IOC Report
TuQlz67byH.exe

loading gif

Files

File Path
Type
Category
Malicious
TuQlz67byH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_TuQlz67byH.exe_d76742b7c7eb12edef8869ab2eace6d431024f4_b43b274e_a43d26ab-ffb2-4ba1-9e25-7cc724e4c613\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER22C2.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 16:47:21 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2331.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2380.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TuQlz67byH.exe
"C:\Users\user\Desktop\TuQlz67byH.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 288

URLs

Name
IP
Malicious
frizzettei.sbs
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
invinjurhey.sbs
malicious
exilepolsiy.sbs
malicious
laddyirekyi.sbs
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
isoplethui.sbs
malicious
bemuzzeki.sbs
malicious
exemplarou.sbs
malicious
wickedneatr.sbs
malicious
https://sergei-esenin.com/api
104.21.53.8
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
http://store.steampowered.com/privacy_agreement/
unknown
https://sergei-esenin.com/
unknown
http://upx.sf.net
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://sergei-esenin.com:443/apifiles/76561199724331900
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://sergei-esenin.com/q
unknown
https://sergei-esenin.com/r
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://sergei-esenin.com/b
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=AeTz
unknown
https://steamcommunity.com/
unknown
https://store.steampowered.com/legal/
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
104.21.53.8
malicious
frizzettei.sbs
unknown
malicious
laddyirekyi.sbs
unknown
malicious
wickedneatr.sbs
unknown
malicious
bemuzzeki.sbs
unknown
malicious
invinjurhey.sbs
unknown
malicious
isoplethui.sbs
unknown
malicious
exilepolsiy.sbs
unknown
malicious
exemplarou.sbs
unknown
malicious
bg.microsoft.map.fastly.net
199.232.210.172
s-part-0044.t-0009.fb-t-msedge.net
13.107.253.72
fp2e7a.wpc.phicdn.net
192.229.221.95
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
104.102.49.254
steamcommunity.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
ProgramId
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
FileId
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
LowerCaseLongPath
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
LongPathHash
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
Name
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
OriginalFileName
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
Publisher
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
Version
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
BinFileVersion
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
BinaryType
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
ProductName
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
ProductVersion
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
LinkDate
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
BinProductVersion
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
AppxPackageFullName
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
AppxPackageRelativeId
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
Size
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
Language
\REGISTRY\A\{d35c16e3-40fd-5944-ee11-d92f4f900c12}\Root\InventoryApplicationFile\tuqlz67byh.exe|36ac35cf5d999442
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
EED000
unkown
page read and write
malicious
26DD000
stack
page read and write
2CEE000
stack
page read and write
AAF000
heap
page read and write
A80000
heap
page read and write
985000
heap
page read and write
45E000
remote allocation
page execute and read and write
AE8000
heap
page read and write
A9C000
heap
page read and write
960000
heap
page read and write
B4B000
heap
page read and write
2E8E000
stack
page read and write
A4E000
stack
page read and write
A60000
heap
page read and write
283D000
stack
page read and write
EC0000
unkown
page readonly
730000
heap
page read and write
EC1000
unkown
page execute read
A88000
heap
page read and write
8FC000
stack
page read and write
AFA000
heap
page read and write
2D2D000
stack
page read and write
5EC000
stack
page read and write
CFE000
stack
page read and write
CBE000
stack
page read and write
B4F000
stack
page read and write
F48000
unkown
page readonly
AC2000
heap
page read and write
2F8F000
stack
page read and write
980000
heap
page read and write
EED000
unkown
page write copy
6FD000
stack
page read and write
273D000
stack
page read and write
25DD000
stack
page read and write
ADD000
heap
page read and write
73A000
heap
page read and write
2BEE000
stack
page read and write
AB4000
heap
page read and write
AD0000
heap
page read and write
380000
heap
page read and write
BBE000
stack
page read and write
2E2E000
stack
page read and write
A0F000
stack
page read and write
73E000
heap
page read and write
F48000
unkown
page readonly
DFF000
stack
page read and write
EC1000
unkown
page execute read
3CE000
stack
page read and write
EC0000
unkown
page readonly
EE3000
unkown
page readonly
AE4000
heap
page read and write
950000
heap
page read and write
830000
heap
page read and write
AF4000
heap
page read and write
F46000
unkown
page read and write
EE3000
unkown
page readonly
AEB000
heap
page read and write
31C000
stack
page read and write
26F0000
heap
page read and write
370000
heap
page read and write
F45000
unkown
page execute and read and write
There are 52 hidden memdumps, click here to show them.