IOC Report
SecuriteInfo.com.Win32.PWSX-gen.27846.23954.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.PWSX-gen.27846.23954.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_335a9b229b3b25918e3672cc8075151943f39_433d2070_d8b19c67-20a4-4e5a-8f2c-6bed9af31788\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F4E.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 20:45:12 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F9D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1FCD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27846.23954.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27846.23954.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6036 -s 272

URLs

Name
IP
Malicious
frizzettei.sbs
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
invinjurhey.sbs
malicious
exilepolsiy.sbs
malicious
laddyirekyi.sbs
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
isoplethui.sbs
malicious
bemuzzeki.sbs
malicious
exemplarou.sbs
malicious
wickedneatr.sbs
malicious
https://sergei-esenin.com/api
104.21.53.8
malicious
https://sergei-esenin.com/E
unknown
https://sergei-esenin.com/GG
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://community.akam
unknown
https://steamcommunity.com:443/profiles/76561199724331900
unknown
https://sergei-esenin.com/
unknown
https://sergei-esenin.com/apih
unknown
https://wickedneatr.sbs/api
unknown
http://upx.sf.net
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=qu5K
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vq
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilevl
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://community.akamai.steamstatic.co
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_resp&
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://avatars.akamai.steamstatic
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamsta
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
https://sergei-esenin.com/=#
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
104.21.53.8
malicious
frizzettei.sbs
unknown
malicious
laddyirekyi.sbs
unknown
malicious
wickedneatr.sbs
unknown
malicious
bemuzzeki.sbs
unknown
malicious
invinjurhey.sbs
unknown
malicious
isoplethui.sbs
unknown
malicious
exilepolsiy.sbs
unknown
malicious
exemplarou.sbs
unknown
malicious
bg.microsoft.map.fastly.net
199.232.210.172
s-part-0017.t-0009.t-msedge.net
13.107.246.45
fp2e7a.wpc.phicdn.net
192.229.221.95
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
104.102.49.254
steamcommunity.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
ProgramId
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
FileId
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
LowerCaseLongPath
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
LongPathHash
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
Name
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
OriginalFileName
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
Publisher
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
Version
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
BinFileVersion
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
BinaryType
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
ProductName
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
ProductVersion
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
LinkDate
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
BinProductVersion
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
AppxPackageFullName
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
AppxPackageRelativeId
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
Size
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
Language
\REGISTRY\A\{b251eeb6-2add-b917-712e-f0f42ad17e31}\Root\InventoryApplicationFile\securiteinfo.com|ef3ab1acbf105ad3
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00F99FC9724
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F1D000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
F76000
unkown
page read and write
1261000
heap
page read and write
45E000
remote allocation
page execute and read and write
F78000
unkown
page readonly
F13000
unkown
page readonly
12BA000
heap
page read and write
107F000
stack
page read and write
F1D000
unkown
page write copy
382F000
stack
page read and write
2E20000
heap
page read and write
372E000
stack
page read and write
118C000
stack
page read and write
960000
heap
page read and write
E00000
heap
page read and write
117A000
heap
page read and write
1170000
heap
page read and write
EF1000
unkown
page execute read
F75000
unkown
page execute and read and write
90D000
stack
page read and write
2F2D000
stack
page read and write
CFD000
stack
page read and write
1245000
heap
page read and write
313D000
stack
page read and write
2F30000
heap
page read and write
1315000
heap
page read and write
35CD000
stack
page read and write
1200000
heap
page read and write
EF0000
unkown
page readonly
303D000
stack
page read and write
1242000
heap
page read and write
142E000
stack
page read and write
136F000
stack
page read and write
126B000
heap
page read and write
122F000
heap
page read and write
970000
heap
page read and write
11F0000
heap
page read and write
1208000
heap
page read and write
124F000
heap
page read and write
2E7D000
stack
page read and write
156E000
stack
page read and write
122A000
heap
page read and write
F13000
unkown
page readonly
F78000
unkown
page readonly
9BE000
stack
page read and write
121C000
heap
page read and write
127E000
heap
page read and write
EF1000
unkown
page execute read
1300000
heap
page read and write
1310000
heap
page read and write
166F000
stack
page read and write
EF0000
unkown
page readonly
152F000
stack
page read and write
36CE000
stack
page read and write
2EBE000
stack
page read and write
117E000
heap
page read and write
1263000
heap
page read and write
9FE000
stack
page read and write
357E000
stack
page read and write
108C000
stack
page read and write
There are 51 hidden memdumps, click here to show them.