IOC Report
SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Local\.microsoft\Microsoft.Win32.TaskScheduler.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Local\.microsoft\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.log
CSV text
modified
C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe"
malicious
C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe
"C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe"
malicious
C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe
C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe
malicious

URLs

Name
IP
Malicious
https://www.newtonsoft.com/json
unknown
https://www.nuget.org/packages/Newtonsoft.Json.Bson
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://james.newtonking.com/projects/json
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://github.com/JamesNK/Newtonsoft.Json
unknown
https://github.com/dahall/taskscheduler
unknown

Domains

Name
IP
Malicious
xn--80aa3a1a9c.online
77.38.200.133

IPs

IP
Domain
Country
Malicious
77.38.200.133
xn--80aa3a1a9c.online
Latvia

Memdumps

Base Address
Regiontype
Protect
Malicious
9C6FBFF000
stack
page read and write
224A9A2C000
heap
page read and write
224C5002000
heap
page read and write
224AB631000
trusted library allocation
page read and write
7FFD34886000
trusted library allocation
page execute and read and write
7FFD34890000
trusted library allocation
page execute and read and write
20C27020000
heap
page read and write
7FFD34856000
trusted library allocation
page execute and read and write
224BB68D000
trusted library allocation
page read and write
224AB620000
heap
page execute and read and write
224A9E02000
heap
page read and write
224A98F0000
heap
page read and write
7FFD34830000
trusted library allocation
page read and write
20C27040000
heap
page read and write
DFF35FE000
stack
page read and write
1CB41F2C000
heap
page read and write
224A9A50000
heap
page read and write
224A9AE3000
heap
page read and write
224A9ACC000
heap
page read and write
224A9DF0000
trusted library allocation
page read and write
1CB27ED0000
trusted library allocation
page read and write
7FFD347CB000
trusted library allocation
page execute and read and write
1CB27BA0000
heap
page read and write
224A9A13000
heap
page read and write
1CB41F1F000
heap
page read and write
20C27160000
heap
page read and write
1CB43702000
heap
page read and write
1CB29A17000
trusted library allocation
page read and write
224A9C00000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
1CB27B90000
heap
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
20C38B59000
trusted library allocation
page read and write
7FFD347FC000
trusted library allocation
page execute and read and write
224C3E02000
heap
page execute and read and write
1CB27CD9000
heap
page read and write
224A9B05000
heap
page read and write
7FFD34774000
trusted library allocation
page read and write
DFF15F4000
stack
page read and write
7FFD34930000
trusted library allocation
page read and write
224C3DA0000
heap
page read and write
224A9DD0000
trusted library allocation
page read and write
1CB399A1000
trusted library allocation
page read and write
DFF19FE000
stack
page read and write
7FFD347A3000
trusted library allocation
page execute and read and write
20C27101000
heap
page read and write
1CB27B80000
heap
page read and write
20C27000000
heap
page read and write
9C707FE000
stack
page read and write
224A9A3A000
heap
page read and write
7FFD347AB000
trusted library allocation
page execute and read and write
224A99F0000
heap
page read and write
224C3CF0000
trusted library allocation
page read and write
20C270AB000
heap
page read and write
7FFD34784000
trusted library allocation
page read and write
224C3CF3000
trusted library allocation
page read and write
1CB27C13000
heap
page read and write
1CB41DB0000
heap
page read and write
20C271D0000
heap
page execute and read and write
1CB43613000
heap
page read and write
67107FD000
stack
page read and write
7FFD3485C000
trusted library allocation
page execute and read and write
1CB299E8000
trusted library allocation
page read and write
DFF25FF000
stack
page read and write
7FFD34940000
trusted library allocation
page read and write
20C38B53000
trusted library allocation
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
20C26F20000
heap
page read and write
1CB27CCA000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
DFF31FE000
stack
page read and write
20C26DA0000
unkown
page readonly
7FFD3479D000
trusted library allocation
page execute and read and write
7FFD34783000
trusted library allocation
page execute and read and write
7FFD347C0000
trusted library allocation
page read and write
1CB399AC000
trusted library allocation
page read and write
7FFD347BD000
trusted library allocation
page execute and read and write
20C2706A000
heap
page read and write
224A9A42000
heap
page read and write
1CB27C28000
heap
page read and write
67117F4000
stack
page read and write
1CB41F00000
heap
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
1CB27F03000
trusted library allocation
page read and write
DFF3DFE000
stack
page read and write
7FFD34950000
trusted library allocation
page read and write
20C27215000
heap
page read and write
20C28B40000
heap
page read and write
20C2706E000
heap
page read and write
1CB27FD4000
unkown
page readonly
7FFD347A4000
trusted library allocation
page read and write
20C41419000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
224BB68B000
trusted library allocation
page read and write
1CB27C46000
heap
page read and write
7FFD34797000
trusted library allocation
page read and write
1CB28002000
heap
page read and write
20C270AD000
heap
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
7FFD34950000
trusted library allocation
page read and write
9C717F4000
stack
page read and write
224C3F13000
heap
page read and write
20C27155000
heap
page read and write
7FFD34866000
trusted library allocation
page execute and read and write
1CB27CAD000
heap
page read and write
DFF41FE000
stack
page read and write
DFF21FE000
stack
page read and write
7FFD347CD000
trusted library allocation
page execute and read and write
224A9A24000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
224AB670000
trusted library allocation
page read and write
67103FF000
stack
page read and write
1CB28102000
heap
page read and write
DFF45FB000
stack
page read and write
1CB299A1000
trusted library allocation
page read and write
20C26DA2000
unkown
page readonly
1CB27C3E000
heap
page read and write
1CB419D0000
trusted library allocation
page read and write
20C271C0000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
1CB27F80000
unkown
page readonly
9C713FF000
stack
page read and write
7FFD34920000
trusted library allocation
page read and write
224AB610000
heap
page read and write
670F7F4000
stack
page read and write
20C28B51000
trusted library allocation
page read and write
1CB27C00000
heap
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
224A9AB3000
heap
page read and write
1CB27F00000
trusted library allocation
page read and write
1CB27CD7000
heap
page read and write
1CB41F13000
heap
page read and write
224A9A36000
heap
page read and write
670FBFF000
stack
page read and write
20C27210000
heap
page read and write
1CB27EF0000
heap
page execute and read and write
7FFD34780000
trusted library allocation
page read and write
20C41424000
heap
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
67113FF000
stack
page read and write
1CB41E02000
heap
page execute and read and write
20C41410000
heap
page read and write
1CB27CF5000
heap
page read and write
1CB27C51000
heap
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
20C38B57000
trusted library allocation
page read and write
1CB27C78000
heap
page read and write
7FFD347CC000
trusted library allocation
page execute and read and write
7FFD347B7000
trusted library allocation
page read and write
224A9A98000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
224A9AC5000
heap
page read and write
224A9F02000
heap
page read and write
7FFD34860000
trusted library allocation
page execute and read and write
1CB27F82000
unkown
page readonly
1CB28013000
heap
page read and write
1CB27EE0000
heap
page read and write
1CB27D02000
heap
page read and write
1CB41DA0000
heap
page read and write
224C3D10000
heap
page execute and read and write
7FFD34850000
trusted library allocation
page read and write
1CB27C92000
heap
page read and write
20C41400000
heap
page execute and read and write
20C271A0000
trusted library allocation
page read and write
9C703FE000
stack
page read and write
20C27046000
heap
page read and write
20C27074000
heap
page read and write
7FFD34787000
trusted library allocation
page read and write
224A9910000
heap
page read and write
7FFD347DC000
trusted library allocation
page execute and read and write
20C27150000
heap
page read and write
224A9A00000
heap
page read and write
6710FFE000
stack
page read and write
20C26EAA000
unkown
page readonly
20C27082000
heap
page read and write
20C270B6000
heap
page read and write
20C41330000
heap
page read and write
DFF29FC000
stack
page read and write
224BB631000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page execute and read and write
224A9B02000
heap
page read and write
1CB27B60000
heap
page read and write
1CB27C4B000
heap
page read and write
7FFD34836000
trusted library allocation
page read and write
9C6F7F4000
stack
page read and write
DFF39FE000
stack
page read and write
1CB43602000
heap
page read and write
7FF446E50000
trusted library allocation
page execute and read and write
224C3660000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
20C2707F000
heap
page read and write
1CB27C2D000
heap
page read and write
7FFD34910000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
1CB41F21000
heap
page read and write
20C2704C000
heap
page read and write
224A9A46000
heap
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
20C38B51000
trusted library allocation
page read and write
1CB41F02000
heap
page read and write
224C3F02000
heap
page read and write
224A9AF7000
heap
page read and write
1CB27BE0000
trusted library allocation
page read and write
1CB27C48000
heap
page read and write
1CB27F30000
heap
page execute and read and write
1CB27C40000
heap
page read and write
7FFD34856000
trusted library allocation
page read and write
DFF1DFE000
stack
page read and write
224A9A76000
heap
page read and write
224A9AD5000
heap
page read and write
224A9A3C000
heap
page read and write
20C27070000
heap
page read and write
7FFD3483C000
trusted library allocation
page execute and read and write
224C3D90000
heap
page read and write
There are 204 hidden memdumps, click here to show them.