Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RpcSsv.exe
|
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
initial sample
|
||
\Device\ConDrv
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RpcSsv.exe
|
"C:\Users\user\Desktop\RpcSsv.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://secure.globalsign.net/cacert/PrimObject.crt0
|
unknown
|
||
http://secure.globalsign.net/cacert/ObjectSign.crt09
|
unknown
|
||
http://www.globalsign.net/repository09
|
unknown
|
||
http://eternallybored.org/misc/netcat/
|
unknown
|
||
http://www.globalsign.net/repository/0
|
unknown
|
||
http://www.globalsign.net/repository/03
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
409000
|
unkown
|
page readonly
|
||
409000
|
unkown
|
page readonly
|
||
80000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
400000
|
unkown
|
page readonly
|
||
736000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
160000
|
heap
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
60D000
|
stack
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
73B000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page write copy
|
||
40D000
|
unkown
|
page write copy
|
||
40C000
|
unkown
|
page write copy
|
||
408000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
There are 9 hidden memdumps, click here to show them.