IOC Report
sc_setup_x64.exe

loading gif

Files

File Path
Type
Category
Malicious
sc_setup_x64.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_sc_setup_x64.exe_10f9a047a950d8fb8b3fb7b54dcc2af97e45377f_701d5e3e_a0c07dd9-6508-46a2-847c-554e04d89f5c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC256.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 19 08:32:23 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC2D4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC304.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\sc_setup_x64.exe
"C:\Users\user\Desktop\sc_setup_x64.exe"
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7048 -s 464

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
ProgramId
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
FileId
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
LowerCaseLongPath
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
LongPathHash
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
Name
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
OriginalFileName
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
Publisher
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
Version
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
BinFileVersion
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
BinaryType
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
ProductName
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
ProductVersion
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
LinkDate
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
BinProductVersion
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
AppxPackageFullName
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
AppxPackageRelativeId
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
Size
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
Language
\REGISTRY\A\{2434f3a2-5e7e-c5e9-3755-0c84ed22edc4}\Root\InventoryApplicationFile\sc_setup_x64.exe|c792f3f0b75024db
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
507000
heap
page read and write
14003F000
unkown
page read and write
4E0000
heap
page read and write
14003F000
unkown
page write copy
140043000
unkown
page readonly
A60000
heap
page read and write
4EC000
heap
page read and write
140047000
unkown
page readonly
6DE000
stack
page read and write
140001000
unkown
page execute read
505000
heap
page read and write
14C000
stack
page read and write
140043000
unkown
page readonly
1A0000
heap
page read and write
140024000
unkown
page readonly
1C0000
heap
page read and write
140001000
unkown
page execute read
140047000
unkown
page readonly
7DE000
stack
page read and write
8DF000
stack
page read and write
140024000
unkown
page readonly
190000
heap
page read and write
9E0000
heap
page read and write
140000000
unkown
page readonly
140000000
unkown
page readonly
There are 15 hidden memdumps, click here to show them.