Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
CMCR5hvseX.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\Windows\microsofthelp.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\CMCR5hvseX.exe
|
"C:\Users\user\Desktop\CMCR5hvseX.exe"
|
||
C:\Windows\microsofthelp.exe
|
"C:\Windows\microsofthelp.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
microsofthelp
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
406000
|
unkown
|
page execute and write copy
|
||
401000
|
unkown
|
page execute and write copy
|
||
406000
|
unkown
|
page execute and write copy
|
||
6AE000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute and write copy
|
||
410000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
405000
|
unkown
|
page execute and read and write
|
||
405000
|
unkown
|
page execute and read and write
|
||
408000
|
unkown
|
page execute and read and write
|
||
40C000
|
unkown
|
page write copy
|
||
19D000
|
stack
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
5DA000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
408000
|
unkown
|
page execute and read and write
|
||
1F0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
409000
|
unkown
|
page execute and write copy
|
||
40C000
|
unkown
|
page read and write
|
||
408000
|
unkown
|
page execute and write copy
|
||
54E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
9C000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute and write copy
|
||
1F0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute and write copy
|
||
409000
|
unkown
|
page execute and write copy
|
||
400000
|
unkown
|
page readonly
|
||
40C000
|
unkown
|
page write copy
|
||
A00000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
64F000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page execute and write copy
|
||
68E000
|
stack
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
6AA000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
6C6000
|
heap
|
page read and write
|
There are 35 hidden memdumps, click here to show them.