IOC Report
SecuriteInfo.com.Win32.CrypterX-gen.869.7164.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.CrypterX-gen.869.7164.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_216191bb2d9f68ef7b27d116c04fbb17159ed_c344819e_638fef59-863d-4649-8ddc-fe8d7fc24f73\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_438eb18848ed4e6f3b2d695612a780d8ea1a6_33b06696_b83e288e-4fb5-4ed2-a616-c3d78ea46cdb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_4fcd41ef5bd1bb1eef35edf91e0472dd0e67f4_c344819e_eb7b3698-abbc-426e-9b28-efb2146c17e6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2828.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Oct 12 09:24:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2877.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER28A7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER35E3.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Oct 12 09:24:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER370D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER372E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6E78.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Oct 12 09:24:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6F25.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6F55.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.869.7164.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.869.7164.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.869.7164.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.869.7164.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.869.7164.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.869.7164.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 268
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7532 -s 1676
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7532 -s 476

URLs

Name
IP
Malicious
https://sergei-esenin.com/
unknown
malicious
studennotediw.store
malicious
trustterwowqm.shop
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
eaglepawnoy.store
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
bathdoomgaz.store
malicious
https://sergei-esenin.com/apiws(
unknown
malicious
https://sergei-esenin.com/$
unknown
malicious
clearancek.site
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
mobbipenju.store
malicious
https://sergei-esenin.com/apik:
unknown
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/learning/access-manag
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://avatars.akamai.steamstatic
unknown
https://steamcommunity.com/t
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://steamcommunity.com/6
unknown
https://steamcommuact=recive_message&ver=4.0&lid=tLYMe5--deli333&j=5c9b8674a630d9101b46733aa37f15ec
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://recaptcha.net
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
http://127.0.0.1:27060
unknown
https://www.cloudflare.com/learning/access-managQ
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
172.67.206.204
malicious
trustterwowqm.shop
unknown
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
ProgramId
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
FileId
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
LowerCaseLongPath
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
LongPathHash
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
Name
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
OriginalFileName
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
Publisher
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
Version
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
BinFileVersion
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
BinaryType
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
ProductName
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
ProductVersion
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
LinkDate
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
BinProductVersion
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
AppxPackageFullName
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
AppxPackageRelativeId
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
Size
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
Language
\REGISTRY\A\{21aa8e8e-83ac-94e1-dc96-15503ae69d31}\Root\InventoryApplicationFile\securiteinfo.com|6f524c64dad9a3e
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00180011F018AB56
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
C99000
heap
page read and write
CF2000
heap
page read and write
C84000
heap
page read and write
13C0000
heap
page read and write
C99000
heap
page read and write
8B3000
unkown
page readonly
A7E000
stack
page read and write
AE0000
heap
page read and write
CF2000
heap
page read and write
12FD000
stack
page read and write
891000
unkown
page execute read
919000
unkown
page readonly
2ECE000
stack
page read and write
45F000
remote allocation
page execute and read and write
31C0000
heap
page read and write
C3E000
stack
page read and write
8B3000
unkown
page readonly
168F000
stack
page read and write
891000
unkown
page execute read
5EB000
stack
page read and write
916000
unkown
page execute and read and write
890000
unkown
page readonly
C9F000
heap
page read and write
CE6000
heap
page read and write
CA2000
heap
page read and write
891000
unkown
page execute read
CE8000
heap
page read and write
C99000
heap
page read and write
8BE000
unkown
page write copy
312E000
stack
page read and write
C5D000
heap
page read and write
C86000
heap
page read and write
26DE000
stack
page read and write
ABD000
stack
page read and write
26E1000
trusted library allocation
page read and write
281E000
stack
page read and write
BFD000
stack
page read and write
919000
unkown
page readonly
919000
unkown
page readonly
CE8000
heap
page read and write
8B3000
unkown
page readonly
C6F000
heap
page read and write
294D000
stack
page read and write
CA2000
heap
page read and write
8BE000
unkown
page write copy
890000
unkown
page readonly
C6F000
heap
page read and write
890000
unkown
page readonly
FA0000
heap
page read and write
919000
unkown
page readonly
2FCD000
stack
page read and write
C40000
heap
page read and write
919000
unkown
page readonly
A20000
heap
page read and write
302D000
stack
page read and write
8B3000
unkown
page readonly
178F000
stack
page read and write
890000
unkown
page readonly
2820000
remote allocation
page read and write
C84000
heap
page read and write
E3F000
stack
page read and write
891000
unkown
page execute read
840000
heap
page read and write
C47000
heap
page read and write
C68000
heap
page read and write
917000
unkown
page read and write
8BE000
unkown
page write copy
CB3000
heap
page read and write
CEA000
heap
page read and write
8BE000
unkown
page read and write
13CE000
heap
page read and write
891000
unkown
page execute read
2A4F000
stack
page read and write
FB0000
heap
page read and write
CED000
heap
page read and write
318E000
stack
page read and write
330C000
stack
page read and write
133E000
stack
page read and write
2820000
remote allocation
page read and write
891000
unkown
page execute read
FFE000
stack
page read and write
27DD000
stack
page read and write
8BE000
unkown
page write copy
88E000
stack
page read and write
CB4000
heap
page read and write
A1B000
stack
page read and write
CE8000
heap
page read and write
8BE000
unkown
page write copy
919000
unkown
page readonly
340E000
stack
page read and write
8B3000
unkown
page readonly
13CA000
heap
page read and write
890000
unkown
page readonly
890000
unkown
page readonly
2B4F000
stack
page read and write
F70000
heap
page read and write
CA2000
heap
page read and write
8B3000
unkown
page readonly
2820000
remote allocation
page read and write
C9F000
heap
page read and write
2840000
heap
page read and write
C78000
heap
page read and write
F3D000
stack
page read and write
32CF000
stack
page read and write
There are 95 hidden memdumps, click here to show them.