Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.W32.MSIL_Kryptik.KXQ.gen.Eldorado.28696.3484.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_c82ea277b6871d198159225c9e96b9ed27abff4a_56054b36_5bf8dc03-b4d2-413f-8be5-e604e5a16adf\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3CA0.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu May 2 10:24:21 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3D0F.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3D5E.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.W32.MSIL_Kryptik.KXQ.gen.Eldorado.28696.3484.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KXQ.gen.Eldorado.28696.3484.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KXQ.gen.Eldorado.28696.3484.exe"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KXQ.gen.Eldorado.28696.3484.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KXQ.gen.Eldorado.28696.3484.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2492 --field-trial-handle=2372,i,13039814948342334997,6454914738324802222,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6624 -s 196
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
google.com
|
142.251.40.206
|
||
www.google.com
|
142.251.40.196
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
142.251.40.196
|
www.google.com
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
ProgramId
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
FileId
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
LowerCaseLongPath
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
LongPathHash
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
Name
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
OriginalFileName
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
Publisher
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
Version
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
BinFileVersion
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
BinaryType
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
ProductName
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
ProductVersion
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
LinkDate
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
BinProductVersion
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
AppxPackageFullName
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
Size
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
Language
|
||
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
131E000
|
stack
|
page read and write
|
||
BBB000
|
stack
|
page read and write
|
||
63BE000
|
stack
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
5B1E000
|
stack
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
1324000
|
trusted library allocation
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
156F000
|
stack
|
page read and write
|
||
10CD000
|
stack
|
page read and write
|
||
566B000
|
trusted library allocation
|
page read and write
|
||
134A000
|
trusted library allocation
|
page execute and read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
13AD000
|
direct allocation
|
page execute and read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
15FE000
|
stack
|
page read and write
|
||
56DE000
|
trusted library allocation
|
page read and write
|
||
AA2000
|
unkown
|
page readonly
|
||
56A5000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
1531000
|
direct allocation
|
page execute and read and write
|
||
1147000
|
heap
|
page read and write
|
||
13A9000
|
direct allocation
|
page execute and read and write
|
||
154D000
|
direct allocation
|
page execute and read and write
|
||
56AA000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
1346000
|
trusted library allocation
|
page execute and read and write
|
||
132D000
|
trusted library allocation
|
page execute and read and write
|
||
1334000
|
trusted library allocation
|
page read and write
|
||
40C8000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
heap
|
page execute and read and write
|
||
1323000
|
trusted library allocation
|
page execute and read and write
|
||
56AD000
|
trusted library allocation
|
page read and write
|
||
11F1000
|
heap
|
page read and write
|
||
5695000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
3FE1000
|
trusted library allocation
|
page read and write
|
||
1590000
|
trusted library allocation
|
page execute and read and write
|
||
56D4000
|
trusted library allocation
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
75C000
|
stack
|
page read and write
|
||
55F0000
|
trusted library section
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
1280000
|
direct allocation
|
page execute and read and write
|
||
AA0000
|
unkown
|
page readonly
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
135B000
|
trusted library allocation
|
page execute and read and write
|
||
3FE5000
|
trusted library allocation
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
2FE1000
|
trusted library allocation
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
EF6000
|
stack
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page execute and read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
112E000
|
heap
|
page read and write
|
||
62BE000
|
stack
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
141E000
|
direct allocation
|
page execute and read and write
|
||
110E000
|
stack
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
1155000
|
heap
|
page read and write
|
||
5B5E000
|
stack
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
11F4000
|
heap
|
page read and write
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
15C8000
|
direct allocation
|
page execute and read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
1199000
|
heap
|
page read and write
|
||
5B9E000
|
stack
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
581E000
|
stack
|
page read and write
|
||
5662000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
AFD000
|
stack
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
567E000
|
trusted library allocation
|
page read and write
|
||
585E000
|
stack
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
5710000
|
trusted library section
|
page read and write
|
||
1357000
|
trusted library allocation
|
page execute and read and write
|
||
5664000
|
trusted library allocation
|
page read and write
|
||
5686000
|
trusted library allocation
|
page read and write
|
||
2EC7000
|
trusted library allocation
|
page read and write
|
||
121D000
|
heap
|
page read and write
|
||
1610000
|
trusted library allocation
|
page read and write
|
||
1546000
|
direct allocation
|
page execute and read and write
|
There are 97 hidden memdumps, click here to show them.