Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
NVIDIAWebHelper.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
initial sample
|
||
\Device\ConDrv
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\NVIDIAWebHelper.exe
|
"C:\Users\user\Desktop\NVIDIAWebHelper.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://xmrig.com/benchmark/%s
|
unknown
|
||
https://xmrig.com/wizard
|
unknown
|
||
https://xmrig.com/wizard%s
|
unknown
|
||
https://xmrig.com/docs/algorithms
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FF7896A0000
|
unkown
|
page readonly
|
||
213EB43C000
|
heap
|
page read and write
|
||
7FF7897CE000
|
unkown
|
page read and write
|
||
213ECEC0000
|
heap
|
page read and write
|
||
7FF789A9D000
|
unkown
|
page execute read
|
||
7FF78B485000
|
unkown
|
page readonly
|
||
213EB3B0000
|
heap
|
page read and write
|
||
D4F4B5C000
|
stack
|
page read and write
|
||
7FF78B480000
|
unkown
|
page readonly
|
||
7FF78B491000
|
unkown
|
page readonly
|
||
7FF789380000
|
unkown
|
page readonly
|
||
7FF78B491000
|
unkown
|
page readonly
|
||
7FF789AD8000
|
unkown
|
page read and write
|
||
213EB469000
|
heap
|
page read and write
|
||
7FF78B480000
|
unkown
|
page readonly
|
||
7FF789AA3000
|
unkown
|
page readonly
|
||
7FF789380000
|
unkown
|
page readonly
|
||
D4F4EFF000
|
stack
|
page read and write
|
||
7FF78A3C6000
|
unkown
|
page execute read
|
||
7FF789381000
|
unkown
|
page execute read
|
||
213EB360000
|
heap
|
page read and write
|
||
7FF78ADC6000
|
unkown
|
page execute read
|
||
7FF78ADC6000
|
unkown
|
page execute read
|
||
213EB280000
|
heap
|
page read and write
|
||
7FF789AA4000
|
unkown
|
page execute read
|
||
213EB390000
|
heap
|
page read and write
|
||
213ECDE4000
|
heap
|
page read and write
|
||
7FF78A3C4000
|
unkown
|
page read and write
|
||
D4F4FFF000
|
stack
|
page read and write
|
||
7FF789A7D000
|
unkown
|
page read and write
|
||
213EB439000
|
heap
|
page read and write
|
||
213ECDE0000
|
heap
|
page read and write
|
||
7FF789ADE000
|
unkown
|
page execute read
|
||
7FF789A7E000
|
unkown
|
page readonly
|
||
213EB3D0000
|
direct allocation
|
page execute read
|
||
213EB430000
|
heap
|
page read and write
|
||
7FF78B485000
|
unkown
|
page readonly
|
||
7FF789A6A000
|
unkown
|
page read and write
|
||
213EB3D0000
|
trusted library allocation
|
page read and write
|
||
7FF78A3C6000
|
unkown
|
page execute read
|
||
213EB3D0000
|
trusted library allocation
|
page read and write
|
There are 31 hidden memdumps, click here to show them.