IOC Report
SecuriteInfo.com.Win64.MalwareX-gen.24652.477.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win64.MalwareX-gen.24652.477.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_a3d5b28f45f55dfcfad94157e0e1426378f45bdc_27ead845_a6f82c43-7a16-4296-8c91-11f0f1e3d529\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5BB9.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 17:26:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C08.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C28.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24652.477.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24652.477.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7256 -s 208

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
ProgramId
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
FileId
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
LowerCaseLongPath
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
LongPathHash
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
Name
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
OriginalFileName
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
Publisher
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
Version
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
BinFileVersion
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
BinaryType
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
ProductName
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
ProductVersion
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
LinkDate
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
BinProductVersion
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
AppxPackageFullName
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
AppxPackageRelativeId
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
Size
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
Language
\REGISTRY\A\{c449074d-39d3-adb6-f063-353cc8881a03}\Root\InventoryApplicationFile\securiteinfo.com|7f1735e0067a4f65
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page readonly
A6000
heap
page read and write
401000
unkown
page execute read
1C0000
heap
page read and write
40D000
unkown
page readonly
409000
unkown
page read and write
AF0000
trusted library allocation
page read and write
412000
unkown
page readonly
AC000
heap
page read and write
90000
trusted library allocation
page read and write
AEF000
stack
page read and write
40D000
unkown
page readonly
C60000
heap
page read and write
61D000
stack
page read and write
8EF000
stack
page read and write
405000
unkown
page readonly
405000
unkown
page readonly
80000
heap
page read and write
A0000
heap
page read and write
409000
unkown
page write copy
1A0000
heap
page read and write
401000
unkown
page execute read
412000
unkown
page readonly
400000
unkown
page readonly
There are 14 hidden memdumps, click here to show them.