IOC Report
SecuriteInfo.com.Win32.PWSX-gen.177.26778.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.PWSX-gen.177.26778.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_d3e5259f869449b189bc189777f48eae9eafba1_238c56c6_77b46a27-816a-464b-b945-d5ab9894d071\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC45C.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Apr 23 15:44:36 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC49C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC4DB.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.PWSX-gen.177.26778.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.177.26778.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.177.26778.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.177.26778.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.177.26778.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 416 -s 196

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://tempuri.org/DataSet1.xsd
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
ProgramId
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
FileId
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
LowerCaseLongPath
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
LongPathHash
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
Name
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
OriginalFileName
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
Publisher
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
Version
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
BinFileVersion
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
BinaryType
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
ProductName
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
ProductVersion
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
LinkDate
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
BinProductVersion
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
AppxPackageFullName
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
AppxPackageRelativeId
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
Size
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
Language
\REGISTRY\A\{d983bff6-120d-9515-2667-7a9b73c40d89}\Root\InventoryApplicationFile\securiteinfo.com|ccb67ba678a48714
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
2B4C000
trusted library allocation
page read and write
C38000
heap
page read and write
2B42000
trusted library allocation
page read and write
D40000
heap
page read and write
2DF0000
trusted library allocation
page read and write
B5D000
trusted library allocation
page execute and read and write
BAF000
heap
page read and write
D10000
heap
page read and write
C7A000
trusted library allocation
page execute and read and write
10D0000
direct allocation
page execute and read and write
53D0000
heap
page read and write
7130000
heap
page read and write
4E0000
unkown
page readonly
73B0000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
AA37000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
C76000
trusted library allocation
page execute and read and write
73AF000
stack
page read and write
7495000
trusted library allocation
page read and write
E26F000
stack
page read and write
F4E000
stack
page read and write
4E20000
trusted library allocation
page read and write
53D5000
heap
page read and write
1418000
direct allocation
page execute and read and write
BB1000
heap
page read and write
530D000
stack
page read and write
2775000
trusted library allocation
page read and write
E12F000
stack
page read and write
CF0000
trusted library allocation
page execute and read and write
C70000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
4E00000
trusted library allocation
page execute and read and write
7480000
trusted library allocation
page execute and read and write
D00000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page execute and read and write
4980000
trusted library allocation
page read and write
28F1000
trusted library allocation
page read and write
A2E000
stack
page read and write
BFD000
heap
page read and write
59EF000
heap
page read and write
C72000
trusted library allocation
page read and write
A40000
heap
page read and write
126E000
direct allocation
page execute and read and write
AFC000
stack
page read and write
4E9B000
stack
page read and write
DE6E000
stack
page read and write
E02E000
stack
page read and write
7CC000
stack
page read and write
C12000
heap
page read and write
1381000
direct allocation
page execute and read and write
6AC0000
heap
page read and write
9A0000
heap
page read and write
41E3000
trusted library allocation
page read and write
53C0000
trusted library allocation
page execute and read and write
C82000
trusted library allocation
page read and write
5200000
heap
page read and write
59F6000
heap
page read and write
2730000
trusted library allocation
page read and write
B63000
trusted library allocation
page read and write
7250000
trusted library section
page read and write
C24000
heap
page read and write
D70000
heap
page read and write
11F9000
direct allocation
page execute and read and write
B7E000
heap
page read and write
4E10000
trusted library allocation
page read and write
B30000
heap
page read and write
7490000
trusted library allocation
page read and write
6BE2000
trusted library allocation
page read and write
83A000
stack
page read and write
28E0000
heap
page execute and read and write
B54000
trusted library allocation
page read and write
1396000
direct allocation
page execute and read and write
42CE000
trusted library allocation
page read and write
4147000
trusted library allocation
page read and write
11FD000
direct allocation
page execute and read and write
BEF000
heap
page read and write
C8B000
trusted library allocation
page execute and read and write
E4E000
stack
page read and write
D17000
heap
page read and write
59F4000
heap
page read and write
51FE000
stack
page read and write
288E000
stack
page read and write
7220000
trusted library section
page read and write
B60000
trusted library allocation
page read and write
E3AE000
stack
page read and write
2762000
trusted library allocation
page read and write
38F1000
trusted library allocation
page read and write
B70000
heap
page read and write
D20000
trusted library allocation
page read and write
C87000
trusted library allocation
page execute and read and write
E2AE000
stack
page read and write
273B000
trusted library allocation
page read and write
5050000
heap
page execute and read and write
9EE000
stack
page read and write
CEE000
stack
page read and write
711A000
heap
page read and write
72AE000
stack
page read and write
59C0000
heap
page read and write
B7B000
heap
page read and write
4EB0000
heap
page read and write
BA4000
heap
page read and write
DE2E000
stack
page read and write
B97000
heap
page read and write
139D000
direct allocation
page execute and read and write
4E53000
heap
page read and write
2756000
trusted library allocation
page read and write
990000
heap
page read and write
2DAF000
trusted library allocation
page read and write
2E06000
trusted library allocation
page read and write
274E000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
937000
stack
page read and write
5037000
trusted library allocation
page read and write
4DF0000
heap
page read and write
4EC0000
heap
page read and write
4E50000
heap
page read and write
749E000
trusted library allocation
page read and write
B6D000
trusted library allocation
page execute and read and write
B40000
trusted library allocation
page read and write
2780000
heap
page read and write
2890000
trusted library allocation
page read and write
4E2000
unkown
page readonly
E16E000
stack
page read and write
CA0000
trusted library allocation
page read and write
48F0000
trusted library section
page read and write
2760000
trusted library allocation
page read and write
272C000
stack
page read and write
4A8C000
stack
page read and write
4EA0000
trusted library section
page readonly
38F8000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
275D000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
7F410000
trusted library allocation
page execute and read and write
70C0000
heap
page read and write
710E000
heap
page read and write
C70000
heap
page read and write
2751000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
4195000
trusted library allocation
page read and write
B60000
heap
page read and write
7240000
trusted library section
page read and write
70BE000
stack
page read and write
5310000
trusted library section
page read and write
59D0000
heap
page read and write
B53000
trusted library allocation
page execute and read and write
There are 138 hidden memdumps, click here to show them.