IOC Report
SecuriteInfo.com.Win32.PWSX-gen.16188.7094.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.PWSX-gen.16188.7094.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_c136f9839aaccad85a66b9f733bbb3cf4c588e0_e9cd6a7e_166ff3ee\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE76B.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Nov 30 00:56:12 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREA98.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREB55.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_c136f9839aaccad85a66b9f733bbb3cf4c588e0_e9cd6a7e_14ca5c69\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3F7B.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Nov 30 00:50:38 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4141.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER41CE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.16188.7094.exe
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.16188.7094.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 464
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6116 -s 464

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
ProgramId
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
FileId
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
LowerCaseLongPath
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
LongPathHash
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
Name
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
Publisher
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
Version
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
BinFileVersion
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
BinaryType
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
ProductName
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
ProductVersion
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
LinkDate
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
BinProductVersion
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
Size
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
Language
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
IsPeFile
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
ProgramId
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
FileId
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
LowerCaseLongPath
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
LongPathHash
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
Name
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
Publisher
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
Version
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
BinFileVersion
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
BinaryType
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
ProductName
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
ProductVersion
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
LinkDate
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
BinProductVersion
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
Size
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
Language
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
IsPeFile
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800807EAAF0D
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1A1000
unkown
page execute read
28A09B56000
heap
page read and write
22C8265F000
heap
page read and write
28A09B5A000
heap
page read and write
28A08F40000
heap
page read and write
28A09B52000
heap
page read and write
F39AE7E000
stack
page read and write
D6B317E000
stack
page read and write
28A08F50000
heap
page read and write
99826FE000
stack
page read and write
23DD3E2A000
heap
page read and write
19E000
stack
page read and write
2891AA43000
heap
page read and write
1A1000
unkown
page execute read
28A09094000
heap
page read and write
998267B000
stack
page read and write
6C0000
heap
page read and write
281A9024000
heap
page read and write
AB0000
heap
page read and write
9982BFE000
stack
page read and write
B20FCAC000
stack
page read and write
265CED40000
heap
page read and write
8BE000
stack
page read and write
28A09B63000
heap
page read and write
23DD3E13000
heap
page read and write
23DD3BE0000
heap
page read and write
28A090C2000
heap
page read and write
28A09B52000
heap
page read and write
EC000
stack
page read and write
DA9AC7F000
stack
page read and write
1C9000
unkown
page readonly
265CEE5A000
heap
page read and write
28A09B57000
heap
page read and write
281A8ED0000
heap
page read and write
2891AA54000
heap
page read and write
23DD3E39000
heap
page read and write
265CEE13000
heap
page read and write
28A09B52000
heap
page read and write
281A9A02000
heap
page read and write
28A09B66000
heap
page read and write
265CEE58000
heap
page read and write
DA9A87E000
stack
page read and write
23DD3E43000
heap
page read and write
28A09B53000
heap
page read and write
23DD3E48000
heap
page read and write
28A09B32000
heap
page read and write
2891AA43000
heap
page read and write
998277E000
stack
page read and write
15404E63000
heap
page read and write
28A09B52000
heap
page read and write
1A1000
unkown
page execute read
D6B367E000
stack
page read and write
23DD3E7B000
heap
page read and write
99829FE000
stack
page read and write
1BC000
unkown
page readonly
D770FF000
stack
page read and write
15404E00000
heap
page read and write
28A09B6A000
heap
page read and write
22C82E70000
trusted library allocation
page read and write
28A090AB000
heap
page read and write
281A90C4000
heap
page read and write
23DD3E70000
heap
page read and write
28A09B32000
heap
page read and write
1BC000
unkown
page readonly
265CEF13000
heap
page read and write
B20000
heap
page read and write
B21027A000
stack
page read and write
8BE000
stack
page read and write
B21037F000
stack
page read and write
AB0000
trusted library allocation
page read and write
15404E28000
heap
page read and write
23DD3E45000
heap
page read and write
28A09B52000
heap
page read and write
28A09B82000
heap
page read and write
B21017E000
stack
page read and write
22C825D0000
heap
page read and write
265CEE75000
heap
page read and write
23DD3E76000
heap
page read and write
23DD3E4F000
heap
page read and write
265CEF02000
heap
page read and write
19E000
stack
page read and write
DA9B07E000
stack
page read and write
2891A850000
heap
page read and write
265CEDA0000
heap
page read and write
80000
heap
page read and write
2891AA65000
heap
page read and write
23DD3E47000
heap
page read and write
28A09B13000
heap
page read and write
28A09B72000
heap
page read and write
28A09A02000
heap
page read and write
CD1E2FB000
stack
page read and write
23DD3BF0000
heap
page read and write
28A09B5B000
heap
page read and write
28A09083000
heap
page read and write
28A09B2A000
heap
page read and write
23DD3E4A000
heap
page read and write
80000
unkown
page read and write
5C0000
heap
page read and write
28A09102000
heap
page read and write
281A8F30000
heap
page read and write
DA9AD7E000
stack
page read and write
28A0903D000
heap
page read and write
2891A970000
trusted library allocation
page read and write
23DD3E39000
heap
page read and write
22C83002000
trusted library allocation
page read and write
28A09091000
heap
page read and write
2891A950000
trusted library allocation
page read and write
28A090AF000
heap
page read and write
23DD3E52000
heap
page read and write
15404E40000
heap
page read and write
28A09029000
heap
page read and write
23DD3F02000
heap
page read and write
28A09B52000
heap
page read and write
22C82657000
heap
page read and write
23DD3E37000
heap
page read and write
2891A7E0000
heap
page read and write
22C82638000
heap
page read and write
23DD3E7A000
heap
page read and write
23DD3E7C000
heap
page read and write
1C4000
unkown
page read and write
28A09B2A000
heap
page read and write
23DD3E37000
heap
page read and write
28A09B73000
heap
page read and write
281A9088000
heap
page read and write
28A09B30000
heap
page read and write
2891AB13000
heap
page read and write
D768CC000
stack
page read and write
28A09000000
heap
page read and write
B21047B000
stack
page read and write
281A9B12000
heap
page read and write
2891AA13000
heap
page read and write
281A9040000
heap
page read and write
D6B33FC000
stack
page read and write
15404D60000
heap
page read and write
22C82560000
heap
page read and write
28A09B55000
heap
page read and write
2891AA58000
heap
page read and write
28A09B32000
heap
page read and write
D6B2FFC000
stack
page read and write
28A09A15000
heap
page read and write
23DD3E51000
heap
page read and write
28A09B32000
heap
page read and write
DA9A77A000
stack
page read and write
265CEE02000
heap
page read and write
53E000
stack
page read and write
15404DF0000
trusted library allocation
page read and write
EC000
stack
page read and write
281A906E000
heap
page read and write
28A09B85000
heap
page read and write
6C0000
heap
page read and write
150000
trusted library allocation
page read and write
6CA000
heap
page read and write
28A09B52000
heap
page read and write
22C82EA0000
remote allocation
page read and write
8BE000
stack
page read and write
2891A7F0000
heap
page read and write
28A090A4000
heap
page read and write
D6B387E000
stack
page read and write
28A09B80000
heap
page read and write
1A0000
unkown
page readonly
265CED30000
heap
page read and write
D6B347B000
stack
page read and write
281A8F60000
trusted library allocation
page read and write
28A090BE000
heap
page read and write
53E000
stack
page read and write
28A09B59000
heap
page read and write
281A90CB000
heap
page read and write
2891AA3C000
heap
page read and write
1C9000
unkown
page readonly
22C82EA0000
remote allocation
page read and write
28A09B02000
heap
page read and write
B20000
heap
page read and write
D6B357C000
stack
page read and write
28A09B2A000
heap
page read and write
5C0000
heap
page read and write
281A9000000
heap
page read and write
D6B377D000
stack
page read and write
265CEE3D000
heap
page read and write
DA9AB7D000
stack
page read and write
28A090AF000
heap
page read and write
28A0905D000
heap
page read and write
28A09086000
heap
page read and write
9BE000
stack
page read and write
23DD3C50000
heap
page read and write
F39AD7C000
stack
page read and write
28A09B74000
heap
page read and write
D76FFB000
stack
page read and write
15404F02000
heap
page read and write
28A09026000
heap
page read and write
23DD3E7F000
heap
page read and write
CD1E1FE000
stack
page read and write
B2100FA000
stack
page read and write
150000
trusted library allocation
page read and write
CD1E37E000
stack
page read and write
28A09B29000
heap
page read and write
CD1E77F000
stack
page read and write
28A09B57000
heap
page read and write
28A09023000
heap
page read and write
4FC000
stack
page read and write
28A09B55000
heap
page read and write
F39AF7D000
stack
page read and write
CD1E87B000
stack
page read and write
28A09B4D000
heap
page read and write
28A09B33000
heap
page read and write
9BE000
stack
page read and write
540000
remote allocation
page read and write
23DD3D50000
trusted library allocation
page read and write
28A090BA000
heap
page read and write
28A09B82000
heap
page read and write
15404DC0000
heap
page read and write
B21067E000
stack
page read and write
28A09B52000
heap
page read and write
28A09B6F000
heap
page read and write
28A09B62000
heap
page read and write
28A09B52000
heap
page read and write
23DD3E75000
heap
page read and write
2891AB02000
heap
page read and write
265CEE69000
heap
page read and write
23DD3E66000
heap
page read and write
28A09B2C000
heap
page read and write
1BC000
unkown
page readonly
DA9AE7F000
stack
page read and write
6CA000
heap
page read and write
28A09B00000
heap
page read and write
28A09B40000
heap
page read and write
28A09B59000
heap
page read and write
28A090AF000
heap
page read and write
CD1DCEB000
stack
page read and write
5C0000
heap
page read and write
1C9000
unkown
page readonly
22C82629000
heap
page read and write
1A0000
unkown
page readonly
28A09B53000
heap
page read and write
28A09A00000
heap
page read and write
CD1E47A000
stack
page read and write
265CEE3F000
heap
page read and write
28A09B30000
heap
page read and write
22C82EA0000
remote allocation
page read and write
F39AFFE000
stack
page read and write
28A09100000
heap
page read and write
6C0000
heap
page read and write
CD1E07F000
stack
page read and write
D76DFB000
stack
page read and write
265CEE00000
heap
page read and write
23DD3E41000
heap
page read and write
15404D50000
heap
page read and write
281A9013000
heap
page read and write
D6B32FC000
stack
page read and write
28A09B53000
heap
page read and write
281A9102000
heap
page read and write
28A090A7000
heap
page read and write
15404E7B000
heap
page read and write
281A90BA000
heap
page read and write
22C82570000
heap
page read and write
23DD3E3E000
heap
page read and write
22C82641000
heap
page read and write
23DD4602000
trusted library allocation
page read and write
2891AA02000
heap
page read and write
15404F00000
heap
page read and write
D6B327F000
stack
page read and write
28A09B78000
heap
page read and write
22C82602000
heap
page read and write
22C82600000
heap
page read and write
23DD3E32000
heap
page read and write
23DD3E42000
heap
page read and write
99828FE000
stack
page read and write
265CEDD0000
trusted library allocation
page read and write
1A0000
unkown
page readonly
2891AA60000
heap
page read and write
28A09B5F000
heap
page read and write
15404E68000
heap
page read and write
28A09091000
heap
page read and write
28A08FE0000
trusted library allocation
page read and write
15405802000
trusted library allocation
page read and write
23DD3E6B000
heap
page read and write
F39AA7B000
stack
page read and write
1C4000
unkown
page read and write
28A09B65000
heap
page read and write
6CA000
heap
page read and write
28A09094000
heap
page read and write
DA9AF7F000
stack
page read and write
1C4000
unkown
page write copy
23DD3E46000
heap
page read and write
B21057E000
stack
page read and write
1C9000
unkown
page readonly
2891B202000
trusted library allocation
page read and write
23DD3E2E000
heap
page read and write
22C82613000
heap
page read and write
19E000
stack
page read and write
9982AFE000
stack
page read and write
DA9A32C000
stack
page read and write
D6B2BDB000
stack
page read and write
28A09B52000
heap
page read and write
F39B17E000
stack
page read and write
281A8EC0000
heap
page read and write
2891AB00000
heap
page read and write
23DD3E69000
heap
page read and write
28A09B57000
heap
page read and write
2891AA0B000
heap
page read and write
80000
unkown
page read and write
4FC000
stack
page read and write
15404F13000
heap
page read and write
28A09B30000
heap
page read and write
15404E58000
heap
page read and write
28A08FB0000
heap
page read and write
23DD3E4C000
heap
page read and write
53E000
stack
page read and write
28A09B40000
heap
page read and write
EC000
stack
page read and write
CD1E57F000
stack
page read and write
23DD3E6E000
heap
page read and write
150000
trusted library allocation
page read and write
28A090B3000
heap
page read and write
1A0000
unkown
page readonly
28A09B2F000
heap
page read and write
28A09B80000
heap
page read and write
28A09B56000
heap
page read and write
23DD3E30000
heap
page read and write
28A09B7A000
heap
page read and write
F39ACFE000
stack
page read and write
23DD3E85000
heap
page read and write
265CF802000
trusted library allocation
page read and write
28A09B52000
heap
page read and write
9BE000
stack
page read and write
1C4000
unkown
page read and write
281A9113000
heap
page read and write
1BC000
unkown
page readonly
28A090CA000
heap
page read and write
540000
remote allocation
page read and write
281A9029000
heap
page read and write
265CEE6F000
heap
page read and write
DA9A97C000
stack
page read and write
28A09B57000
heap
page read and write
23DD3E78000
heap
page read and write
281A9B00000
heap
page read and write
22C82702000
heap
page read and write
2891AA29000
heap
page read and write
D76EFB000
stack
page read and write
AB0000
trusted library allocation
page read and write
28A09B29000
heap
page read and write
28A09B5B000
heap
page read and write
28A09B37000
heap
page read and write
2891AA00000
heap
page read and write
22C82659000
heap
page read and write
28A09013000
heap
page read and write
28A09B59000
heap
page read and write
23DD3E49000
heap
page read and write
23DD3E50000
heap
page read and write
1A1000
unkown
page execute read
23DD3E00000
heap
page read and write
28A09113000
heap
page read and write
28A09B52000
heap
page read and write
15404E02000
heap
page read and write
B20000
heap
page read and write
F39B0FD000
stack
page read and write
281A90E1000
heap
page read and write
15404E13000
heap
page read and write
265CEE29000
heap
page read and write
4FC000
stack
page read and write
There are 349 hidden memdumps, click here to show them.