Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.13718.29302.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.13718.29302.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://github.com/jpillora/chisel
|
unknown
|
||
https://acme-v02.api.letsencrypt.org/directoryinternal
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C000038000
|
direct allocation
|
page read and write
|
||
1FF5AEC0000
|
direct allocation
|
page read and write
|
||
8DD89FF000
|
stack
|
page read and write
|
||
C0000C2000
|
direct allocation
|
page read and write
|
||
1FF5AD89000
|
direct allocation
|
page read and write
|
||
90B000
|
unkown
|
page write copy
|
||
C000004000
|
direct allocation
|
page read and write
|
||
1FF5AC89000
|
heap
|
page read and write
|
||
C00002E000
|
direct allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
1FF5AC70000
|
direct allocation
|
page read and write
|
||
C00008E000
|
direct allocation
|
page read and write
|
||
8C4000
|
unkown
|
page write copy
|
||
90000
|
unkown
|
page readonly
|
||
8C3000
|
unkown
|
page read and write
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
8DD8BFF000
|
stack
|
page read and write
|
||
8CD000
|
unkown
|
page write copy
|
||
C0000E6000
|
direct allocation
|
page read and write
|
||
87F000
|
unkown
|
page write copy
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
C0000CA000
|
direct allocation
|
page read and write
|
||
1FF5AD84000
|
direct allocation
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
91000
|
unkown
|
page execute read
|
||
C0000A2000
|
direct allocation
|
page read and write
|
||
C0000BE000
|
direct allocation
|
page read and write
|
||
8CB000
|
unkown
|
page read and write
|
||
C0000D2000
|
direct allocation
|
page read and write
|
||
1FF5AC80000
|
heap
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
8FD000
|
unkown
|
page read and write
|
||
90C000
|
unkown
|
page readonly
|
||
C0000EA000
|
direct allocation
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
873000
|
unkown
|
page read and write
|
||
8CF000
|
unkown
|
page read and write
|
||
1FF5AEF0000
|
heap
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
8DD8DFF000
|
stack
|
page read and write
|
||
90B000
|
unkown
|
page write copy
|
||
906000
|
unkown
|
page read and write
|
||
1FF5AC30000
|
heap
|
page read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
8C7000
|
unkown
|
page write copy
|
||
C00004E000
|
direct allocation
|
page read and write
|
||
873000
|
unkown
|
page write copy
|
||
C000064000
|
direct allocation
|
page read and write
|
||
C000033000
|
direct allocation
|
page read and write
|
||
C0000C4000
|
direct allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
C00004C000
|
direct allocation
|
page read and write
|
||
C0000E2000
|
direct allocation
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
C000043000
|
direct allocation
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
8DD87FD000
|
stack
|
page read and write
|
||
1FF5AD8D000
|
direct allocation
|
page read and write
|
||
8DD8FFF000
|
stack
|
page read and write
|
||
1FF5AD80000
|
direct allocation
|
page read and write
|
||
91000
|
unkown
|
page execute read
|
||
90C000
|
unkown
|
page readonly
|
||
C000096000
|
direct allocation
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
91000
|
unkown
|
page execute read
|
||
90000
|
unkown
|
page readonly
|
||
C0000E4000
|
direct allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
C000024000
|
direct allocation
|
page read and write
|
||
1FF5AB30000
|
heap
|
page read and write
|
||
1FF5AEF5000
|
heap
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
8DD91FE000
|
stack
|
page read and write
|
||
4DB000
|
unkown
|
page readonly
|
||
C000076000
|
direct allocation
|
page read and write
|
||
8C5000
|
unkown
|
page read and write
|
||
4DB000
|
unkown
|
page readonly
|
||
1FF5AC10000
|
heap
|
page read and write
|
||
1FF5AEE0000
|
direct allocation
|
page read and write
|
||
1FF5AC8C000
|
heap
|
page read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
There are 84 hidden memdumps, click here to show them.