IOC Report
message.com.exe

loading gif

Files

File Path
Type
Category
Malicious
message.com.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
malicious
C:\Users\user\AppData\Local\Temp\services.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
malicious
C:\Windows\java.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
malicious
C:\Windows\services.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_message.com.exe_eabd2b87f1d1ff89785cafa7c6d1682cb0e0_578fa923_f27a16b7-0af0-4c1f-b85f-b3b6001c5425\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6FFD.tmp.dmp
Mini DuMP crash report, 14 streams, Thu May 23 13:14:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER70BA.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER70EA.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\zincite.log
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\java.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\message.com.exe
"C:\Users\user\Desktop\message.com.exe"
malicious
C:\Windows\services.exe
"C:\Windows\services.exe"
malicious
C:\Windows\java.exe
"C:\Windows\java.exe"
malicious
C:\Users\user\AppData\Local\Temp\services.exe
"C:\Users\user\AppData\Local\Temp\services.exe"
malicious
C:\Windows\services.exe
"C:\Windows\services.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6888 -s 1196

URLs

Name
IP
Malicious
https://unitUSOPrivaten.micrp
unknown
http://www.altavista.com/web/results?q=%s&kgs=0&kls=0
unknown
http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s
unknown
https://denmark.smartscre_
unknown
http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s&nbq=%dhttp://www.altavista.c
unknown
https://unitedstates2.ss.wd.microsoft
unknown
http://upx.sf.net
unknown
https://europe.dbgcreepp
unknown
http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s
unknown
https://europe.d
unknown
http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=
unknown
https://denmark.smartscre_curlrcom
unknown
https://unitedstates4.ss.wd.microsoft.us
unknown
https://southkoreregid.1991-06.com.microsoftza
unknown
There are 4 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
15.124.29.93
unknown
United States
192.168.1.64
unknown
unknown
4.240.78.155
unknown
United States
159.134.165.119
unknown
Ireland
16.91.195.90
unknown
United States
24.196.145.49
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
JavaVM
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Services
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
ProgramId
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
FileId
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
LowerCaseLongPath
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
LongPathHash
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
Name
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
OriginalFileName
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
Publisher
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
Version
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
BinFileVersion
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
BinaryType
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
ProductName
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
ProductVersion
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
LinkDate
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
BinProductVersion
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
AppxPackageFullName
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
AppxPackageRelativeId
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
Size
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
Language
\REGISTRY\A\{08135869-9d9a-289c-aef6-48185849bf71}\Root\InventoryApplicationFile\message.com.exe|f857c0aa980bf9e7
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Services
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
501000
unkown
page execute and read and write
malicious
501000
unkown
page execute and read and write
malicious
2B7E000
stack
page read and write
405000
unkown
page execute and read and write
5C7000
heap
page read and write
406000
unkown
page execute and write copy
27DC000
stack
page read and write
5C7000
heap
page read and write
405000
unkown
page execute and write copy
509000
unkown
page execute and write copy
400000
unkown
page readonly
5C7000
heap
page read and write
56A000
heap
page read and write
19C000
stack
page read and write
2CBF000
stack
page read and write
5C7000
heap
page read and write
5C7000
heap
page read and write
420000
heap
page read and write
9C000
stack
page read and write
27CE000
stack
page read and write
5C7000
heap
page read and write
AFF000
stack
page read and write
20CC000
stack
page read and write
54E000
unkown
page read and write
812000
heap
page read and write
401000
unkown
page execute and read and write
500000
unkown
page readonly
281E000
stack
page read and write
407000
unkown
page write copy
401000
unkown
page execute and read and write
407000
unkown
page write copy
5C7000
heap
page read and write
400000
unkown
page readonly
5BB000
heap
page read and write
7B0000
heap
page read and write
874000
heap
page read and write
407000
unkown
page read and write
5C7000
heap
page read and write
50D000
unkown
page execute and read and write
5C7000
heap
page read and write
500000
unkown
page readonly
405000
unkown
page execute and write copy
19D000
stack
page read and write
2C1E000
stack
page read and write
82D000
heap
page read and write
5C7000
heap
page read and write
5C7000
heap
page read and write
81A000
heap
page read and write
406000
unkown
page execute and write copy
660000
heap
page read and write
293E000
stack
page read and write
602000
heap
page read and write
85F000
heap
page read and write
5CE000
heap
page read and write
509000
unkown
page execute and read and write
5CE000
heap
page read and write
5C7000
heap
page read and write
901000
heap
page read and write
2B8F000
stack
page read and write
2A7E000
stack
page read and write
665000
heap
page read and write
50F000
unkown
page write copy
5DE000
stack
page read and write
863000
heap
page read and write
400000
unkown
page readonly
264F000
stack
page read and write
5C7000
heap
page read and write
279F000
stack
page read and write
5C7000
heap
page read and write
5DC000
stack
page read and write
2D1F000
stack
page read and write
5C7000
heap
page read and write
5C7000
heap
page read and write
5C7000
heap
page read and write
5C7000
heap
page read and write
812000
heap
page read and write
255E000
stack
page read and write
5C7000
heap
page read and write
407000
unkown
page write copy
590000
heap
page read and write
5C7000
heap
page read and write
837000
heap
page read and write
28CF000
stack
page read and write
265F000
stack
page read and write
401000
unkown
page execute and read and write
405000
unkown
page execute and write copy
7E0000
heap
page read and write
5DE000
heap
page read and write
2AAE000
stack
page read and write
296E000
stack
page read and write
27DF000
stack
page read and write
80A000
heap
page read and write
19D000
stack
page read and write
4D0000
heap
page read and write
AFF000
stack
page read and write
5DE000
stack
page read and write
1E0000
heap
page read and write
19B000
stack
page read and write
9C000
stack
page read and write
21CD000
stack
page read and write
901000
heap
page read and write
2D5E000
stack
page read and write
400000
unkown
page readonly
825000
heap
page read and write
5C7000
heap
page read and write
56E000
heap
page read and write
5AF000
heap
page read and write
50F000
unkown
page write copy
1C0000
heap
page read and write
9C000
stack
page read and write
5C7000
heap
page read and write
5C7000
heap
page read and write
5C7000
heap
page read and write
500000
unkown
page readonly
1D0000
heap
page read and write
28DF000
stack
page read and write
5C7000
heap
page read and write
5C7000
heap
page read and write
2CFE000
stack
page read and write
400000
unkown
page readonly
5C7000
heap
page read and write
420000
heap
page read and write
901000
heap
page read and write
800000
heap
page read and write
59E000
heap
page read and write
500000
unkown
page readonly
812000
heap
page read and write
405000
unkown
page execute and read and write
580000
heap
page read and write
58E000
stack
page read and write
292E000
stack
page read and write
5C7000
heap
page read and write
9C000
stack
page read and write
A20000
heap
page read and write
5C7000
heap
page read and write
400000
heap
page read and write
27DE000
stack
page read and write
1E0000
heap
page read and write
800000
heap
page read and write
5C7000
heap
page read and write
82D000
heap
page read and write
5C7000
heap
page read and write
30DF000
stack
page read and write
27DF000
stack
page read and write
80A000
heap
page read and write
407000
unkown
page read and write
9C000
stack
page read and write
2DFF000
stack
page read and write
400000
unkown
page readonly
2E5E000
stack
page read and write
2A8E000
stack
page read and write
1D5000
heap
page read and write
2FDE000
stack
page read and write
54E000
stack
page read and write
405000
unkown
page execute and read and write
1C0000
heap
page read and write
50F000
unkown
page read and write
4E0000
heap
page read and write
21CD000
stack
page read and write
2A3F000
stack
page read and write
254E000
stack
page read and write
509000
unkown
page execute and write copy
5CF000
heap
page read and write
5DE000
heap
page read and write
50E000
unkown
page execute and write copy
1E0000
heap
page read and write
5B4000
heap
page read and write
854000
heap
page read and write
2BBE000
stack
page read and write
50E000
unkown
page execute and write copy
1F0000
heap
page read and write
278F000
stack
page read and write
540000
heap
page read and write
800000
heap
page read and write
19D000
stack
page read and write
5C7000
heap
page read and write
50F000
unkown
page read and write
406000
unkown
page execute and write copy
2CCE000
stack
page read and write
20CC000
stack
page read and write
560000
heap
page read and write
2A2F000
stack
page read and write
50D000
unkown
page execute and read and write
291F000
stack
page read and write
849000
heap
page read and write
239F000
stack
page read and write
602000
heap
page read and write
602000
heap
page read and write
88F000
stack
page read and write
59A000
heap
page read and write
2BAF000
stack
page read and write
A70000
heap
page read and write
5C7000
heap
page read and write
580000
heap
page read and write
269E000
stack
page read and write
2A6F000
stack
page read and write
509000
unkown
page execute and read and write
268E000
stack
page read and write
2F9F000
stack
page read and write
407000
unkown
page read and write
5CF000
heap
page read and write
78F000
stack
page read and write
1C0000
heap
page read and write
5C7000
heap
page read and write
53E000
stack
page read and write
5C7000
heap
page read and write
835000
heap
page read and write
2E9E000
stack
page read and write
2BCE000
stack
page read and write
59E000
stack
page read and write
420000
heap
page read and write
There are 201 hidden memdumps, click here to show them.