IOC Report
SecuriteInfo.com.W32.Xpack.E.gen.Eldorado.17829.973.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W32.Xpack.E.gen.Eldorado.17829.973.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_d45efbb66f135ac8cdfb63cf29b9eedf1d892ee_1c527afe_b625bdb1-c4ff-4937-90f9-5c486047f251\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER339D.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 1 09:22:54 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER33DC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER33FC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.Xpack.E.gen.Eldorado.17829.973.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.Xpack.E.gen.Eldorado.17829.973.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 232

URLs

Name
IP
Malicious
http://www.clamav.net
unknown
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
ProgramId
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
FileId
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
LowerCaseLongPath
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
LongPathHash
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
Name
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
OriginalFileName
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
Publisher
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
Version
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
BinFileVersion
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
BinaryType
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
ProductName
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
ProductVersion
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
LinkDate
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
BinProductVersion
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
AppxPackageFullName
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
AppxPackageRelativeId
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
Size
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
Language
\REGISTRY\A\{e0d46091-a259-8a7f-cd24-ec5b8fdb7094}\Root\InventoryApplicationFile\securiteinfo.com|5efd4e9f00ffbb06
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
100000
heap
page read and write
A10000
heap
page read and write
482000
unkown
page readonly
482000
unkown
page readonly
A1A000
heap
page read and write
490000
unkown
page write copy
401000
unkown
page execute read
400000
unkown
page readonly
A1E000
heap
page read and write
190000
heap
page read and write
400000
unkown
page readonly
401000
unkown
page execute read
490000
unkown
page write copy
4AD000
unkown
page readonly
F0000
heap
page read and write
8AD000
stack
page read and write
9D000
stack
page read and write
4AD000
unkown
page readonly
There are 8 hidden memdumps, click here to show them.