IOC Report
Base64.exe

loading gif

Files

File Path
Type
Category
Malicious
Base64.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Base64.exe_499bb04f6bdfe31790fb9aa21d698a8ce2359192_99c0ef0c_e220a379-e700-4e94-b819-ac1f88aca209\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA9F.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Dec 22 04:29:57 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBB1D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBB4C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Base64.exe
"C:\Users\user\Desktop\Base64.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2228 -s 192

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
ProgramId
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
FileId
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
LowerCaseLongPath
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
LongPathHash
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
Name
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
OriginalFileName
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
Publisher
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
Version
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
BinFileVersion
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
BinaryType
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
ProductName
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
ProductVersion
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
LinkDate
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
BinProductVersion
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
AppxPackageFullName
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
AppxPackageRelativeId
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
Size
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
Language
\REGISTRY\A\{41fd7b2e-ae1e-80a3-de05-4871764aad33}\Root\InventoryApplicationFile\base64.exe|2ba3308aa11f1798
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
23D70FC000
stack
page read and write
malicious
7FF781852000
unkown
page readonly
malicious
7FF781852000
unkown
page readonly
malicious
23D71FF000
stack
page read and write
7FF781851000
unkown
page execute read
7FF781855000
unkown
page readonly
7FF781851000
unkown
page execute read
1BEC5070000
heap
page read and write
7FF781850000
unkown
page readonly
1BEC50A1000
heap
page read and write
1BEC5060000
heap
page read and write
7FF781855000
unkown
page readonly
1BEC509B000
heap
page read and write
23D72FF000
stack
page read and write
7FF781850000
unkown
page readonly
1BEC5090000
heap
page read and write
There are 6 hidden memdumps, click here to show them.