IOC Report
SecuriteInfo.com.Win32.PWSX-gen.16770.26321.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.PWSX-gen.16770.26321.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_92142fd1bd8373cf64bee6eb2dc7b2dd65882_66b28ea7_0842963c-3896-4ace-9ee8-9aed4e7be53e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6BD4.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Nov 21 02:17:54 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6CB0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6CFF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.16770.26321.exe
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.16770.26321.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6536 -s 228

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
ProgramId
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
FileId
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
LowerCaseLongPath
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
LongPathHash
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
Name
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
OriginalFileName
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
Publisher
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
Version
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
BinFileVersion
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
BinaryType
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
ProductName
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
ProductVersion
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
LinkDate
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
BinProductVersion
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
AppxPackageFullName
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
AppxPackageRelativeId
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
Size
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
Language
\REGISTRY\A\{f1da834e-feeb-9f1b-c2d3-785d7bfc3ac5}\Root\InventoryApplicationFile\securiteinfo.com|126c6e8dded6a1ec
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DD54B844D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
570000
direct allocation
page execute and read and write
malicious
42E000
unkown
page read and write
malicious
20000
unclassified section
page readonly
400000
unkown
page readonly
55E000
stack
page read and write
425000
unkown
page readonly
580000
heap
page read and write
62A000
heap
page read and write
42E000
unkown
page write copy
1F0000
heap
page read and write
62E000
heap
page read and write
2150000
heap
page read and write
401000
unkown
page execute read
81E000
stack
page read and write
510000
heap
page read and write
433000
unkown
page read and write
401000
unkown
page execute read
9C000
stack
page read and write
91E000
stack
page read and write
5CE000
stack
page read and write
620000
heap
page read and write
1C0000
unclassified section
page readonly
400000
unkown
page readonly
10000
unclassified section
page readonly
19C000
stack
page read and write
425000
unkown
page readonly
There are 16 hidden memdumps, click here to show them.