
heap
page read and write
1506EC13000
heap
page read and write
16DAF474000
heap
page read and write
FAB597E000
stack
page read and write
230E000
stack
page read and write
1506EA80000
heap
page read and write
2B0E3602000
heap
page read and write
25FA5AC0000
trusted library allocation
page read and write
10097E000
stack
page read and write
16DAF464000
heap
page read and write
2B0E2E90000
heap
page read and write
16DAF449000
heap
page read and write
16DAF402000
heap
page read and write
25FA5C02000
trusted library allocation
page read and write
1007FE000
stack
page read and write
2B0E2E74000
heap
page read and write
25FA4100000
heap
page read and write
1791CC3E000
heap
page read and write
FDAD8FF000
stack
page read and write
25FA403D000
heap
page read and write
16DAF441000
heap
page read and write
2EB56202000
heap
page read and write
FDAD31B000
stack
page read and write
25FA4013000
heap
page read and write
1FBA08E0000
heap
page read and write
16DAF429000
heap
page read and write
16DAF458000
heap
page read and write
729000
heap
page read and write
16DAF478000
heap
page read and write
2B0E3700000
heap
page read and write
2EB5623F000
heap
page read and write
FAB52FA000
stack
page read and write
1E184FD0000
trusted library allocation
page read and write
2B0E3794000
heap
page read and write
1E184DA0000
heap
page read and write
25FA5A80000
trusted library allocation
page read and write
BFF3FFF000
stack
page read and write
1E185590000
remote allocation
page read and write
27AE000
stack
page read and write
1E185602000
trusted library allocation
page read and write
2B0E2E00000
heap
page read and write
2B0E2F13000
heap
page read and write
16DAF43D000
heap
page read and write
BFF3D7C000
stack
page read and write
10077D000
stack
page read and write
2B0E2E3C000
heap
page read and write
16DAF45F000
heap
page read and write
1506EC7C000
heap
page read and write
1506EC02000
heap
page read and write
1E185590000
remote allocation
page read and write
1FBA0E60000
trusted library allocation
page read and write
1E185026000
heap
page read and write
2B0E2D70000
trusted library allocation
page read and write
BFF374B000
stack
page read and write
16DAF479000
heap
page read and write
1E184E00000
heap
page read and write
25FA3FC0000
trusted library allocation
page read and write
10067E000
stack
page read and write
1791CC37000
heap
page read and write
1E185054000
heap
page read and write
FAB567F000
stack
page read and write
375F000
stack
page read and write
2B0E2E94000
heap
page read and write
49F000
unkown
page readonly
25FA402A000
heap
page read and write
2EB56313000
heap
page read and write
16DAF460000
heap
page read and write
1506EBE0000
trusted library allocation
page read and write
2EB56090000
heap
page read and write
8426B7D000
stack
page read and write
1506EC6B000
heap
page read and write
25FA4000000
heap
page read and write
FAB5C7E000
stack
page read and write
365E000
stack
page read and write
2B0E2E3C000
heap
page read and write
BFF41FF000
stack
page read and write
2B0E3722000
heap
page read and write
1E185102000
heap
page read and write
2B0E3743000
heap
page read and write
1791CC02000
heap
page read and write
2B0E37B1000
heap
page read and write
2B0E3722000
heap
page read and write
16DAF463000
heap
page read and write
16DAF47A000
heap
page read and write
BFF40FE000
stack
page read and write
BFF3B7B000
stack
page read and write
2EB56265000
heap
page read and write
842657E000
stack
page read and write
700000
heap
page read and write
2B0E3702000
heap
page read and write
FDADDFE000
stack
page read and write
40F000
unkown
page write copy
1008FD000
stack
page read and write
407000
unkown
page execute and read and write
1506ED00000
heap
page read and write
2B0E2D50000
trusted library allocation
page read and write
16DAF502000
heap
page read and write
30000
heap
page read and write
1791CD02000
heap
page read and write
2B0E2E89000
heap
page read and write
2B0E2E54000
heap
page read and write
768000
heap
page read and write
2EB56213000
heap
page read and write
6DE4CFE000
stack
page read and write
2EB56302000
heap
page read and write
773000
heap
page read and write
2C2E000
stack
page read and write
1791CAE0000
heap
page read and write
BFF42FF000
stack
page read and write
1FBA113A000
heap
page read and write
2D817FB000
stack
page read and write
84263FC000
stack
page read and write
400000
unkown
page execute and read and write
234E000
stack
page read and write
25FA4057000
heap
page read and write
389F000
stack
page read and write
16DAF360000
heap
page read and write
1506EAE0000
heap
page read and write
1E185590000
remote allocation
page read and write
31DF000
stack
page read and write
2EB56264000
heap
page read and write
2B0E3813000
heap
page read and write
1FBA0913000
heap
page read and write
1F0000
heap
page read and write
1791CC2F000
heap
page read and write
510000
direct allocation
page read and write
1506F402000
trusted library allocation
page read and write
2B0E37BF000
heap
page read and write
16DAF44E000
heap
page read and write
FDAD77D000
stack
page read and write
2EB5625B000
heap
page read and write
1FBA08E2000
heap
page read and write
16DAF44D000
heap
page read and write
2B0E2E65000
heap
page read and write
FAB547F000
stack
page read and write
1FBA06A0000
heap
page read and write
2B0E2BE0000
heap
page read and write
1FBA08C1000
heap
page read and write
8426C7E000
stack
page read and write
2D818FE000
stack
page read and write
19B000
stack
page read and write
1E185013000
heap
page read and write
16DAF430000
heap
page read and write
BFF3EFA000
stack
page read and write
1FBA0867000
heap
page read and write
520000
heap
page read and write
1791CA80000
heap
page read and write
10007C000
stack
page read and write
1506EC00000
heap
page read and write
2D810EC000
stack
page read and write
16DAF444000
heap
page read and write
2B0E2FB9000
heap
page read and write
2B0E3823000
heap
page read and write
420000
unkown
page read and write
2D815FB000
stack
page read and write
1FBA0800000
heap
page read and write
1FBA0690000
heap
page read and write
FAB4EAC000
stack
page read and write
1FBA0829000
heap
page read and write
16DAF445000
heap
page read and write
403000
unkown
page execute and read and write
2BDB000
heap
page read and write
1506EC54000
heap
page read and write
1506EC7A000
heap
page read and write
2B0E2E22000
heap
page read and write
FAB577D000
stack
page read and write
FAB557C000
stack
page read and write
1FBA08CA000
heap
page read and write
16DAF390000
trusted library allocation
page read and write
16DAF442000
heap
page read and write
2B0E2E13000
heap
page read and write
2D816FE000
stack
page read and write
2EB56229000
heap
page read and write
2EB56200000
heap
page read and write
FAB5B7F000
stack
page read and write
1FBA083D000
heap
page read and write
FDADBFC000
stack
page read and write
25FA4058000
heap
page read and write
2B0E3800000
heap
page read and write
16DAF473000
heap
page read and write
16DAF462000
heap
page read and write
1FBA0700000
heap
page read and write
FAB587E000
stack
page read and write
25FA3FE0000
trusted library allocation
page read and write
1506ED13000
heap
page read and write
BFF3C7E000
stack
page read and write
2EB560A0000
heap
page read and write
351E000
stack
page read and write
405000
unkown
page execute and read and write
27E0000
heap
page read and write
70A000
heap
page read and write
16DAF461000
heap
page read and write
1E18503D000
heap
page read and write
25FA4102000
heap
page read and write
1791CC00000
heap
page read and write
1791CA90000
heap
page read and write
22C0000
heap
page read and write
1791CC13000
heap
page read and write
1FBA0902000
heap
page read and write
1791CC29000
heap
page read and write
842667F000
stack
page read and write
1FBA1002000
heap
page read and write
5DFCFBE000
stack
page read and write
8425FBB000
stack
page read and write
16DAF466000
heap
page read and write
16DAF46E000
heap
page read and write
716000
heap
page execute and read and write
49F000
unkown
page readonly
1FBA0886000
heap
page read and write
1506EC41000
heap
page read and write
1FBA0813000
heap
page read and write
2B0E2FE5000
heap
page read and write
There are 336 hidden memdumps, click here to show them.