Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.FileRepMalware.7137.26178.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\Desktop\Options.ini
|
ASCII text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.7137.26178.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.7137.26178.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FF681951000
|
unkown
|
page read and write
|
||
2819AEB7000
|
direct allocation
|
page read and write
|
||
7FF681900000
|
unkown
|
page readonly
|
||
2819AEC7000
|
direct allocation
|
page read and write
|
||
2819AED7000
|
direct allocation
|
page read and write
|
||
281996E0000
|
heap
|
page read and write
|
||
2819AECC000
|
direct allocation
|
page read and write
|
||
2819AEE1000
|
direct allocation
|
page read and write
|
||
2819AF11000
|
direct allocation
|
page read and write
|
||
2819AEEF000
|
direct allocation
|
page read and write
|
||
2819AEDF000
|
direct allocation
|
page read and write
|
||
974AFFC000
|
stack
|
page read and write
|
||
2819AEC1000
|
direct allocation
|
page read and write
|
||
281995E0000
|
heap
|
page read and write
|
||
2819AEE4000
|
direct allocation
|
page read and write
|
||
2819AEA6000
|
direct allocation
|
page read and write
|
||
2819AEFB000
|
direct allocation
|
page read and write
|
||
7FF681940000
|
unkown
|
page execute and read and write
|
||
2819AEAF000
|
direct allocation
|
page read and write
|
||
28199590000
|
heap
|
page read and write
|
||
2819AEBF000
|
direct allocation
|
page read and write
|
||
7FF681950000
|
unkown
|
page execute and read and write
|
||
2819AF01000
|
direct allocation
|
page read and write
|
||
2819AEB2000
|
direct allocation
|
page read and write
|
||
2819AEE9000
|
direct allocation
|
page read and write
|
||
281995D0000
|
direct allocation
|
page read and write
|
||
2819AF03000
|
direct allocation
|
page read and write
|
||
2819AEF1000
|
direct allocation
|
page read and write
|
||
2819AF05000
|
direct allocation
|
page read and write
|
||
2819AEC5000
|
direct allocation
|
page read and write
|
||
2819AEDB000
|
direct allocation
|
page read and write
|
||
2819AEF3000
|
direct allocation
|
page read and write
|
||
281995C0000
|
heap
|
page read and write
|
||
2819AEF8000
|
direct allocation
|
page read and write
|
||
7FF68192C000
|
unkown
|
page execute and read and write
|
||
2819AED0000
|
direct allocation
|
page read and write
|
||
2819AEBB000
|
direct allocation
|
page read and write
|
||
281995C5000
|
heap
|
page read and write
|
||
2819AEBD000
|
direct allocation
|
page read and write
|
||
2819AECE000
|
direct allocation
|
page read and write
|
||
2819AED2000
|
direct allocation
|
page read and write
|
||
2819AEF5000
|
direct allocation
|
page read and write
|
||
7FF681900000
|
unkown
|
page readonly
|
||
281995EC000
|
heap
|
page read and write
|
||
281995E6000
|
heap
|
page read and write
|
||
7FF68194A000
|
unkown
|
page execute and read and write
|
||
2819AEE6000
|
direct allocation
|
page read and write
|
||
281994B0000
|
heap
|
page read and write
|
||
2819AEB5000
|
direct allocation
|
page read and write
|
||
2819AF09000
|
direct allocation
|
page read and write
|
||
7FF681951000
|
unkown
|
page write copy
|
||
7FF681901000
|
unkown
|
page execute and read and write
|
||
7FF68193F000
|
unkown
|
page execute and write copy
|
||
2819AEFF000
|
direct allocation
|
page read and write
|
||
2819AEB9000
|
direct allocation
|
page read and write
|
||
2819AEED000
|
direct allocation
|
page read and write
|
||
2819AEDD000
|
direct allocation
|
page read and write
|
||
2819AF0B000
|
direct allocation
|
page read and write
|
||
2819AF07000
|
direct allocation
|
page read and write
|
||
2819AED5000
|
direct allocation
|
page read and write
|
||
2819AED9000
|
direct allocation
|
page read and write
|
||
2819AEFD000
|
direct allocation
|
page read and write
|
||
2819AEC9000
|
direct allocation
|
page read and write
|
||
7FF68194F000
|
unkown
|
page execute and write copy
|
||
2819AEA0000
|
direct allocation
|
page read and write
|
||
2819AEEB000
|
direct allocation
|
page read and write
|
There are 56 hidden memdumps, click here to show them.