IOC Report
SecuriteInfo.com.FileRepPup.13718.29302.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.13718.29302.exe
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.13718.29302.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://github.com/jpillora/chisel
unknown
https://acme-v02.api.letsencrypt.org/directoryinternal
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
C000038000
direct allocation
page read and write
1FF5AEC0000
direct allocation
page read and write
8DD89FF000
stack
page read and write
C0000C2000
direct allocation
page read and write
1FF5AD89000
direct allocation
page read and write
90B000
unkown
page write copy
C000004000
direct allocation
page read and write
1FF5AC89000
heap
page read and write
C00002E000
direct allocation
page read and write
C000000000
direct allocation
page read and write
C0000BC000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
1FF5AC70000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
8C4000
unkown
page write copy
90000
unkown
page readonly
8C3000
unkown
page read and write
C00008A000
direct allocation
page read and write
8DD8BFF000
stack
page read and write
8CD000
unkown
page write copy
C0000E6000
direct allocation
page read and write
87F000
unkown
page write copy
C00001C000
direct allocation
page read and write
C000072000
direct allocation
page read and write
C0000CA000
direct allocation
page read and write
1FF5AD84000
direct allocation
page read and write
C0000C8000
direct allocation
page read and write
91000
unkown
page execute read
C0000A2000
direct allocation
page read and write
C0000BE000
direct allocation
page read and write
8CB000
unkown
page read and write
C0000D2000
direct allocation
page read and write
1FF5AC80000
heap
page read and write
C00001A000
direct allocation
page read and write
8FD000
unkown
page read and write
90C000
unkown
page readonly
C0000EA000
direct allocation
page read and write
C000035000
direct allocation
page read and write
C0000A6000
direct allocation
page read and write
873000
unkown
page read and write
8CF000
unkown
page read and write
1FF5AEF0000
heap
page read and write
C000046000
direct allocation
page read and write
C000094000
direct allocation
page read and write
8DD8DFF000
stack
page read and write
90B000
unkown
page write copy
906000
unkown
page read and write
1FF5AC30000
heap
page read and write
C0000B6000
direct allocation
page read and write
8C7000
unkown
page write copy
C00004E000
direct allocation
page read and write
873000
unkown
page write copy
C000064000
direct allocation
page read and write
C000033000
direct allocation
page read and write
C0000C4000
direct allocation
page read and write
C000098000
direct allocation
page read and write
C000016000
direct allocation
page read and write
C00004C000
direct allocation
page read and write
C0000E2000
direct allocation
page read and write
C000020000
direct allocation
page read and write
C000022000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
C000043000
direct allocation
page read and write
C0000AC000
direct allocation
page read and write
8DD87FD000
stack
page read and write
1FF5AD8D000
direct allocation
page read and write
8DD8FFF000
stack
page read and write
1FF5AD80000
direct allocation
page read and write
91000
unkown
page execute read
90C000
unkown
page readonly
C000096000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
91000
unkown
page execute read
90000
unkown
page readonly
C0000E4000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C000078000
direct allocation
page read and write
C000024000
direct allocation
page read and write
1FF5AB30000
heap
page read and write
1FF5AEF5000
heap
page read and write
C000092000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
8DD91FE000
stack
page read and write
4DB000
unkown
page readonly
C000076000
direct allocation
page read and write
8C5000
unkown
page read and write
4DB000
unkown
page readonly
1FF5AC10000
heap
page read and write
1FF5AEE0000
direct allocation
page read and write
1FF5AC8C000
heap
page read and write
C0000CE000
direct allocation
page read and write
C00009A000
direct allocation
page read and write
C0000B4000
direct allocation
page read and write
C000002000
direct allocation
page read and write
There are 84 hidden memdumps, click here to show them.