IOC Report
server.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\server.exe
C:\Users\user\Desktop\server.exe
malicious

URLs

Name
IP
Malicious
http://checklist.skype.com/drew/8GsEYWG5R7vgd6ovGci/nrUBbPIi4nn3B9s17IICy8/dABAhwF5Li84O/L9tQ_2Fw/xJ
unknown
http://checklist.skype.com/drew/8GsEYWG5R7vgd6ovGci/nrUBbPIi4nn3B9s17IICy8/dABAhwF5Li84O/L9tQ_2Fw/
unknown
http://checklist.skype.com/
unknown

Domains

Name
IP
Malicious
checklist.skype.com
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
2BD8000
heap
page read and write
malicious
842697D000
stack
page read and write
16DAF413000
heap
page read and write
1E185057000
heap
page read and write
40D000
unkown
page write copy
25FA4047000
heap
page read and write
FDAD9FF000
stack
page read and write
222A000
unclassified section
page read and write
2EB56275000
heap
page read and write
2B0E2E2A000
heap
page read and write
84267FD000
stack
page read and write
2229000
unclassified section
page readonly
1E18505C000
heap
page read and write
16DAF44B000
heap
page read and write
1001FE000
stack
page read and write
2B0E2E69000
heap
page read and write
25FA4118000
heap
page read and write
9D000
stack
page read and write
6DE4DF9000
stack
page read and write
1E184D90000
heap
page read and write
2EB56A02000
trusted library allocation
page read and write
FDADEFE000
stack
page read and write
1FBA08B9000
heap
page read and write
FDADCFC000
stack
page read and write
1791D402000
trusted library allocation
page read and write
16DAF439000
heap
page read and write
401000
unkown
page execute read
25FA3F30000
heap
page read and write
FAB5A7F000
stack
page read and write
221C000
stack
page read and write
2B0E37C9000
heap
page read and write
16DAF469000
heap
page read and write
2B0E2E67000
heap
page read and write
25FA4113000
heap
page read and write
16DAF46A000
heap
page read and write
400000
unkown
page readonly
1506ED02000
heap
page read and write
16DAF446000
heap
page read and write
32DF000
stack
page read and write
5DFD3FE000
stack
page read and write
33DD000
stack
page read and write
1E185002000
heap
page read and write
100A7D000
stack
page read and write
2B0E3771000
heap
page read and write
2B0E2E2C000
heap
page read and write
10057E000
stack
page read and write
1791CC44000
heap
page read and write
34DA000
stack
page read and write
25FA4089000
heap
page read and write
2EB56265000
heap
page read and write
30DF000
stack
page read and write
2B0E2BF0000
heap
page read and write
2EB56100000
heap
page read and write
8426A7F000
stack
page read and write
1791CC52000
heap
page read and write
2B0E2E92000
heap
page read and write
16DAFC02000
trusted library allocation
page read and write
842687B000
stack
page read and write
16DAF447000
heap
page read and write
379E000
stack
page read and write
2B0E3830000
heap
page read and write
1FBA086D000
heap
page read and write
5DFD5FE000
stack
page read and write
6DE478B000
stack
page read and write
5DFD4FE000
stack
page read and write
16DAF2F0000
heap
page read and write
16DAF400000
heap
page read and write
2C90000
heap
page read and write
2EB5626F000
heap
page read and write
84266FC000
stack
page read and write
2B0E2C50000
heap
page read and write
25FA4048000
heap
page read and write
500000
direct allocation
page execute and read and write
1506EC28000
heap
page read and write
25FA4063000
heap
page read and write
25FA3F20000
heap
page read and write
2B0E37B7000
heap
page read and write
16DAF46C000
heap
page read and write
5DFCF3E000
stack
page read and write
222C000
unclassified section
page readonly
361F000
stack
page read and write
16DAF467000
heap
page read and write
1E185000000
heap
page read and write
2220000
unclassified section
page read and write
25FA5B40000
remote allocation
page read and write
25FA4072000
heap
page read and write
2758000
heap
page read and write
2EB5626C000
heap
page read and write
25FA3F90000
heap
page read and write
211C000
stack
page read and write
16DAF300000
heap
page read and write
16DAF483000
heap
page read and write
25FA4002000
heap
page read and write
16DAF47C000