IOC Report
PSKILL.EXE

loading gif

Files

File Path
Type
Category
Malicious
PSKILL.EXE
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PSKILL.EXE
"C:\Users\user\Desktop\PSKILL.EXE"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.sysinternals.com
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
407000
unkown
page readonly
407000
unkown
page readonly
400000
unkown
page readonly
930000
direct allocation
page read and write
401000
unkown
page execute read
9D000
stack
page read and write
8EF000
stack
page read and write
7AF000
stack
page read and write
400000
unkown
page readonly
19D000
stack
page read and write
920000
heap
page read and write
401000
unkown
page execute read
1F0000
heap
page read and write
420000
heap
page read and write
460000
heap
page read and write
408000
unkown
page read and write
408000
unkown
page write copy
57E000
stack
page read and write
5BE000
heap
page read and write
924000
heap
page read and write
40B000
unkown
page readonly
5B0000
heap
page read and write
7EE000
stack
page read and write
5BA000
heap
page read and write
40B000
unkown
page readonly
A30000
heap
page read and write
There are 16 hidden memdumps, click here to show them.