IOC Report
SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\d3d9.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:53 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\Tmp6D5D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp6D6D.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.ip.sb/ip
unknown
https://api.ip.s
unknown
https://discord.com/api/v9/users/
unknown

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
fp2e7a.wpc.phicdn.net
192.229.211.108

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
6CEA8000
unkown
page read and write
malicious
2B8F000
trusted library allocation
page read and write
2B59000
trusted library allocation
page read and write
2AA8000
trusted library allocation
page read and write
D0A000
heap
page read and write
2BB8000
trusted library allocation
page read and write
283F000
stack
page read and write
5260000
heap
page execute and read and write
2B9F000
trusted library allocation
page read and write
2B6D000
trusted library allocation
page read and write
2A2F000
trusted library allocation
page read and write
B04000
trusted library allocation
page read and write
29FB000
trusted library allocation
page read and write
2E0E000
stack
page read and write
2A31000
trusted library allocation
page read and write
7460000
heap
page read and write
2A2D000
trusted library allocation
page read and write
430000
unkown
page readonly
5890000
heap
page read and write
2BD1000
trusted library allocation
page read and write
D47000
heap
page read and write
8A3E000
stack
page read and write
2A37000
trusted library allocation
page read and write
A60000
heap
page read and write
F40000
heap
page read and write
2BCF000
trusted library allocation
page read and write
2AAA000
trusted library allocation
page read and write
2A1C000
trusted library allocation
page read and write
2B1B000
trusted library allocation
page read and write
5206000
trusted library allocation
page read and write
2AD2000
trusted library allocation
page read and write
51E5000
heap
page read and write
C93000
heap
page read and write
8B80000
trusted library allocation
page read and write
2A18000
trusted library allocation
page read and write
29C1000
trusted library allocation
page read and write
29F9000
trusted library allocation
page read and write
74A2000
heap
page read and write
5010000
heap
page execute and read and write
2B1F000
trusted library allocation
page read and write
149F000
stack
page read and write
B20000
trusted library allocation
page read and write
2AF3000
trusted library allocation
page read and write
7502000
heap
page read and write
4DC0000
trusted library allocation
page read and write
29E4000
trusted library allocation
page read and write
8B7E000
stack
page read and write
75FF000
stack
page read and write
2B19000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
2A33000
trusted library allocation
page read and write
284E000
trusted library allocation
page read and write
2B0A000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
1620000
heap
page read and write
2B40000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
4D3E000
trusted library allocation
page read and write
2AA0000
trusted library allocation
page read and write
B03000
trusted library allocation
page execute and read and write
29CB000
trusted library allocation
page read and write
2AAF000
trusted library allocation
page read and write
49DC000
stack
page read and write
2AF1000
trusted library allocation
page read and write
289E000
trusted library allocation
page read and write
2B9D000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
29AE000
trusted library allocation
page read and write
2B4B000
trusted library allocation
page read and write
5D9000
stack
page read and write
2A14000
trusted library allocation
page read and write
2B4F000
trusted library allocation
page read and write
4D65000
trusted library allocation
page read and write
AF4000
unkown
page readonly
F9D000
stack
page read and write
2A35000
trusted library allocation
page read and write
28CE000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
4D41000
trusted library allocation
page read and write
29A8000
trusted library allocation
page read and write
6CE90000
unkown
page readonly
2B17000
trusted library allocation
page read and write
53C1000
trusted library allocation
page read and write
CBF000
heap
page read and write
2B3A000
trusted library allocation
page read and write
4FB0000
heap
page read and write
2969000
trusted library allocation
page read and write
2AA2000
trusted library allocation
page read and write
2B04000
trusted library allocation
page read and write
D5C000
heap
page read and write
2EF0000
trusted library allocation
page execute and read and write
4D20000
trusted library allocation
page read and write
2BC0000
trusted library allocation
page read and write
C90000
heap
page read and write
B0D000
trusted library allocation
page execute and read and write
2A1A000
trusted library allocation
page read and write
D8A000
heap
page read and write
8E5E000
stack
page read and write
2BA9000
trusted library allocation
page read and write
8D5D000
stack
page read and write
505B000
stack
page read and write
2B2C000
trusted library allocation
page read and write
D23000
heap
page read and write
7082000
trusted library allocation
page read and write
2AD8000
trusted library allocation
page read and write
4D24000
trusted library allocation
page read and write
D30000
heap
page read and write
29DE000
trusted library allocation
page read and write
2B55000
trusted library allocation
page read and write
2BB2000
trusted library allocation
page read and write
3841000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
7500000
heap
page read and write
2B0E000
trusted library allocation
page read and write
1337000
trusted library allocation
page execute and read and write
29FF000
trusted library allocation
page read and write
29EB000
trusted library allocation
page read and write
2A08000
trusted library allocation
page read and write
6CF48000
unkown
page read and write
2994000
trusted library allocation
page read and write
29A4000
trusted library allocation
page read and write
2B86000
trusted library allocation
page read and write
5013000
heap
page execute and read and write
10D8000
heap
page read and write
2A8F000
trusted library allocation
page read and write
B90000
heap
page execute and read and write
2A12000
trusted library allocation
page read and write
D1F000
heap
page read and write
8A7E000
stack
page read and write
1390000
heap
page read and write
BDC000
stack
page read and write
2ADE000
trusted library allocation
page read and write
2AED000
trusted library allocation
page read and write
2F70000
heap
page read and write
1304000
trusted library allocation
page read and write
F50000
heap
page read and write
747C000
heap
page read and write
2A8D000
trusted library allocation
page read and write
2B88000
trusted library allocation
page read and write
29DC000
trusted library allocation
page read and write
2ADC000
trusted library allocation
page read and write
4D46000
trusted library allocation
page read and write
6980000
heap
page read and write
1380000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
893D000
stack
page read and write
4DF0000
heap
page read and write
2C18000
trusted library allocation
page read and write
2B8C000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
C5C000
stack
page read and write
2ABB000
trusted library allocation
page read and write
CCB000
heap
page read and write
5000000
heap
page read and write
29FD000
trusted library allocation
page read and write
74AE000
heap
page read and write
C1E000
stack
page read and write
2BA1000
trusted library allocation
page read and write
2B82000
trusted library allocation
page read and write
D44000
heap
page read and write
BA0000
heap
page read and write
1370000
trusted library allocation
page read and write
1332000
trusted library allocation
page read and write
2AD4000
trusted library allocation
page read and write
2B5E000
trusted library allocation
page read and write
507E000
stack
page read and write
416B000
trusted library allocation
page read and write
523F000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
10C0000
heap
page read and write
2A9A000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
2B84000
trusted library allocation
page read and write
1360000
trusted library allocation
page execute and read and write
29C5000
trusted library allocation
page read and write
D39000
heap
page read and write
940000
heap
page read and write
10BE000
stack
page read and write
2BA3000
trusted library allocation
page read and write
2A27000
trusted library allocation
page read and write
2B11000
trusted library allocation
page read and write
2A4A000
trusted library allocation
page read and write
2BBE000
trusted library allocation
page read and write
2F81000
trusted library allocation
page read and write
2A91000
trusted library allocation
page read and write
432000
unkown
page execute read
10E7000
heap
page read and write
2FE6000
trusted library allocation
page read and write
2B42000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
D4D000
heap
page read and write
2AA4000
trusted library allocation
page read and write
2A16000
trusted library allocation
page read and write
4D60000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
2A39000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
AE0000
heap
page read and write
2A01000
trusted library allocation
page read and write
10CE000
heap
page read and write
2B25000
trusted library allocation
page read and write
EF8000
stack
page read and write
74C9000
heap
page read and write
B60000
heap
page read and write
2BA7000
trusted library allocation
page read and write
4F90000
trusted library allocation
page execute and read and write
29AA000
trusted library allocation
page read and write
B83000
trusted library allocation
page read and write
2BCD000
trusted library allocation
page read and write
BA7000
heap
page read and write
B22000
trusted library allocation
page read and write
2A4C000
trusted library allocation
page read and write
6CF65000
unkown
page readonly
BD0000
heap
page read and write
A5D000
stack
page read and write
29E2000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
6C2E000
stack
page read and write
4D52000
trusted library allocation
page read and write
B35000
trusted library allocation
page execute and read and write
2B29000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
B26000
trusted library allocation
page execute and read and write
294A000
trusted library allocation
page read and write
6DCE000
stack
page read and write
2A40000
trusted library allocation
page read and write
E9F000
stack
page read and write
1300000
trusted library allocation
page read and write
8CF0000
trusted library allocation
page execute and read and write
52B0000
trusted library allocation
page read and write
2AC3000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
73D1000
trusted library allocation
page read and write
B2A000
trusted library allocation
page execute and read and write
10DF000
heap
page read and write
2AC7000
trusted library allocation
page read and write
6C6E000
stack
page read and write
CA0000
heap
page read and write
2A44000
trusted library allocation
page read and write
29C9000
trusted library allocation
page read and write
6F6F000
stack
page read and write
299C000
trusted library allocation
page read and write
D4A000
heap
page read and write
2BBA000
trusted library allocation
page read and write
4D2B000
trusted library allocation
page read and write
4A2000
remote allocation
page execute and read and write
2A48000
trusted library allocation
page read and write
4D2E000
trusted library allocation
page read and write
2ADA000
trusted library allocation
page read and write
750A000
heap
page read and write
2BA5000
trusted library allocation
page read and write
2B27000
trusted library allocation
page read and write
2B53000
trusted library allocation
page read and write
58B0000
heap
page read and write
2B0C000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
B70000
trusted library allocation
page execute and read and write
B3B000
trusted library allocation
page execute and read and write
4D90000
trusted library allocation
page execute and read and write
2B71000
trusted library allocation
page read and write
C8F000
trusted library allocation
page read and write
2ABD000
trusted library allocation
page read and write
2BB6000
trusted library allocation
page read and write
2B3E000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page execute and read and write
AE5000
heap
page read and write
C60000
trusted library allocation
page read and write
29E7000
trusted library allocation
page read and write
1105000
heap
page read and write
D69000
heap
page read and write
6CEA1000
unkown
page readonly
74EB000
heap
page read and write
D64000
heap
page read and write
6CE91000
unkown
page execute read
2B3C000
trusted library allocation
page read and write
2B06000
trusted library allocation
page read and write
151E000
stack
page read and write
51E0000
heap
page read and write
29B9000
trusted library allocation
page read and write
161E000
stack
page read and write
2AC5000
trusted library allocation
page read and write
2AEB000
trusted library allocation
page read and write
2BED000
trusted library allocation
page read and write
6D6E000
stack
page read and write
B1D000
trusted library allocation
page execute and read and write
2B78000
trusted library allocation
page read and write
FA0000
heap
page read and write
8F7000
stack
page read and write
515D000
stack
page read and write
2B99000
trusted library allocation
page read and write
2B45000
trusted library allocation
page read and write
7480000
heap
page read and write
130D000
trusted library allocation
page execute and read and write
7478000
heap
page read and write
2B08000
trusted library allocation
page read and write
12BF000
stack
page read and write
29DA000
trusted library allocation
page read and write
4FF0000
trusted library section
page readonly
1314000
trusted library allocation
page read and write
2A1E000
trusted library allocation
page read and write
29A6000
trusted library allocation
page read and write
4270000
trusted library allocation
page read and write
2AAD000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
B50000
trusted library allocation
page read and write
2B47000
trusted library allocation
page read and write
29B3000
trusted library allocation
page read and write
B32000
trusted library allocation
page read and write
D42000
heap
page read and write
133B000
trusted library allocation
page execute and read and write
2B80000
trusted library allocation
page read and write
7FC50000
trusted library allocation
page execute and read and write
5880000
heap
page read and write
10FF000
heap
page read and write
51F0000
heap
page read and write
2B57000
trusted library allocation
page read and write
2B5B000
trusted library allocation
page read and write
CD7000
heap
page read and write
29C7000
trusted library allocation
page read and write
1303000
trusted library allocation
page execute and read and write
2B7A000
trusted library allocation
page read and write
2B8A000
trusted library allocation
page read and write
B13000
trusted library allocation
page read and write
2BBC000
trusted library allocation
page read and write
D60000
heap
page read and write
AAE000
stack
page read and write
F9F000
stack
page read and write
2AA6000
trusted library allocation
page read and write
7468000
heap
page read and write
2ABF000
trusted library allocation
page read and write
BB0000
heap
page read and write
2AFC000
trusted library allocation
page read and write
6B2E000
stack
page read and write
6DD0000
trusted library allocation
page execute and read and write
D28000
heap
page read and write
2BB4000
trusted library allocation
page read and write
29B7000
trusted library allocation
page read and write
2A46000
trusted library allocation
page read and write
CA8000
heap
page read and write
14B0000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
684000
unkown
page readonly
14A0000
trusted library allocation
page read and write
7601000
trusted library allocation
page read and write
2B73000
trusted library allocation
page read and write
1102000
heap
page read and write
4D4D000
trusted library allocation
page read and write
2AE3000
trusted library allocation
page read and write
2B6B000
trusted library allocation
page read and write
14D0000
heap
page execute and read and write
2A06000
trusted library allocation
page read and write
B46000
unkown
page readonly
D54000
heap
page read and write
2A9C000
trusted library allocation
page read and write
2841000
trusted library allocation
page read and write
2B6F000
trusted library allocation
page read and write
2BC9000
trusted library allocation
page read and write
D57000
heap
page read and write
29BB000
trusted library allocation
page read and write
2A4E000
trusted library allocation
page read and write
29EF000
trusted library allocation
page read and write
B37000
trusted library allocation
page execute and read and write
5210000
trusted library allocation
page execute and read and write
2EAD000
stack
page read and write
2B21000
trusted library allocation
page read and write
29AC000
trusted library allocation
page read and write
3F81000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
29CE000
trusted library allocation
page read and write
2A2B000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
There are 363 hidden memdumps, click here to show them.