IOC Report
SecuriteInfo.com.Win32.CrypterX-gen.6879.11943.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.CrypterX-gen.6879.11943.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.CrypterX-gen.6879.11943.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_f328b3eaafa9c91d9bd94872426a6bfa15601ef3_be39743d_62ab06af-1377-4cda-9754-2f756f7c2d73\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3ACB.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Sep 26 10:23:23 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3C81.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3CB1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mkdrzkk4.prl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mwpywpgg.guy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_phlhqcc5.izb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y133hkv3.ire.psm1
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.6879.11943.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.6879.11943.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.6879.11943.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.6879.11943.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.6879.11943.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.6879.11943.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.6879.11943.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8164 -s 1524

URLs

Name
IP
Malicious
http://aborters.duckdns.org:8081
unknown
malicious
http://anotherarmy.dns.army:8081
unknown
malicious
http://upx.sf.net
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.org/
158.101.44.242
http://checkip.dyndns.com
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://varders.kozow.com:8081
unknown
http://checkip.dyndns.org/q
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
158.101.44.242

IPs

IP
Domain
Country
Malicious
158.101.44.242
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileDirectory
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
ProgramId
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
FileId
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
LowerCaseLongPath
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
LongPathHash
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
Name
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
OriginalFileName
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
Publisher
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
Version
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
BinFileVersion
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
BinaryType
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
ProductName
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
ProductVersion
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
LinkDate
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
BinProductVersion
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
AppxPackageFullName
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
AppxPackageRelativeId
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
Size
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
Language
\REGISTRY\A\{cbd41353-8369-4b18-15d9-c745e57ba200}\Root\InventoryApplicationFile\securiteinfo.com|7f63400b0b2eeaad
Usn
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3331000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3D89000
trusted library allocation
page read and write
malicious
7E07000
heap
page read and write
662E000
stack
page read and write
15C9000
heap
page read and write
795E000
stack
page read and write
7DEE000
stack
page read and write
7C80000
trusted library allocation
page read and write
1400000
heap
page read and write
5780000
heap
page read and write
E9B000
heap
page read and write
4F1C000
stack
page read and write
E52000
heap
page read and write
12D0000
trusted library allocation
page read and write
7BDF000
stack
page read and write
7C90000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
1550000
heap
page read and write
159B000
trusted library allocation
page execute and read and write
13D5000
heap
page read and write
5DAE000
stack
page read and write
12FD000
trusted library allocation
page execute and read and write
4359000
trusted library allocation
page read and write
15A8000
heap
page read and write
AC4E000
stack
page read and write
13D0000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
3140000
heap
page execute and read and write
E10000
heap
page read and write
A5E0000
heap
page read and write
5660000
heap
page read and write
1646000
heap
page read and write
E44000
heap
page read and write
2DE5000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
7A9E000
stack
page read and write
1000000
heap
page read and write
400000
remote allocation
page execute and read and write
3D81000
trusted library allocation
page read and write
5650000
heap
page read and write
2D20000
trusted library allocation
page read and write
A8DF000
stack
page read and write
1586000
trusted library allocation
page execute and read and write
3220000
heap
page read and write
137E000
stack
page read and write
686E000
stack
page read and write
52A8000
trusted library allocation
page read and write
7432000
trusted library allocation
page read and write
57ED000
stack
page read and write
4335000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
7DF0000
heap
page read and write
4331000
trusted library allocation
page read and write
1302000
trusted library allocation
page read and write
A1E000
unkown
page readonly
52FB000
stack
page read and write
11BE000
stack
page read and write
A7DE000
stack
page read and write
6FA0000
trusted library allocation
page execute and read and write
799E000
stack
page read and write
10B0000
heap
page read and write
672F000
stack
page read and write
ABA000
stack
page read and write
2CF0000
trusted library allocation
page read and write
652E000
stack
page read and write
33FC000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
6F85000
trusted library allocation
page read and write
5CAE000
stack
page read and write
1597000
trusted library allocation
page execute and read and write
1563000
trusted library allocation
page execute and read and write
7CEE000
stack
page read and write
14EE000
stack
page read and write
5880000
heap
page execute and read and write
682F000
stack
page read and write
7ADE000
stack
page read and write
6F7E000
stack
page read and write
AB4C000
stack
page read and write
7EF0000
trusted library section
page read and write
57A5000
trusted library allocation
page read and write
7F660000
trusted library allocation
page execute and read and write
1570000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
582D000
stack
page read and write
2CDD000
trusted library allocation
page read and write
2D81000
trusted library allocation
page read and write
54A0000
trusted library section
page readonly
1580000
trusted library allocation
page read and write
2CBB000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
1407000
heap
page read and write
2CAE000
stack
page read and write
2CB0000
trusted library allocation
page read and write
17C0000
trusted library allocation
page execute and read and write
53A0000
heap
page read and write
7C00000
trusted library allocation
page read and write
3114000
trusted library allocation
page read and write
15A0000
heap
page read and write
E37000
heap
page read and write
2D70000
heap
page read and write
1317000
trusted library allocation
page execute and read and write
108E000
stack
page read and write
5DEE000
stack
page read and write
312B000
trusted library allocation
page read and write
2CE2000
trusted library allocation
page read and write
696E000
stack
page read and write
5760000
heap
page read and write
2DE3000
trusted library allocation
page read and write
7290000
trusted library section
page read and write
123B000
stack
page read and write
73DE000
stack
page read and write
2D30000
heap
page execute and read and write
13E0000
trusted library allocation
page read and write
5540000
heap
page read and write
13A0000
heap
page read and write
739D000
stack
page read and write
2CE0000
trusted library allocation
page read and write
7810000
trusted library allocation
page execute and read and write
13C0000
trusted library allocation
page execute and read and write
13BB000
stack
page read and write
785E000
stack
page read and write
152E000
stack
page read and write
53A3000
heap
page read and write
12ED000
trusted library allocation
page execute and read and write
E4F000
heap
page read and write
104E000
stack
page read and write
BE0000
heap
page read and write
12BF000
stack
page read and write
58C0000
heap
page read and write
EDD000
heap
page read and write
130A000
trusted library allocation
page execute and read and write
12F0000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
18DF000
stack
page read and write
AA4C000
stack
page read and write
1337000
stack
page read and write
564E000
stack
page read and write
4D88000
trusted library allocation
page read and write
5260000
heap
page read and write
12E0000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
5E6D000
stack
page read and write
2CD1000
trusted library allocation
page read and write
156D000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
5670000
heap
page read and write
12E4000
trusted library allocation
page read and write
30BE000
stack
page read and write
1540000
trusted library allocation
page read and write
BB7000
stack
page read and write
179F000
stack
page read and write
15D5000
heap
page read and write
1655000
heap
page read and write
2DD8000
trusted library allocation
page read and write
1390000
heap
page read and write
3130000
trusted library allocation
page read and write
2CD6000
trusted library allocation
page read and write
542E000
stack
page read and write
12F3000
trusted library allocation
page read and write
F20000
heap
page read and write
5270000
trusted library allocation
page execute and read and write
5545000
heap
page read and write
13F0000
trusted library allocation
page read and write
5970000
heap
page read and write
972000
unkown
page readonly
17B0000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
131B000
trusted library allocation
page execute and read and write
1564000
trusted library allocation
page read and write
E1E000
heap
page read and write
1592000
trusted library allocation
page read and write
30FE000
stack
page read and write
13D0000
heap
page read and write
12E3000
trusted library allocation
page execute and read and write
7E11000
heap
page read and write
3110000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
164C000
heap
page read and write
586E000
stack
page read and write
970000
unkown
page readonly
5E2E000
stack
page read and write
168B000
heap
page read and write
735D000
stack
page read and write
7FFE000
stack
page read and write
54B0000
heap
page execute and read and write
5770000
heap
page read and write
5690000
heap
page read and write
1306000
trusted library allocation
page execute and read and write
158A000
trusted library allocation
page execute and read and write
17D0000
heap
page read and write
332E000
stack
page read and write
3120000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
1312000
trusted library allocation
page read and write
3116000
trusted library allocation
page read and write
There are 187 hidden memdumps, click here to show them.