Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.CrypterX-gen.9933.28197.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_ab57bd3284d196bd7ec453d15d15a137caef7f6_11f66400_82455a3c-da68-4fcf-a9d1-0c34bf279a06\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER748C.tmp.dmp
|
Mini DuMP crash report, 15 streams, Thu Mar 28 09:25:30 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER76AF.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER772D.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\VFZJMER1OXAF8SLHTCHET0W3HVJJKMG5
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.9933.28197.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.9933.28197.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7016 -s 984
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://trecube.com/getjson.php?id=40
|
172.67.177.174
|
||
https://trecube.com/
|
172.67.177.174
|
||
https://trecube.com/gate.php?id=40&build=kokaine&passwords=0&cookies=2&username=user&country=US&ip=102.165.48.43&BSSID=f97a416a99bc6b1f20bdfbfefa6a73cf&wallets=0&token=xehook40788749&ext=0&filters=0&pcname=305090&cardsc=0&telegram=False&discord=False&steam=False&domaindetect=
|
172.67.177.174
|
||
https://trecube.com/getloader.php?id=40
|
172.67.177.174
|
||
https://unotree.ru/
|
unknown
|
||
http://ip-api.com/json/?fields=11827
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
||
https://t.me/xehook
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://trecube.com
|
unknown
|
||
http://trecube.com
|
unknown
|
||
https://www.cloudflare.com/5xx-error-landing
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
unknown
|
||
https://trecube.com/gate.php?id=40&build=kokaine&passwords=0&cookies=2&username=user&country=US&ip
|
unknown
|
There are 5 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
trecube.com
|
172.67.177.174
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.177.174
|
trecube.com
|
United States
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
ProgramId
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
FileId
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
LowerCaseLongPath
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
LongPathHash
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
Name
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
OriginalFileName
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
Publisher
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
Version
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
BinFileVersion
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
BinaryType
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
ProductName
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
ProductVersion
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
LinkDate
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
BinProductVersion
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
AppxPackageFullName
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
Size
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
Language
|
||
\REGISTRY\A\{40a76fbc-8b14-eb5f-a555-3b49f07326d7}\Root\InventoryApplicationFile\securiteinfo.com|22dfda6f9f78231a
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C00B8F8B0D2B
|
There are 28 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
872000
|
unkown
|
page readonly
|
||
2AA0000
|
heap
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
E45000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
2EA4000
|
trusted library allocation
|
page read and write
|
||
2F47000
|
trusted library allocation
|
page read and write
|
||
6580000
|
trusted library allocation
|
page read and write
|
||
2C91000
|
trusted library allocation
|
page read and write
|
||
51E3000
|
trusted library allocation
|
page read and write
|
||
51C4000
|
trusted library allocation
|
page read and write
|
||
CFA000
|
stack
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
2F87000
|
trusted library allocation
|
page read and write
|
||
2C58000
|
trusted library allocation
|
page read and write
|
||
30B8000
|
trusted library allocation
|
page read and write
|
||
E3D000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
3EC4000
|
trusted library allocation
|
page read and write
|
||
3E57000
|
trusted library allocation
|
page read and write
|
||
2E51000
|
trusted library allocation
|
page read and write
|
||
649E000
|
stack
|
page read and write
|
||
6435000
|
trusted library allocation
|
page read and write
|
||
109B000
|
trusted library allocation
|
page execute and read and write
|
||
100F000
|
heap
|
page read and write
|
||
6950000
|
heap
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
5FE3000
|
heap
|
page read and write
|
||
121B000
|
trusted library allocation
|
page execute and read and write
|
||
5FFA000
|
heap
|
page read and write
|
||
532E000
|
stack
|
page read and write
|
||
2F6E000
|
trusted library allocation
|
page read and write
|
||
2D2C000
|
stack
|
page read and write
|
||
51B2000
|
trusted library allocation
|
page read and write
|
||
694A000
|
heap
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
FA1000
|
heap
|
page read and write
|
||
5E4E000
|
stack
|
page read and write
|
||
6013000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
620D000
|
stack
|
page read and write
|
||
51D6000
|
trusted library allocation
|
page read and write
|
||
F64000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
2FA9000
|
trusted library allocation
|
page read and write
|
||
658A000
|
trusted library allocation
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
2E9E000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
stack
|
page read and write
|
||
115F000
|
stack
|
page read and write
|
||
542F000
|
stack
|
page read and write
|
||
624E000
|
stack
|
page read and write
|
||
1202000
|
trusted library allocation
|
page read and write
|
||
9ED000
|
stack
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
E53000
|
heap
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
1017000
|
heap
|
page read and write
|
||
60CE000
|
stack
|
page read and write
|
||
2EC2000
|
trusted library allocation
|
page read and write
|
||
692D000
|
stack
|
page read and write
|
||
51BE000
|
trusted library allocation
|
page read and write
|
||
F53000
|
trusted library allocation
|
page execute and read and write
|
||
11E4000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
61CE000
|
stack
|
page read and write
|
||
51E5000
|
trusted library allocation
|
page read and write
|
||
1217000
|
trusted library allocation
|
page execute and read and write
|
||
E1E000
|
heap
|
page read and write
|
||
3C95000
|
trusted library allocation
|
page read and write
|
||
F9F000
|
heap
|
page read and write
|
||
E88000
|
heap
|
page read and write
|
||
F54000
|
trusted library allocation
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
F69000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
5200000
|
trusted library allocation
|
page read and write
|
||
D78000
|
stack
|
page read and write
|
||
2A90000
|
trusted library allocation
|
page execute and read and write
|
||
F3E000
|
stack
|
page read and write
|
||
2EC6000
|
trusted library allocation
|
page read and write
|
||
2C9A000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
10C0000
|
trusted library allocation
|
page execute and read and write
|
||
6590000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2C80000
|
heap
|
page execute and read and write
|
||
F4E000
|
stack
|
page read and write
|
||
6940000
|
heap
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
stack
|
page read and write
|
||
2E86000
|
trusted library allocation
|
page read and write
|
||
638E000
|
stack
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
6AF0000
|
heap
|
page read and write
|
||
6450000
|
trusted library allocation
|
page execute and read and write
|
||
2F0E000
|
trusted library allocation
|
page read and write
|
||
628E000
|
stack
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
E97000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
1206000
|
trusted library allocation
|
page execute and read and write
|
||
640E000
|
stack
|
page read and write
|
||
66CE000
|
stack
|
page read and write
|
||
11ED000
|
trusted library allocation
|
page execute and read and write
|
||
29CE000
|
stack
|
page read and write
|
||
2E96000
|
trusted library allocation
|
page read and write
|
||
65C0000
|
trusted library allocation
|
page read and write
|
||
2F6C000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
heap
|
page read and write
|
||
6430000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
heap
|
page execute and read and write
|
||
63CE000
|
stack
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
7FC40000
|
trusted library allocation
|
page execute and read and write
|
||
2FAF000
|
trusted library allocation
|
page read and write
|
||
1212000
|
trusted library allocation
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
F5D000
|
trusted library allocation
|
page execute and read and write
|
||
2E2D000
|
stack
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
2C98000
|
trusted library allocation
|
page execute and read and write
|
||
FE9000
|
heap
|
page read and write
|
||
C7C000
|
stack
|
page read and write
|
||
574E000
|
stack
|
page read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
2E84000
|
trusted library allocation
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
trusted library allocation
|
page execute and read and write
|
||
3E79000
|
trusted library allocation
|
page read and write
|
||
6750000
|
trusted library allocation
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
560E000
|
stack
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
2E92000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
1215000
|
trusted library allocation
|
page execute and read and write
|
||
674B000
|
stack
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
1097000
|
trusted library allocation
|
page execute and read and write
|
||
E3B000
|
heap
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
6760000
|
trusted library allocation
|
page read and write
|
||
2E8E000
|
trusted library allocation
|
page read and write
|
||
6770000
|
heap
|
page read and write
|
||
107F000
|
stack
|
page read and write
|
||
2EEA000
|
trusted library allocation
|
page read and write
|
||
550D000
|
stack
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
F94000
|
heap
|
page read and write
|
||
5F8E000
|
stack
|
page read and write
|
||
3C91000
|
trusted library allocation
|
page read and write
|
||
120A000
|
trusted library allocation
|
page execute and read and write
|
||
6960000
|
heap
|
page read and write
|
||
92C000
|
stack
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
heap
|
page execute and read and write
|
||
1240000
|
heap
|
page read and write
|
||
30E6000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
3E99000
|
trusted library allocation
|
page read and write
|
||
E1A000
|
heap
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
1045000
|
heap
|
page read and write
|
||
3EA1000
|
trusted library allocation
|
page read and write
|
||
11E3000
|
trusted library allocation
|
page execute and read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
||
5280000
|
heap
|
page execute and read and write
|
||
2E7D000
|
trusted library allocation
|
page read and write
|
||
2BED000
|
stack
|
page read and write
|
There are 177 hidden memdumps, click here to show them.