IOC Report
SecuriteInfo.com.Win32.RATX-gen.1803.21030.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.RATX-gen.1803.21030.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\cvchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\cvchost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cvchost.vbs
ASCII text, with no line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.1803.21030.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.1803.21030.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7836 -s 1120

URLs

Name
IP
Malicious
https://github.com/mgravell/protobuf-net
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown

Domains

Name
IP
Malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45
fp2e7a.wpc.phicdn.net
192.229.221.95

Memdumps

Base Address
Regiontype
Protect
Malicious
4AC4000
trusted library allocation
page read and write
malicious
37A6000
trusted library allocation
page read and write
malicious
6E90000
trusted library section
page read and write
malicious
3C64000
trusted library allocation
page read and write
3D69000
trusted library allocation
page read and write
7381000
trusted library allocation
page read and write
3AA2000
trusted library allocation
page read and write
3DAC000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
3C53000
trusted library allocation
page read and write
3BFA000
trusted library allocation
page read and write
5D1F000
stack
page read and write
3A84000
trusted library allocation
page read and write
3B22000
trusted library allocation
page read and write
4765000
trusted library allocation
page read and write
3DF5000
trusted library allocation
page read and write
1BB0000
trusted library allocation
page read and write
F38000
stack
page read and write
6620000
heap
page read and write
3D30000
trusted library allocation
page read and write
15D0000
heap
page read and write
3BAE000
trusted library allocation
page read and write
3D76000
trusted library allocation
page read and write
5EA5000
trusted library allocation
page read and write
3AC9000
trusted library allocation
page read and write
5C1E000
stack
page read and write
3B99000
trusted library allocation
page read and write
39F1000
trusted library allocation
page read and write
3AF2000
trusted library allocation
page read and write
1096000
heap
page read and write
6E0E000
stack
page read and write
5B1E000
stack
page read and write
661E000
stack
page read and write
1FB0000
heap
page read and write
6E20000
trusted library allocation
page execute and read and write
1058000
heap
page read and write
1A64000
heap
page read and write
E3C000
stack
page read and write
3DDA000
trusted library allocation
page read and write
61DE000
stack
page read and write
3A7A000
trusted library allocation
page read and write
3DD2000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
3C1D000
trusted library allocation
page read and write
3C49000
trusted library allocation
page read and write
3A2E000
trusted library allocation
page read and write
13E0000
heap
page read and write
3C3C000
trusted library allocation
page read and write
6E60000
trusted library allocation
page execute and read and write
3730000
heap
page read and write
47A5000
trusted library allocation
page read and write
F90000
heap
page read and write
3AEC000
trusted library allocation
page read and write
3A67000
trusted library allocation
page read and write
108A000
heap
page read and write
3C66000
trusted library allocation
page read and write
399E000
trusted library allocation
page read and write
C00000
unkown
page readonly
2CCD000
stack
page read and write
3AC7000
trusted library allocation
page read and write
1B90000
trusted library allocation
page read and write
3BAA000
trusted library allocation
page read and write
3D67000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
3E81000
trusted library allocation
page read and write
3D97000
trusted library allocation
page read and write
3B74000
trusted library allocation
page read and write
3C02000
trusted library allocation
page read and write
3D78000
trusted library allocation
page read and write
539E000
stack
page read and write
5E60000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
3A97000
trusted library allocation
page read and write
3A08000
trusted library allocation
page read and write
1A30000
heap
page read and write
3DD0000
trusted library allocation
page read and write
13D0000
trusted library allocation
page execute and read and write
39D7000
trusted library allocation
page read and write
3D02000
trusted library allocation
page read and write
4741000
trusted library allocation
page read and write
2E81000
trusted library allocation
page read and write
3DAA000
trusted library allocation
page read and write
3D44000
trusted library allocation
page read and write
1A20000
trusted library allocation
page read and write
3720000
trusted library allocation
page read and write
5D90000
heap
page read and write
3C06000
trusted library allocation
page read and write
3ACB000
trusted library allocation
page read and write
39BC000
trusted library allocation
page read and write
5F00000
heap
page execute and read and write
3B3B000
trusted library allocation
page read and write
3A65000
trusted library allocation
page read and write
3A7E000
trusted library allocation
page read and write
1AFE000
heap
page read and write
3B3D000
trusted library allocation
page read and write
3C36000
trusted library allocation
page read and write
3C38000
trusted library allocation
page read and write
3B41000
trusted library allocation
page read and write
F85000
heap
page read and write
3B24000
trusted library allocation
page read and write
106E000
heap
page read and write
3A1D000
trusted library allocation
page read and write
3C1B000
trusted library allocation
page read and write
3DED000
trusted library allocation
page read and write
3A27000
trusted library allocation
page read and write
1AA4000
heap
page read and write
3DD6000
trusted library allocation
page read and write
3ACD000
trusted library allocation
page read and write
5790000
remote allocation
page read and write
3BB6000
trusted library allocation
page read and write
5E6B000
trusted library allocation
page read and write
1B8A000
trusted library allocation
page execute and read and write
3C08000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
1A8E000
heap
page read and write
3D7A000
trusted library allocation
page read and write
3D72000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page execute and read and write
1380000
trusted library allocation
page read and write
3B61000
trusted library allocation
page read and write
1A57000
heap
page read and write
111C000
heap
page read and write
39BA000
trusted library allocation
page read and write
3E08000
trusted library allocation
page read and write
15D5000
heap
page read and write
2F1B000
trusted library allocation
page read and write
2D0C000
trusted library allocation
page read and write
5680000
heap
page read and write
3E0A000
trusted library allocation
page read and write
1B70000
trusted library allocation
page read and write
1A24000
trusted library allocation
page read and write
57EE000
stack
page read and write
1B76000
trusted library allocation
page read and write
1BC0000
heap
page execute and read and write
39DB000
trusted library allocation
page read and write
1B92000
trusted library allocation
page read and write
586E000
stack
page read and write
6653000
heap
page read and write
2D7D000
heap
page read and write
3C21000
trusted library allocation
page read and write
3A53000
trusted library allocation
page read and write
3A95000
trusted library allocation
page read and write
3DEB000
trusted library allocation
page read and write
3AF4000
trusted library allocation
page read and write
1367000
trusted library allocation
page execute and read and write
3C3A000
trusted library allocation
page read and write
3D61000
trusted library allocation
page read and write
1A10000
trusted library allocation
page read and write
3C15000
trusted library allocation
page read and write
3A0A000
trusted library allocation
page read and write
1357000
trusted library allocation
page execute and read and write
1050000
heap
page read and write
3A42000
trusted library allocation
page read and write
1A3E000
heap
page read and write
39DD000
trusted library allocation
page read and write
600F000
stack
page read and write
3A1B000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
3B2D000
trusted library allocation
page read and write
3823000
trusted library allocation
page read and write
1AB2000
heap
page read and write
3A99000
trusted library allocation
page read and write
3ADE000
trusted library allocation
page read and write
3E06000
trusted library allocation
page read and write
1A3A000
heap
page read and write
3AF6000
trusted library allocation
page read and write
2D20000
heap
page execute and read and write
3AB2000
trusted library allocation
page read and write
F80000
heap
page read and write
6D90000
trusted library allocation
page read and write
3BB4000
trusted library allocation
page read and write
57A0000
trusted library allocation
page execute and read and write
3D5F000
trusted library allocation
page read and write
3B43000
trusted library allocation
page read and write
1107000
heap
page read and write
3A51000
trusted library allocation
page read and write
39CF000
trusted library allocation
page read and write
3AA6000
trusted library allocation
page read and write
3C34000
trusted library allocation
page read and write
6720000
trusted library allocation
page execute and read and write
39F4000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
55B0000
trusted library section
page read and write
1350000
trusted library allocation
page read and write
3B5F000
trusted library allocation
page read and write
3D80000
trusted library allocation
page read and write
3C23000
trusted library allocation
page read and write
1AFB000
heap
page read and write
3B97000
trusted library allocation
page read and write
5760000
trusted library allocation
page execute and read and write
1BD0000
heap
page read and write
663D000
heap
page read and write
3036000
trusted library allocation
page read and write
15A0000
heap
page read and write
5E50000
trusted library allocation
page read and write
1B7D000
trusted library allocation
page execute and read and write
2D70000
heap
page read and write
3DA8000
trusted library allocation
page read and write
3B3F000
trusted library allocation
page read and write
1333000
trusted library allocation
page execute and read and write
4E88000
trusted library allocation
page read and write
3A87000
trusted library allocation
page read and write
53A0000
heap
page execute and read and write
39BE000
trusted library allocation
page read and write
15B0000
heap
page read and write
3C6A000
trusted library allocation
page read and write
19E0000
trusted library allocation
page read and write
110B000
heap
page read and write
3A6B000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
3A45000
trusted library allocation
page read and write
3710000
trusted library allocation
page execute and read and write
402000
remote allocation
page execute and read and write
5EB0000
trusted library allocation
page read and write
C02000
unkown
page readonly
FB0000
heap
page read and write
7090000
heap
page read and write
1334000
trusted library allocation
page read and write
3D9D000
trusted library allocation
page read and write
3A10000
trusted library allocation
page read and write
3882000
trusted library allocation
page read and write
3B2A000
trusted library allocation
page read and write
39DF000
trusted library allocation
page read and write
3B11000
trusted library allocation
page read and write
71B0000
trusted library allocation
page execute and read and write
6D20000
trusted library section
page read and write
3AF9000
trusted library allocation
page read and write
7370000
heap
page read and write
582E000
stack
page read and write
39C2000
trusted library allocation
page read and write
3B9C000
trusted library allocation
page read and write
3B5D000
trusted library allocation
page read and write
5D57000
stack
page read and write
39AB000
trusted library allocation
page read and write
1B6E000
stack
page read and write
1340000
trusted library allocation
page read and write
3DA6000
trusted library allocation
page read and write
3A4F000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
402C000
trusted library allocation
page read and write
6740000
trusted library allocation
page execute and read and write
3C4D000
trusted library allocation
page read and write
3D2E000
trusted library allocation
page read and write
3B95000
trusted library allocation
page read and write
3BEC000
trusted library allocation
page read and write
3D82000
trusted library allocation
page read and write
536F000
trusted library allocation
page read and write
39D5000
trusted library allocation
page read and write
3D4D000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page read and write
1B97000
trusted library allocation
page execute and read and write
1320000
trusted library allocation
page read and write
3D2C000
trusted library allocation
page read and write
5E80000
trusted library allocation
page read and write
621E000
stack
page read and write
1AC7000
heap
page read and write
2D50000
trusted library section
page read and write
3AB0000
trusted library allocation
page read and write
1FAE000
stack
page read and write
3741000
trusted library allocation
page read and write
63DE000
stack
page read and write
3A38000
trusted library allocation
page read and write
3B28000
trusted library allocation
page read and write
1A2D000
trusted library allocation
page execute and read and write
58DE000
stack
page read and write
1B82000
trusted library allocation
page read and write
3C4F000
trusted library allocation
page read and write
3B7C000
trusted library allocation
page read and write
14A8000
unkown
page readonly
7F4B0000
trusted library allocation
page execute and read and write
3A9D000
trusted library allocation
page read and write
4314000
trusted library allocation
page read and write
3C00000
trusted library allocation
page read and write
1142000
heap
page read and write
3A80000
trusted library allocation
page read and write
3B1E000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
2CFF000
trusted library allocation
page read and write
3D46000
trusted library allocation
page read and write
3AB4000
trusted library allocation
page read and write
3B8F000
trusted library allocation
page read and write
3C68000
trusted library allocation
page read and write
153C000
stack
page read and write
6010000
trusted library section
page read and write
3D48000
trusted library allocation
page read and write
3B59000
trusted library allocation
page read and write
3A82000
trusted library allocation
page read and write
3B7A000
trusted library allocation
page read and write
3B0F000
trusted library allocation
page read and write
3A3C000
trusted library allocation
page read and write
3E0E000
trusted library allocation
page read and write
1136000
heap
page read and write
135A000
trusted library allocation
page execute and read and write
110D000
heap
page read and write
6695000
heap
page read and write
3B63000
trusted library allocation
page read and write
3D7E000
trusted library allocation
page read and write
2CD0000
heap
page read and write
6D00000
trusted library allocation
page read and write
3B5B000
trusted library allocation
page read and write
3E0C000
trusted library allocation
page read and write
3A29000
trusted library allocation
page read and write
3A9F000
trusted library allocation
page read and write
3D65000
trusted library allocation
page read and write
2ECF000
trusted library allocation
page read and write
3B14000
trusted library allocation
page read and write
3B20000
trusted library allocation
page read and write
3C1F000
trusted library allocation
page read and write
3C4B000
trusted library allocation
page read and write
1D90000
trusted library section
page read and write
3C2C000
trusted library allocation
page read and write
36CF000
stack
page read and write
3A55000
trusted library allocation
page read and write
3A2B000
trusted library allocation
page read and write
3A3A000
trusted library allocation
page read and write
3DF3000
trusted library allocation
page read and write
3DD8000
trusted library allocation
page read and write
71E3000
trusted library allocation
page read and write
3AFF000
trusted library allocation
page read and write
3D63000
trusted library allocation
page read and write
847F000
stack
page read and write
3A7C000
trusted library allocation
page read and write
665F000
heap
page read and write
5E84000
trusted library allocation
page read and write
708E000
stack
page read and write
3D4A000
trusted library allocation
page read and write
2E7E000
stack
page read and write
3D7C000
trusted library allocation
page read and write
3A69000
trusted library allocation
page read and write
3D85000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
3B91000
trusted library allocation
page read and write
3C19000
trusted library allocation
page read and write
3D95000
trusted library allocation
page read and write
370C000
stack
page read and write
3BFE000
trusted library allocation
page read and write
3BB0000
trusted library allocation
page read and write
3B26000
trusted library allocation
page read and write
6D80000
trusted library allocation
page execute and read and write
39C0000
trusted library allocation
page read and write
1B73000
trusted library allocation
page read and write
3ABA000
trusted library allocation
page read and write
3AF0000
trusted library allocation
page read and write
1A23000
trusted library allocation
page execute and read and write
1344000
trusted library allocation
page read and write
39C6000
trusted library allocation
page read and write
3AB8000
trusted library allocation
page read and write
39AE000
trusted library allocation
page read and write
3ABC000
trusted library allocation
page read and write
39EF000
trusted library allocation
page read and write
1120000
heap
page read and write
1B9B000
trusted library allocation
page execute and read and write
6D10000
trusted library allocation
page read and write
4BA000
remote allocation
page execute and read and write
3D99000
trusted library allocation
page read and write
3C28000
trusted library allocation
page read and write
39C4000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
3A0C000
trusted library allocation
page read and write
3AB6000
trusted library allocation
page read and write
3D5B000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
39D9000
trusted library allocation
page read and write
1B86000
trusted library allocation
page execute and read and write
3B0B000
trusted library allocation
page read and write
3C51000
trusted library allocation
page read and write
5ED0000
trusted library allocation
page read and write
3DF8000
trusted library allocation
page read and write
3D5D000
trusted library allocation
page read and write
3C32000
trusted library allocation
page read and write
39ED000
trusted library allocation
page read and write
13CE000
stack
page read and write
1B07000
heap
page read and write
3B66000
trusted library allocation
page read and write
F70000
heap
page read and write
6220000
trusted library allocation
page read and write
18FC000
stack
page read and write
3AEE000
trusted library allocation
page read and write
5E2E000
stack
page read and write
107E000
heap
page read and write
651E000
stack
page read and write
3B76000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
663B000
heap
page read and write
501D000
stack
page read and write
3A06000
trusted library allocation
page read and write
5C5B000
stack
page read and write
3C04000
trusted library allocation
page read and write
3D93000
trusted library allocation
page read and write
2D30000
heap
page read and write
6734000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
3A93000
trusted library allocation
page read and write
3A02000
trusted library allocation
page read and write
53B0000
heap
page read and write
3A25000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
39E2000
trusted library allocation
page read and write
55AE000
stack
page read and write
3DD4000
trusted library allocation
page read and write
3BFC000
trusted library allocation
page read and write
133D000
trusted library allocation
page execute and read and write
3BA8000
trusted library allocation
page read and write
6E10000
trusted library allocation
page execute and read and write
1A71000
heap
page read and write
3B78000
trusted library allocation
page read and write
3A3E000
trusted library allocation
page read and write
3A9B000
trusted library allocation
page read and write
3A40000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
1B80000
trusted library allocation
page read and write
3BB2000
trusted library allocation
page read and write
502D000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
64DE000
stack
page read and write
136B000
trusted library allocation
page execute and read and write
There are 406 hidden memdumps, click here to show them.