Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\server.exe
|
C:\Users\user\Desktop\server.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://checklist.skype.com/drew/8GsEYWG5R7vgd6ovGci/nrUBbPIi4nn3B9s17IICy8/dABAhwF5Li84O/L9tQ_2Fw/xJ
|
unknown
|
||
http://checklist.skype.com/drew/8GsEYWG5R7vgd6ovGci/nrUBbPIi4nn3B9s17IICy8/dABAhwF5Li84O/L9tQ_2Fw/
|
unknown
|
||
http://checklist.skype.com/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
checklist.skype.com
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
842697D000
|
stack
|
page read and write
|
||
16DAF413000
|
heap
|
page read and write
|
||
1E185057000
|
heap
|
page read and write
|
||
40D000
|
unkown
|
page write copy
|
||
25FA4047000
|
heap
|
page read and write
|
||
FDAD9FF000
|
stack
|
page read and write
|
||
222A000
|
unclassified section
|
page read and write
|
||
2EB56275000
|
heap
|
page read and write
|
||
2B0E2E2A000
|
heap
|
page read and write
|
||
84267FD000
|
stack
|
page read and write
|
||
2229000
|
unclassified section
|
page readonly
|
||
1E18505C000
|
heap
|
page read and write
|
||
16DAF44B000
|
heap
|
page read and write
|
||
1001FE000
|
stack
|
page read and write
|
||
2B0E2E69000
|
heap
|
page read and write
|
||
25FA4118000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
6DE4DF9000
|
stack
|
page read and write
|
||
1E184D90000
|
heap
|
page read and write
|
||
2EB56A02000
|
trusted library allocation
|
page read and write
|
||
FDADEFE000
|
stack
|
page read and write
|
||
1FBA08B9000
|
heap
|
page read and write
|
||
FDADCFC000
|
stack
|
page read and write
|
||
1791D402000
|
trusted library allocation
|
page read and write
|
||
16DAF439000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
25FA3F30000
|
heap
|
page read and write
|
||
FAB5A7F000
|
stack
|
page read and write
|
||
221C000
|
stack
|
page read and write
|
||
2B0E37C9000
|
heap
|
page read and write
|
||
16DAF469000
|
heap
|
page read and write
|
||
2B0E2E67000
|
heap
|
page read and write
|
||
25FA4113000
|
heap
|
page read and write
|
||
16DAF46A000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1506ED02000
|
heap
|
page read and write
|
||
16DAF446000
|
heap
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
5DFD3FE000
|
stack
|
page read and write
|
||
33DD000
|
stack
|
page read and write
|
||
1E185002000
|
heap
|
page read and write
|
||
100A7D000
|
stack
|
page read and write
|
||
2B0E3771000
|
heap
|
page read and write
|
||
2B0E2E2C000
|
heap
|
page read and write
|
||
10057E000
|
stack
|
page read and write
|
||
1791CC44000
|
heap
|
page read and write
|
||
34DA000
|
stack
|
page read and write
|
||
25FA4089000
|
heap
|
page read and write
|
||
2EB56265000
|
heap
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
2B0E2BF0000
|
heap
|
page read and write
|
||
2EB56100000
|
heap
|
page read and write
|
||
8426A7F000
|
stack
|
page read and write
|
||
1791CC52000
|
heap
|
page read and write
|
||
2B0E2E92000
|
heap
|
page read and write
|
||
16DAFC02000
|
trusted library allocation
|
page read and write
|
||
842687B000
|
stack
|
page read and write
|
||
16DAF447000
|
heap
|
page read and write
|
||
379E000
|
stack
|
page read and write
|
||
2B0E3830000
|
heap
|
page read and write
|
||
1FBA086D000
|
heap
|
page read and write
|
||
5DFD5FE000
|
stack
|
page read and write
|
||
6DE478B000
|
stack
|
page read and write
|
||
5DFD4FE000
|
stack
|
page read and write
|
||
16DAF2F0000
|
heap
|
page read and write
|
||
16DAF400000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
2EB5626F000
|
heap
|
page read and write
|
||
84266FC000
|
stack
|
page read and write
|
||
2B0E2C50000
|
heap
|
page read and write
|
||
25FA4048000
|
heap
|
page read and write
|
||
500000
|
direct allocation
|
page execute and read and write
|
||
1506EC28000
|
heap
|
page read and write
|
||
25FA4063000
|
heap
|
page read and write
|
||
25FA3F20000
|
heap
|
page read and write
|
||
2B0E37B7000
|
heap
|
page read and write
|
||
16DAF46C000
|
heap
|
page read and write
|
||
5DFCF3E000
|
stack
|
page read and write
|
||
222C000
|
unclassified section
|
page readonly
|
||
361F000
|
stack
|
page read and write
|
||
16DAF467000
|
heap
|
page read and write
|
||
1E185000000
|
heap
|
page read and write
|
||
2220000
|
unclassified section
|
page read and write
|
||
25FA5B40000
|
remote allocation
|
page read and write
|
||
25FA4072000
|
heap
|
page read and write
|
||
2758000
|
heap
|
page read and write
|
||
2EB5626C000
|
heap
|
page read and write
|
||
25FA3F90000
|
heap
|
page read and write
|
||
211C000
|
stack
|
page read and write
|
||
16DAF300000
|
heap
|
page read and write
|
||
16DAF483000
|
heap
|
page read and write
|
||
25FA4002000
|
heap
|
page read and write
|
||
16DAF47C000
|
heap
|
page read and write
|
||
25FA5B40000
|
remote allocation
|
page read and write
|
||
1FBA1100000
|
heap
|
page read and write
|
||
16DAF47D000
|
heap
|
page read and write
|
||
1506EA70000
|
heap
|
page read and write
|
||
2B0E3827000
|
heap
|
page read and write
|
||
2B0E3754000
|
heap
|
page read and write
|
||
1FBA1112000
|
heap
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
16DAF448000
|
heap
|
page read and write
|
||
25FA4048000
|
heap
|
page read and write
|
||
2C6D000
|
stack
|
page read and write
|
||
77D000
|
heap
|
page read and write
|
||
2260000
|
heap
|
page read and write
|
||
2EB56860000
|
trusted library allocation
|
page read and write
|
||
5DFCEBB000
|
stack
|
page read and write
|
||
26D9000
|
heap
|
page read and write
|
||
2B0E2E76000
|
heap
|
page read and write
|
||
1791CBE0000
|
trusted library allocation
|
page read and write
|
||
BFF427F000
|
stack
|
page read and write
|
||
16DAF44F000
|
heap
|
page read and write
|
||
16DAF440000
|
heap
|
page read and write
|
||
2B0E3802000
|
heap
|
page read and write
|
||
BFF3DF9000
|
stack
|
page read and write
|
||
16DAF454000
|
heap
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
2221000
|
unclassified section
|
page execute read
|
||
1E185020000
|
heap
|
page read and write
|
||
1E185029000
|
heap
|
page read and write
|
||
25FA5B40000
|
remote allocation
|
page read and write
|
||
2B0E2F8C000
|
heap
|
page read and write
|
||
FDADAFF000
|
stack
|
page read and write
|
||
6DE4EFF000
|
stack
|
page read and write
|
||
25FA4058000
|
heap
|
page read and write
|
||
1506EC13000
|
heap
|
page read and write
|
||
16DAF474000
|
heap
|
page read and write
|
||
FAB597E000
|
stack
|
page read and write
|
||
230E000
|
stack
|
page read and write
|
||
1506EA80000
|
heap
|
page read and write
|
||
2B0E3602000
|
heap
|
page read and write
|
||
25FA5AC0000
|
trusted library allocation
|
page read and write
|
||
10097E000
|
stack
|
page read and write
|
||
16DAF464000
|
heap
|
page read and write
|
||
2B0E2E90000
|
heap
|
page read and write
|
||
16DAF449000
|
heap
|
page read and write
|
||
16DAF402000
|
heap
|
page read and write
|
||
25FA5C02000
|
trusted library allocation
|
page read and write
|
||
1007FE000
|
stack
|
page read and write
|
||
2B0E2E74000
|
heap
|
page read and write
|
||
25FA4100000
|
heap
|
page read and write
|
||
1791CC3E000
|
heap
|
page read and write
|
||
FDAD8FF000
|
stack
|
page read and write
|
||
25FA403D000
|
heap
|
page read and write
|
||
16DAF441000
|
heap
|
page read and write
|
||
2EB56202000
|
heap
|
page read and write
|
||
FDAD31B000
|
stack
|
page read and write
|
||
25FA4013000
|
heap
|
page read and write
|
||
1FBA08E0000
|
heap
|
page read and write
|
||
16DAF429000
|
heap
|
page read and write
|
||
16DAF458000
|
heap
|
page read and write
|
||
729000
|
heap
|
page read and write
|
||
16DAF478000
|
heap
|
page read and write
|
||
2B0E3700000
|
heap
|
page read and write
|
||
2EB5623F000
|
heap
|
page read and write
|
||
FAB52FA000
|
stack
|
page read and write
|
||
1E184FD0000
|
trusted library allocation
|
page read and write
|
||
2B0E3794000
|
heap
|
page read and write
|
||
1E184DA0000
|
heap
|
page read and write
|
||
25FA5A80000
|
trusted library allocation
|
page read and write
|
||
BFF3FFF000
|
stack
|
page read and write
|
||
1E185590000
|
remote allocation
|
page read and write
|
||
27AE000
|
stack
|
page read and write
|
||
1E185602000
|
trusted library allocation
|
page read and write
|
||
2B0E2E00000
|
heap
|
page read and write
|
||
2B0E2F13000
|
heap
|
page read and write
|
||
16DAF43D000
|
heap
|
page read and write
|
||
BFF3D7C000
|
stack
|
page read and write
|
||
10077D000
|
stack
|
page read and write
|
||
2B0E2E3C000
|
heap
|
page read and write
|
||
16DAF45F000
|
heap
|
page read and write
|
||
1506EC7C000
|
heap
|
page read and write
|
||
1506EC02000
|
heap
|
page read and write
|
||
1E185590000
|
remote allocation
|
page read and write
|
||
1FBA0E60000
|
trusted library allocation
|
page read and write
|
||
1E185026000
|
heap
|
page read and write
|
||
2B0E2D70000
|
trusted library allocation
|
page read and write
|
||
BFF374B000
|
stack
|
page read and write
|
||
16DAF479000
|
heap
|
page read and write
|
||
1E184E00000
|
heap
|
page read and write
|
||
25FA3FC0000
|
trusted library allocation
|
page read and write
|
||
10067E000
|
stack
|
page read and write
|
||
1791CC37000
|
heap
|
page read and write
|
||
1E185054000
|
heap
|
page read and write
|
||
FAB567F000
|
stack
|
page read and write
|
||
375F000
|
stack
|
page read and write
|
||
2B0E2E94000
|
heap
|
page read and write
|
||
49F000
|
unkown
|
page readonly
|
||
25FA402A000
|
heap
|
page read and write
|
||
2EB56313000
|
heap
|
page read and write
|
||
16DAF460000
|
heap
|
page read and write
|
||
1506EBE0000
|
trusted library allocation
|
page read and write
|
||
2EB56090000
|
heap
|
page read and write
|
||
8426B7D000
|
stack
|
page read and write
|
||
1506EC6B000
|
heap
|
page read and write
|
||
25FA4000000
|
heap
|
page read and write
|
||
FAB5C7E000
|
stack
|
page read and write
|
||
365E000
|
stack
|
page read and write
|
||
2B0E2E3C000
|
heap
|
page read and write
|
||
BFF41FF000
|
stack
|
page read and write
|
||
2B0E3722000
|
heap
|
page read and write
|
||
1E185102000
|
heap
|
page read and write
|
||
2B0E3743000
|
heap
|
page read and write
|
||
1791CC02000
|
heap
|
page read and write
|
||
2B0E37B1000
|
heap
|
page read and write
|
||
2B0E3722000
|
heap
|
page read and write
|
||
16DAF463000
|
heap
|
page read and write
|
||
16DAF47A000
|
heap
|
page read and write
|
||
BFF40FE000
|
stack
|
page read and write
|
||
BFF3B7B000
|
stack
|
page read and write
|
||
2EB56265000
|
heap
|
page read and write
|
||
842657E000
|
stack
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
2B0E3702000
|
heap
|
page read and write
|
||
FDADDFE000
|
stack
|
page read and write
|
||
40F000
|
unkown
|
page write copy
|
||
1008FD000
|
stack
|
page read and write
|
||
407000
|
unkown
|
page execute and read and write
|
||
1506ED00000
|
heap
|
page read and write
|
||
2B0E2D50000
|
trusted library allocation
|
page read and write
|
||
16DAF502000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
1791CD02000
|
heap
|
page read and write
|
||
2B0E2E89000
|
heap
|
page read and write
|
||
2B0E2E54000
|
heap
|
page read and write
|
||
768000
|
heap
|
page read and write
|
||
2EB56213000
|
heap
|
page read and write
|
||
6DE4CFE000
|
stack
|
page read and write
|
||
2EB56302000
|
heap
|
page read and write
|
||
773000
|
heap
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
1791CAE0000
|
heap
|
page read and write
|
||
BFF42FF000
|
stack
|
page read and write
|
||
1FBA113A000
|
heap
|
page read and write
|
||
2D817FB000
|
stack
|
page read and write
|
||
84263FC000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
234E000
|
stack
|
page read and write
|
||
25FA4057000
|
heap
|
page read and write
|
||
389F000
|
stack
|
page read and write
|
||
16DAF360000
|
heap
|
page read and write
|
||
1506EAE0000
|
heap
|
page read and write
|
||
1E185590000
|
remote allocation
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
2EB56264000
|
heap
|
page read and write
|
||
2B0E3813000
|
heap
|
page read and write
|
||
1FBA0913000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1791CC2F000
|
heap
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
1506F402000
|
trusted library allocation
|
page read and write
|
||
2B0E37BF000
|
heap
|
page read and write
|
||
16DAF44E000
|
heap
|
page read and write
|
||
FDAD77D000
|
stack
|
page read and write
|
||
2EB5625B000
|
heap
|
page read and write
|
||
1FBA08E2000
|
heap
|
page read and write
|
||
16DAF44D000
|
heap
|
page read and write
|
||
2B0E2E65000
|
heap
|
page read and write
|
||
FAB547F000
|
stack
|
page read and write
|
||
1FBA06A0000
|
heap
|
page read and write
|
||
2B0E2BE0000
|
heap
|
page read and write
|
||
1FBA08C1000
|
heap
|
page read and write
|
||
8426C7E000
|
stack
|
page read and write
|
||
2D818FE000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
1E185013000
|
heap
|
page read and write
|
||
16DAF430000
|
heap
|
page read and write
|
||
BFF3EFA000
|
stack
|
page read and write
|
||
1FBA0867000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
1791CA80000
|
heap
|
page read and write
|
||
10007C000
|
stack
|
page read and write
|
||
1506EC00000
|
heap
|
page read and write
|
||
2D810EC000
|
stack
|
page read and write
|
||
16DAF444000
|
heap
|
page read and write
|
||
2B0E2FB9000
|
heap
|
page read and write
|
||
2B0E3823000
|
heap
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
2D815FB000
|
stack
|
page read and write
|
||
1FBA0800000
|
heap
|
page read and write
|
||
1FBA0690000
|
heap
|
page read and write
|
||
FAB4EAC000
|
stack
|
page read and write
|
||
1FBA0829000
|
heap
|
page read and write
|
||
16DAF445000
|
heap
|
page read and write
|
||
403000
|
unkown
|
page execute and read and write
|
||
2BDB000
|
heap
|
page read and write
|
||
1506EC54000
|
heap
|
page read and write
|
||
1506EC7A000
|
heap
|
page read and write
|
||
2B0E2E22000
|
heap
|
page read and write
|
||
FAB577D000
|
stack
|
page read and write
|
||
FAB557C000
|
stack
|
page read and write
|
||
1FBA08CA000
|
heap
|
page read and write
|
||
16DAF390000
|
trusted library allocation
|
page read and write
|
||
16DAF442000
|
heap
|
page read and write
|
||
2B0E2E13000
|
heap
|
page read and write
|
||
2D816FE000
|
stack
|
page read and write
|
||
2EB56229000
|
heap
|
page read and write
|
||
2EB56200000
|
heap
|
page read and write
|
||
FAB5B7F000
|
stack
|
page read and write
|
||
1FBA083D000
|
heap
|
page read and write
|
||
FDADBFC000
|
stack
|
page read and write
|
||
25FA4058000
|
heap
|
page read and write
|
||
2B0E3800000
|
heap
|
page read and write
|
||
16DAF473000
|
heap
|
page read and write
|
||
16DAF462000
|
heap
|
page read and write
|
||
1FBA0700000
|
heap
|
page read and write
|
||
FAB587E000
|
stack
|
page read and write
|
||
25FA3FE0000
|
trusted library allocation
|
page read and write
|
||
1506ED13000
|
heap
|
page read and write
|
||
BFF3C7E000
|
stack
|
page read and write
|
||
2EB560A0000
|
heap
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
405000
|
unkown
|
page execute and read and write
|
||
27E0000
|
heap
|
page read and write
|
||
70A000
|
heap
|
page read and write
|
||
16DAF461000
|
heap
|
page read and write
|
||
1E18503D000
|
heap
|
page read and write
|
||
25FA4102000
|
heap
|
page read and write
|
||
1791CC00000
|
heap
|
page read and write
|
||
1791CA90000
|
heap
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
1791CC13000
|
heap
|
page read and write
|
||
1FBA0902000
|
heap
|
page read and write
|
||
1791CC29000
|
heap
|
page read and write
|
||
842667F000
|
stack
|
page read and write
|
||
1FBA1002000
|
heap
|
page read and write
|
||
5DFCFBE000
|
stack
|
page read and write
|
||
8425FBB000
|
stack
|
page read and write
|
||
16DAF466000
|
heap
|
page read and write
|
||
16DAF46E000
|
heap
|
page read and write
|
||
716000
|
heap
|
page execute and read and write
|
||
49F000
|
unkown
|
page readonly
|
||
1FBA0886000
|
heap
|
page read and write
|
||
1506EC41000
|
heap
|
page read and write
|
||
1FBA0813000
|
heap
|
page read and write
|
||
2B0E2FE5000
|
heap
|
page read and write
|
There are 336 hidden memdumps, click here to show them.