IOC Report
SecuriteInfo.com.Win32.PWSX-gen.19404.14810.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.PWSX-gen.19404.14810.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_c086986ef72da566936e540c9d0207bf0492b1a_cf265dec_7a4679c3-3ada-41cb-944a-a855ef24c584\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3787.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 19:53:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER37C7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER37F7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.19404.14810.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.19404.14810.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 272

URLs

Name
IP
Malicious
frizzettei.sbs
malicious
https://steamcommunity.com/profiles/76561199724331900
92.122.104.90
malicious
invinjurhey.sbs
malicious
exilepolsiy.sbs
malicious
laddyirekyi.sbs
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
isoplethui.sbs
malicious
bemuzzeki.sbs
malicious
https://steamcommunity.com/profiles/76561199724331900koF?
unknown
malicious
exemplarou.sbs
malicious
wickedneatr.sbs
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=cdfm
unknown
https://store.steampower
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.akamai.steamstatic.com/
unknown
https://sergei-esenin.com/
unknown
https://recaptcha.net
unknown
http://upx.sf.net
unknown
https://help.steampowe
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://sketchfab.com
unknown
https://recaptcha.net/recaptcha/;
unknown
http://127.0.0.1:27060
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://store.steampowered.com
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://www.google.com/recaptcha/
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/3
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
There are 36 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
92.122.104.90
malicious
sergei-esenin.com
172.67.206.204
malicious
frizzettei.sbs
unknown
malicious
laddyirekyi.sbs
unknown
malicious
wickedneatr.sbs
unknown
malicious
bemuzzeki.sbs
unknown
malicious
invinjurhey.sbs
unknown
malicious
isoplethui.sbs
unknown
malicious
exilepolsiy.sbs
unknown
malicious
exemplarou.sbs
unknown
malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45
time.windows.com
unknown
There are 2 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
92.122.104.90
steamcommunity.com
European Union
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
ProgramId
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
FileId
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
LowerCaseLongPath
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
LongPathHash
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
Name
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
OriginalFileName
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
Publisher
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
Version
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
BinFileVersion
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
BinaryType
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
ProductName
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
ProductVersion
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
LinkDate
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
BinProductVersion
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
AppxPackageFullName
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
AppxPackageRelativeId
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
Size
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
Language
\REGISTRY\A\{75b03325-8a13-2a75-92b4-0c705e7a683a}\Root\InventoryApplicationFile\securiteinfo.com|a2df3a1e4f684046
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
3AD000
unkown
page read and write
malicious
405000
unkown
page execute and read and write
3AD000
unkown
page write copy
E3C000
stack
page read and write
3A3000
unkown
page readonly
FB0000
heap
page read and write
408000
unkown
page readonly
117B000
heap
page read and write
3A3000
unkown
page readonly
158F000
stack
page read and write
FCE000
stack
page read and write
11AF000
heap
page read and write
1110000
heap
page read and write
136F000
stack
page read and write
F80000
heap
page read and write
1010000
heap
page read and write
1162000
heap
page read and write
1139000
heap
page read and write
348E000
stack
page read and write
2F40000
heap
page read and write
112C000
heap
page read and write
1170000
heap
page read and write
100E000
stack
page read and write
406000
unkown
page read and write
FA0000
heap
page read and write
148E000
stack
page read and write
381000
unkown
page execute read
113E000
heap
page read and write
130E000
stack
page read and write
134E000
stack
page read and write
408000
unkown
page readonly
117E000
heap
page read and write
2D30000
heap
page read and write
1134000
heap
page read and write
F3D000
stack
page read and write
10FE000
stack
page read and write
FE0000
heap
page read and write
1155000
heap
page read and write
1118000
heap
page read and write
35DF000
stack
page read and write
1152000
heap
page read and write
2F1D000
stack
page read and write
304D000
stack
page read and write
144F000
stack
page read and write
F70000
heap
page read and write
2ECD000
stack
page read and write
380000
unkown
page readonly
146F000
stack
page read and write
381000
unkown
page execute read
34DE000
stack
page read and write
11C4000
heap
page read and write
380000
unkown
page readonly
2E8C000
stack
page read and write
2D8D000
stack
page read and write
117A000
heap
page read and write
F3C000
stack
page read and write
E3C000
stack
page read and write
FE5000
heap
page read and write
45E000
remote allocation
page execute and read and write
There are 50 hidden memdumps, click here to show them.