Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.30020.14911.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.30020.14911.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_63a398733eb022277bb9af1c3c9264b7698853_7c9b2bbd_9d6b131c-0258-4862-baf4-76744983edd6\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6665.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Aug 29 04:26:53 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER66C3.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER66E4.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.30020.14911.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.30020.14911.exe"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.30020.14911.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.30020.14911.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 8116 -s 236
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
ProgramId
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
FileId
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
LowerCaseLongPath
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
LongPathHash
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
Name
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
OriginalFileName
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
Publisher
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
Version
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
BinFileVersion
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
BinaryType
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
ProductName
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
ProductVersion
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
LinkDate
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
BinProductVersion
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
AppxPackageFullName
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
Size
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
Language
|
||
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
6B90000
|
trusted library allocation
|
page read and write
|
||
8F7000
|
stack
|
page read and write
|
||
4EF0000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
8680000
|
heap
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
30D8000
|
direct allocation
|
page execute and read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
6BB9000
|
trusted library allocation
|
page read and write
|
||
F63000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
58A000
|
stack
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
285E000
|
trusted library allocation
|
page read and write
|
||
4D6B000
|
stack
|
page read and write
|
||
6BB6000
|
trusted library allocation
|
page read and write
|
||
25AB000
|
trusted library allocation
|
page execute and read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
5140000
|
heap
|
page read and write
|
||
128F000
|
stack
|
page read and write
|
||
4C7B000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
trusted library section
|
page readonly
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
F53000
|
trusted library allocation
|
page execute and read and write
|
||
C60000
|
heap
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
5360000
|
trusted library allocation
|
page execute and read and write
|
||
AE4000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
7032000
|
trusted library allocation
|
page read and write
|
||
ACC000
|
heap
|
page read and write
|
||
4C91000
|
trusted library allocation
|
page read and write
|
||
481C000
|
stack
|
page read and write
|
||
2EBD000
|
direct allocation
|
page execute and read and write
|
||
37E1000
|
trusted library allocation
|
page read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
8670000
|
heap
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page execute and read and write
|
||
ACCE000
|
stack
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page execute and read and write
|
||
118F000
|
stack
|
page read and write
|
||
25A7000
|
trusted library allocation
|
page execute and read and write
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page execute and read and write
|
||
285C000
|
trusted library allocation
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
503D000
|
stack
|
page read and write
|
||
AA7000
|
heap
|
page read and write
|
||
A46000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
6B70000
|
trusted library section
|
page read and write
|
||
442000
|
unkown
|
page readonly
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
87B0000
|
trusted library section
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
trusted library allocation
|
page read and write
|
||
4C8E000
|
trusted library allocation
|
page read and write
|
||
F5D000
|
trusted library allocation
|
page execute and read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
4DC3000
|
heap
|
page read and write
|
||
A1E000
|
heap
|
page read and write
|
||
450000
|
remote allocation
|
page execute and read and write
|
||
25C0000
|
trusted library allocation
|
page read and write
|
||
CAE000
|
stack
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
6BA0000
|
trusted library allocation
|
page read and write
|
||
4C9D000
|
trusted library allocation
|
page read and write
|
||
5370000
|
trusted library allocation
|
page execute and read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
6BB0000
|
trusted library allocation
|
page read and write
|
||
37E9000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
F9B000
|
heap
|
page read and write
|
||
6CFF000
|
stack
|
page read and write
|
||
A8E000
|
heap
|
page read and write
|
||
8674000
|
heap
|
page read and write
|
||
AC8D000
|
stack
|
page read and write
|
||
ADC000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
5171000
|
heap
|
page read and write
|
||
260E000
|
stack
|
page read and write
|
||
27DF000
|
stack
|
page read and write
|
||
AB2000
|
heap
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
4CA2000
|
trusted library allocation
|
page read and write
|
||
8684000
|
heap
|
page read and write
|
||
2628000
|
trusted library allocation
|
page read and write
|
||
AE8E000
|
stack
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
25A2000
|
trusted library allocation
|
page read and write
|
||
4FC000
|
unkown
|
page readonly
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page execute and read and write
|
||
4F30000
|
heap
|
page execute and read and write
|
||
2592000
|
trusted library allocation
|
page read and write
|
||
25A0000
|
trusted library allocation
|
page read and write
|
||
3056000
|
direct allocation
|
page execute and read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
2D90000
|
direct allocation
|
page execute and read and write
|
||
6930000
|
heap
|
page read and write
|
||
4EE0000
|
heap
|
page read and write
|
||
AFCE000
|
stack
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
5045000
|
heap
|
page read and write
|
||
2610000
|
heap
|
page execute and read and write
|
||
F54000
|
trusted library allocation
|
page read and write
|
||
86B0000
|
heap
|
page read and write
|
||
6BFE000
|
stack
|
page read and write
|
||
26C0000
|
trusted library allocation
|
page execute and read and write
|
||
284E000
|
trusted library allocation
|
page read and write
|
||
F77000
|
heap
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
86D2000
|
heap
|
page read and write
|
||
6F20000
|
trusted library allocation
|
page read and write
|
||
B02000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
305D000
|
direct allocation
|
page execute and read and write
|
||
9F0000
|
heap
|
page read and write
|
||
4CD5000
|
trusted library allocation
|
page read and write
|
||
2596000
|
trusted library allocation
|
page execute and read and write
|
||
2A30000
|
heap
|
page read and write
|
||
4C96000
|
trusted library allocation
|
page read and write
|
||
AB6000
|
heap
|
page read and write
|
||
3041000
|
direct allocation
|
page execute and read and write
|
||
5150000
|
heap
|
page read and write
|
||
491C000
|
stack
|
page read and write
|
||
2EB9000
|
direct allocation
|
page execute and read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
AF8F000
|
stack
|
page read and write
|
||
B0CE000
|
stack
|
page read and write
|
||
CFC000
|
stack
|
page read and write
|
||
F6D000
|
trusted library allocation
|
page execute and read and write
|
||
6B6F000
|
stack
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
2F2E000
|
direct allocation
|
page execute and read and write
|
||
F90000
|
heap
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
259A000
|
trusted library allocation
|
page execute and read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
There are 140 hidden memdumps, click here to show them.