Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Local\.microsoft\Microsoft.Win32.TaskScheduler.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Local\.microsoft\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.log
|
CSV text
|
modified
|
||
C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe"
|
||
C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe
|
"C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe"
|
||
C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe
|
C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.newtonsoft.com/json
|
unknown
|
||
https://www.nuget.org/packages/Newtonsoft.Json.Bson
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://james.newtonking.com/projects/json
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://github.com/JamesNK/Newtonsoft.Json
|
unknown
|
||
https://github.com/dahall/taskscheduler
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
xn--80aa3a1a9c.online
|
77.38.200.133
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
77.38.200.133
|
xn--80aa3a1a9c.online
|
Latvia
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
9C6FBFF000
|
stack
|
page read and write
|
||
224A9A2C000
|
heap
|
page read and write
|
||
224C5002000
|
heap
|
page read and write
|
||
224AB631000
|
trusted library allocation
|
page read and write
|
||
7FFD34886000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34890000
|
trusted library allocation
|
page execute and read and write
|
||
20C27020000
|
heap
|
page read and write
|
||
7FFD34856000
|
trusted library allocation
|
page execute and read and write
|
||
224BB68D000
|
trusted library allocation
|
page read and write
|
||
224AB620000
|
heap
|
page execute and read and write
|
||
224A9E02000
|
heap
|
page read and write
|
||
224A98F0000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
20C27040000
|
heap
|
page read and write
|
||
DFF35FE000
|
stack
|
page read and write
|
||
1CB41F2C000
|
heap
|
page read and write
|
||
224A9A50000
|
heap
|
page read and write
|
||
224A9AE3000
|
heap
|
page read and write
|
||
224A9ACC000
|
heap
|
page read and write
|
||
224A9DF0000
|
trusted library allocation
|
page read and write
|
||
1CB27ED0000
|
trusted library allocation
|
page read and write
|
||
7FFD347CB000
|
trusted library allocation
|
page execute and read and write
|
||
1CB27BA0000
|
heap
|
page read and write
|
||
224A9A13000
|
heap
|
page read and write
|
||
1CB41F1F000
|
heap
|
page read and write
|
||
20C27160000
|
heap
|
page read and write
|
||
1CB43702000
|
heap
|
page read and write
|
||
1CB29A17000
|
trusted library allocation
|
page read and write
|
||
224A9C00000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
1CB27B90000
|
heap
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
20C38B59000
|
trusted library allocation
|
page read and write
|
||
7FFD347FC000
|
trusted library allocation
|
page execute and read and write
|
||
224C3E02000
|
heap
|
page execute and read and write
|
||
1CB27CD9000
|
heap
|
page read and write
|
||
224A9B05000
|
heap
|
page read and write
|
||
7FFD34774000
|
trusted library allocation
|
page read and write
|
||
DFF15F4000
|
stack
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
224C3DA0000
|
heap
|
page read and write
|
||
224A9DD0000
|
trusted library allocation
|
page read and write
|
||
1CB399A1000
|
trusted library allocation
|
page read and write
|
||
DFF19FE000
|
stack
|
page read and write
|
||
7FFD347A3000
|
trusted library allocation
|
page execute and read and write
|
||
20C27101000
|
heap
|
page read and write
|
||
1CB27B80000
|
heap
|
page read and write
|
||
20C27000000
|
heap
|
page read and write
|
||
9C707FE000
|
stack
|
page read and write
|
||
224A9A3A000
|
heap
|
page read and write
|
||
7FFD347AB000
|
trusted library allocation
|
page execute and read and write
|
||
224A99F0000
|
heap
|
page read and write
|
||
224C3CF0000
|
trusted library allocation
|
page read and write
|
||
20C270AB000
|
heap
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
224C3CF3000
|
trusted library allocation
|
page read and write
|
||
1CB27C13000
|
heap
|
page read and write
|
||
1CB41DB0000
|
heap
|
page read and write
|
||
20C271D0000
|
heap
|
page execute and read and write
|
||
1CB43613000
|
heap
|
page read and write
|
||
67107FD000
|
stack
|
page read and write
|
||
7FFD3485C000
|
trusted library allocation
|
page execute and read and write
|
||
1CB299E8000
|
trusted library allocation
|
page read and write
|
||
DFF25FF000
|
stack
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
20C38B53000
|
trusted library allocation
|
page read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
20C26F20000
|
heap
|
page read and write
|
||
1CB27CCA000
|
heap
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
DFF31FE000
|
stack
|
page read and write
|
||
20C26DA0000
|
unkown
|
page readonly
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34783000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
1CB399AC000
|
trusted library allocation
|
page read and write
|
||
7FFD347BD000
|
trusted library allocation
|
page execute and read and write
|
||
20C2706A000
|
heap
|
page read and write
|
||
224A9A42000
|
heap
|
page read and write
|
||
1CB27C28000
|
heap
|
page read and write
|
||
67117F4000
|
stack
|
page read and write
|
||
1CB41F00000
|
heap
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page execute and read and write
|
||
1CB27F03000
|
trusted library allocation
|
page read and write
|
||
DFF3DFE000
|
stack
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
20C27215000
|
heap
|
page read and write
|
||
20C28B40000
|
heap
|
page read and write
|
||
20C2706E000
|
heap
|
page read and write
|
||
1CB27FD4000
|
unkown
|
page readonly
|
||
7FFD347A4000
|
trusted library allocation
|
page read and write
|
||
20C41419000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
224BB68B000
|
trusted library allocation
|
page read and write
|
||
1CB27C46000
|
heap
|
page read and write
|
||
7FFD34797000
|
trusted library allocation
|
page read and write
|
||
1CB28002000
|
heap
|
page read and write
|
||
20C270AD000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
9C717F4000
|
stack
|
page read and write
|
||
224C3F13000
|
heap
|
page read and write
|
||
20C27155000
|
heap
|
page read and write
|
||
7FFD34866000
|
trusted library allocation
|
page execute and read and write
|
||
1CB27CAD000
|
heap
|
page read and write
|
||
DFF41FE000
|
stack
|
page read and write
|
||
DFF21FE000
|
stack
|
page read and write
|
||
7FFD347CD000
|
trusted library allocation
|
page execute and read and write
|
||
224A9A24000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
224AB670000
|
trusted library allocation
|
page read and write
|
||
67103FF000
|
stack
|
page read and write
|
||
1CB28102000
|
heap
|
page read and write
|
||
DFF45FB000
|
stack
|
page read and write
|
||
1CB299A1000
|
trusted library allocation
|
page read and write
|
||
20C26DA2000
|
unkown
|
page readonly
|
||
1CB27C3E000
|
heap
|
page read and write
|
||
1CB419D0000
|
trusted library allocation
|
page read and write
|
||
20C271C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
1CB27F80000
|
unkown
|
page readonly
|
||
9C713FF000
|
stack
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
224AB610000
|
heap
|
page read and write
|
||
670F7F4000
|
stack
|
page read and write
|
||
20C28B51000
|
trusted library allocation
|
page read and write
|
||
1CB27C00000
|
heap
|
page read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page execute and read and write
|
||
224A9AB3000
|
heap
|
page read and write
|
||
1CB27F00000
|
trusted library allocation
|
page read and write
|
||
1CB27CD7000
|
heap
|
page read and write
|
||
1CB41F13000
|
heap
|
page read and write
|
||
224A9A36000
|
heap
|
page read and write
|
||
670FBFF000
|
stack
|
page read and write
|
||
20C27210000
|
heap
|
page read and write
|
||
1CB27EF0000
|
heap
|
page execute and read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
20C41424000
|
heap
|
page read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
67113FF000
|
stack
|
page read and write
|
||
1CB41E02000
|
heap
|
page execute and read and write
|
||
20C41410000
|
heap
|
page read and write
|
||
1CB27CF5000
|
heap
|
page read and write
|
||
1CB27C51000
|
heap
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
20C38B57000
|
trusted library allocation
|
page read and write
|
||
1CB27C78000
|
heap
|
page read and write
|
||
7FFD347CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347B7000
|
trusted library allocation
|
page read and write
|
||
224A9A98000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
224A9AC5000
|
heap
|
page read and write
|
||
224A9F02000
|
heap
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page execute and read and write
|
||
1CB27F82000
|
unkown
|
page readonly
|
||
1CB28013000
|
heap
|
page read and write
|
||
1CB27EE0000
|
heap
|
page read and write
|
||
1CB27D02000
|
heap
|
page read and write
|
||
1CB41DA0000
|
heap
|
page read and write
|
||
224C3D10000
|
heap
|
page execute and read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
1CB27C92000
|
heap
|
page read and write
|
||
20C41400000
|
heap
|
page execute and read and write
|
||
20C271A0000
|
trusted library allocation
|
page read and write
|
||
9C703FE000
|
stack
|
page read and write
|
||
20C27046000
|
heap
|
page read and write
|
||
20C27074000
|
heap
|
page read and write
|
||
7FFD34787000
|
trusted library allocation
|
page read and write
|
||
224A9910000
|
heap
|
page read and write
|
||
7FFD347DC000
|
trusted library allocation
|
page execute and read and write
|
||
20C27150000
|
heap
|
page read and write
|
||
224A9A00000
|
heap
|
page read and write
|
||
6710FFE000
|
stack
|
page read and write
|
||
20C26EAA000
|
unkown
|
page readonly
|
||
20C27082000
|
heap
|
page read and write
|
||
20C270B6000
|
heap
|
page read and write
|
||
20C41330000
|
heap
|
page read and write
|
||
DFF29FC000
|
stack
|
page read and write
|
||
224BB631000
|
trusted library allocation
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page execute and read and write
|
||
224A9B02000
|
heap
|
page read and write
|
||
1CB27B60000
|
heap
|
page read and write
|
||
1CB27C4B000
|
heap
|
page read and write
|
||
7FFD34836000
|
trusted library allocation
|
page read and write
|
||
9C6F7F4000
|
stack
|
page read and write
|
||
DFF39FE000
|
stack
|
page read and write
|
||
1CB43602000
|
heap
|
page read and write
|
||
7FF446E50000
|
trusted library allocation
|
page execute and read and write
|
||
224C3660000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page execute and read and write
|
||
20C2707F000
|
heap
|
page read and write
|
||
1CB27C2D000
|
heap
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
1CB41F21000
|
heap
|
page read and write
|
||
20C2704C000
|
heap
|
page read and write
|
||
224A9A46000
|
heap
|
page read and write
|
||
7FFD34773000
|
trusted library allocation
|
page execute and read and write
|
||
20C38B51000
|
trusted library allocation
|
page read and write
|
||
1CB41F02000
|
heap
|
page read and write
|
||
224C3F02000
|
heap
|
page read and write
|
||
224A9AF7000
|
heap
|
page read and write
|
||
1CB27BE0000
|
trusted library allocation
|
page read and write
|
||
1CB27C48000
|
heap
|
page read and write
|
||
1CB27F30000
|
heap
|
page execute and read and write
|
||
1CB27C40000
|
heap
|
page read and write
|
||
7FFD34856000
|
trusted library allocation
|
page read and write
|
||
DFF1DFE000
|
stack
|
page read and write
|
||
224A9A76000
|
heap
|
page read and write
|
||
224A9AD5000
|
heap
|
page read and write
|
||
224A9A3C000
|
heap
|
page read and write
|
||
20C27070000
|
heap
|
page read and write
|
||
7FFD3483C000
|
trusted library allocation
|
page execute and read and write
|
||
224C3D90000
|
heap
|
page read and write
|
There are 204 hidden memdumps, click here to show them.