IOC Report
SecuriteInfo.com.W32.MSIL_Kryptik.KXQ.gen.Eldorado.28696.3484.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W32.MSIL_Kryptik.KXQ.gen.Eldorado.28696.3484.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_c82ea277b6871d198159225c9e96b9ed27abff4a_56054b36_5bf8dc03-b4d2-413f-8be5-e604e5a16adf\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3CA0.tmp.dmp
Mini DuMP crash report, 14 streams, Thu May 2 10:24:21 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3D0F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3D5E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.W32.MSIL_Kryptik.KXQ.gen.Eldorado.28696.3484.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KXQ.gen.Eldorado.28696.3484.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KXQ.gen.Eldorado.28696.3484.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KXQ.gen.Eldorado.28696.3484.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KXQ.gen.Eldorado.28696.3484.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 --field-trial-handle=2372,i,13039814948342334997,6454914738324802222,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6624 -s 196

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Domains

Name
IP
Malicious
google.com
142.251.40.206
www.google.com
142.251.40.196

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
142.251.40.196
www.google.com
United States
192.168.2.4
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
ProgramId
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
FileId
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
LowerCaseLongPath
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
LongPathHash
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
Name
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
OriginalFileName
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
Publisher
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
Version
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
BinFileVersion
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
BinaryType
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
ProductName
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
ProductVersion
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
LinkDate
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
BinProductVersion
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
AppxPackageFullName
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
AppxPackageRelativeId
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
Size
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
Language
\REGISTRY\A\{1058996d-6381-aa60-3838-2b84aff0a6ff}\Root\InventoryApplicationFile\securiteinfo.com|69c681eaa11000c1
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
131E000
stack
page read and write
BBB000
stack
page read and write
63BE000
stack
page read and write
1340000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
F30000
heap
page read and write
112B000
heap
page read and write
7C0000
heap
page read and write
5B1E000
stack
page read and write
56E0000
trusted library allocation
page read and write
1324000
trusted library allocation
page read and write
146E000
stack
page read and write
156F000
stack
page read and write
10CD000
stack
page read and write
566B000
trusted library allocation
page read and write
134A000
trusted library allocation
page execute and read and write
5A1E000
stack
page read and write
13AD000
direct allocation
page execute and read and write
2EBE000
stack
page read and write
15FE000
stack
page read and write
56DE000
trusted library allocation
page read and write
AA2000
unkown
page readonly
56A5000
trusted library allocation
page read and write
1120000
heap
page read and write
1531000
direct allocation
page execute and read and write
1147000
heap
page read and write
13A9000
direct allocation
page execute and read and write
154D000
direct allocation
page execute and read and write
56AA000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
1346000
trusted library allocation
page execute and read and write
132D000
trusted library allocation
page execute and read and write
1334000
trusted library allocation
page read and write
40C8000
trusted library allocation
page read and write
54E0000
heap
page execute and read and write
1323000
trusted library allocation
page execute and read and write
56AD000
trusted library allocation
page read and write
11F1000
heap
page read and write
5695000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
1194000
heap
page read and write
3FE1000
trusted library allocation
page read and write
1590000
trusted library allocation
page execute and read and write
56D4000
trusted library allocation
page read and write
54CE000
stack
page read and write
FB0000
heap
page read and write
75C000
stack
page read and write
55F0000
trusted library section
page read and write
2ED0000
heap
page read and write
1280000
direct allocation
page execute and read and write
AA0000
unkown
page readonly
1580000
trusted library allocation
page read and write
135B000
trusted library allocation
page execute and read and write
3FE5000
trusted library allocation
page read and write
50DE000
stack
page read and write
2FE1000
trusted library allocation
page read and write
2FDE000
stack
page read and write
EF6000
stack
page read and write
E20000
heap
page read and write
15B0000
heap
page execute and read and write
1110000
trusted library allocation
page read and write
112E000
heap
page read and write
62BE000
stack
page read and write
55EE000
stack
page read and write
2EC0000
trusted library allocation
page read and write
1360000
heap
page read and write
141E000
direct allocation
page execute and read and write
110E000
stack
page read and write
1350000
trusted library allocation
page read and write
1155000
heap
page read and write
5B5E000
stack
page read and write
F7E000
stack
page read and write
1165000
heap
page read and write
11F4000
heap
page read and write
5681000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
15C8000
direct allocation
page execute and read and write
15A0000
trusted library allocation
page read and write
F20000
heap
page read and write
1199000
heap
page read and write
5B9E000
stack
page read and write
5700000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
581E000
stack
page read and write
5662000
trusted library allocation
page read and write
CC0000
heap
page read and write
AFD000
stack
page read and write
1630000
heap
page read and write
567E000
trusted library allocation
page read and write
585E000
stack
page read and write
56A0000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
1620000
heap
page read and write
CB0000
heap
page read and write
1320000
trusted library allocation
page read and write
5710000
trusted library section
page read and write
1357000
trusted library allocation
page execute and read and write
5664000
trusted library allocation
page read and write
5686000
trusted library allocation
page read and write
2EC7000
trusted library allocation
page read and write
121D000
heap
page read and write
1610000
trusted library allocation
page read and write
1546000
direct allocation
page execute and read and write
There are 97 hidden memdumps, click here to show them.