IOC Report
SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.30020.14911.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.30020.14911.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.30020.14911.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_63a398733eb022277bb9af1c3c9264b7698853_7c9b2bbd_9d6b131c-0258-4862-baf4-76744983edd6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6665.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Aug 29 04:26:53 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER66C3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER66E4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.30020.14911.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.30020.14911.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.30020.14911.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.30020.14911.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8116 -s 236

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
ProgramId
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
FileId
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
LowerCaseLongPath
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
LongPathHash
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
Name
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
OriginalFileName
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
Publisher
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
Version
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
BinFileVersion
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
BinaryType
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
ProductName
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
ProductVersion
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
LinkDate
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
BinProductVersion
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
AppxPackageFullName
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
AppxPackageRelativeId
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
Size
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
Language
\REGISTRY\A\{50ca7216-4724-a25b-5523-b7f118e984a4}\Root\InventoryApplicationFile\securiteinfo.com|14898f97dcdc1ceb
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
6B90000
trusted library allocation
page read and write
8F7000
stack
page read and write
4EF0000
heap
page read and write
5F0000
heap
page read and write
8680000
heap
page read and write
A55000
heap
page read and write
30D8000
direct allocation
page execute and read and write
27E1000
trusted library allocation
page read and write
6BB9000
trusted library allocation
page read and write
F63000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
4DB0000
heap
page read and write
A10000
heap
page read and write
58A000
stack
page read and write
9FC000
stack
page read and write
285E000
trusted library allocation
page read and write
4D6B000
stack
page read and write
6BB6000
trusted library allocation
page read and write
25AB000
trusted library allocation
page execute and read and write
5350000
trusted library allocation
page read and write
5140000
heap
page read and write
128F000
stack
page read and write
4C7B000
trusted library allocation
page read and write
4ED0000
trusted library section
page readonly
4C60000
trusted library allocation
page read and write
F53000
trusted library allocation
page execute and read and write
C60000
heap
page read and write
EBE000
stack
page read and write
5360000
trusted library allocation
page execute and read and write
AE4000
heap
page read and write
D60000
heap
page read and write
7032000
trusted library allocation
page read and write
ACC000
heap
page read and write
4C91000
trusted library allocation
page read and write
481C000
stack
page read and write
2EBD000
direct allocation
page execute and read and write
37E1000
trusted library allocation
page read and write
6A6E000
stack
page read and write
8670000
heap
page read and write
6F00000
trusted library allocation
page execute and read and write
ACCE000
stack
page read and write
4EC0000
trusted library allocation
page execute and read and write
118F000
stack
page read and write
25A7000
trusted library allocation
page execute and read and write
5340000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
4D80000
trusted library allocation
page execute and read and write
285C000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
503D000
stack
page read and write
AA7000
heap
page read and write
A46000
heap
page read and write
DA0000
heap
page read and write
6B70000
trusted library section
page read and write
442000
unkown
page readonly
4F20000
trusted library allocation
page read and write
87B0000
trusted library section
page read and write
4D10000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
4C8E000
trusted library allocation
page read and write
F5D000
trusted library allocation
page execute and read and write
F50000
trusted library allocation
page read and write
4DC3000
heap
page read and write
A1E000
heap
page read and write
450000
remote allocation
page execute and read and write
25C0000
trusted library allocation
page read and write
CAE000
stack
page read and write
4CC0000
trusted library allocation
page read and write
A74000
heap
page read and write
B4E000
stack
page read and write
6BA0000
trusted library allocation
page read and write
4C9D000
trusted library allocation
page read and write
5370000
trusted library allocation
page execute and read and write
4C70000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
37E9000
trusted library allocation
page read and write
EFE000
stack
page read and write
440000
unkown
page readonly
F9B000
heap
page read and write
6CFF000
stack
page read and write
A8E000
heap
page read and write
8674000
heap
page read and write
AC8D000
stack
page read and write
ADC000
heap
page read and write
D70000
heap
page read and write
5171000
heap
page read and write
260E000
stack
page read and write
27DF000
stack
page read and write
AB2000
heap
page read and write
5040000
heap
page read and write
4CA2000
trusted library allocation
page read and write
8684000
heap
page read and write
2628000
trusted library allocation
page read and write
AE8E000
stack
page read and write
C4E000
stack
page read and write
25A2000
trusted library allocation
page read and write
4FC000
unkown
page readonly
F40000
trusted library allocation
page read and write
52C0000
trusted library allocation
page execute and read and write
4F30000
heap
page execute and read and write
2592000
trusted library allocation
page read and write
25A0000
trusted library allocation
page read and write
3056000
direct allocation
page execute and read and write
4EB0000
trusted library allocation
page read and write
A53000
heap
page read and write
2D90000
direct allocation
page execute and read and write
6930000
heap
page read and write
4EE0000
heap
page read and write
AFCE000
stack
page read and write
4E80000
trusted library allocation
page read and write
9D0000
heap
page read and write
DAE000
stack
page read and write
4DA0000
heap
page read and write
5045000
heap
page read and write
2610000
heap
page execute and read and write
F54000
trusted library allocation
page read and write
86B0000
heap
page read and write
6BFE000
stack
page read and write
26C0000
trusted library allocation
page execute and read and write
284E000
trusted library allocation
page read and write
F77000
heap
page read and write
4E90000
trusted library allocation
page read and write
86D2000
heap
page read and write
6F20000
trusted library allocation
page read and write
B02000
heap
page read and write
F70000
heap
page read and write
305D000
direct allocation
page execute and read and write
9F0000
heap
page read and write
4CD5000
trusted library allocation
page read and write
2596000
trusted library allocation
page execute and read and write
2A30000
heap
page read and write
4C96000
trusted library allocation
page read and write
AB6000
heap
page read and write
3041000
direct allocation
page execute and read and write
5150000
heap
page read and write
491C000
stack
page read and write
2EB9000
direct allocation
page execute and read and write
F60000
trusted library allocation
page read and write
AF8F000
stack
page read and write
B0CE000
stack
page read and write
CFC000
stack
page read and write
F6D000
trusted library allocation
page execute and read and write
6B6F000
stack
page read and write
26D0000
heap
page read and write
2F2E000
direct allocation
page execute and read and write
F90000
heap
page read and write
4DC0000
heap
page read and write
259A000
trusted library allocation
page execute and read and write
4CE0000
trusted library allocation
page read and write
There are 140 hidden memdumps, click here to show them.