IOC Report
lHHfXU6Y37.exe

loading gif

Files

File Path
Type
Category
Malicious
lHHfXU6Y37.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_lHHfXU6Y37.exe_4289d0cc4794ef2997c7d675cb426ccda579c0_7ceae026_cbacde44-b5eb-4fb9-a198-c9ae2168e41a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER26D0.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 03:48:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER271F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER274F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\lHHfXU6Y37.exe
"C:\Users\user\Desktop\lHHfXU6Y37.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7436 -s 280

URLs

Name
IP
Malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
licendfilteo.site
malicious
studennotediw.stor
malicious
https://sergei-esenin.com/
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
spirittunek.stor
malicious
https://sergei-esenin.com:443/api
unknown
malicious
bathdoomgaz.stor
malicious
trustterwowqm.shop
malicious
dissapoiznw.stor
malicious
eaglepawnoy.stor
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
clearancek.site
malicious
mobbipenju.stor
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=cdfm
unknown
http://store.steampowered.com/privacy_agreement/
unknown
http://upx.sf.net
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://steamcommunity.com/
unknown
https://store.steampowered.com/legal/
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
172.67.206.204
malicious
trustterwowqm.shop
unknown
malicious
licendfilteo.site
unknown
malicious
clearancek.site
unknown
malicious
bg.microsoft.map.fastly.net
199.232.214.172
fp2e7a.wpc.phicdn.net
192.229.221.95
s-part-0032.t-0009.t-msedge.net
13.107.246.60
eaglepawnoy.store
unknown
bathdoomgaz.store
unknown
spirittunek.store
unknown
studennotediw.store
unknown
mobbipenju.store
unknown
dissapoiznw.store
unknown
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
ProgramId
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
FileId
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
LowerCaseLongPath
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
LongPathHash
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
Name
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
OriginalFileName
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
Publisher
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
Version
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
BinFileVersion
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
BinaryType
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
ProductName
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
ProductVersion
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
LinkDate
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
BinProductVersion
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
AppxPackageFullName
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
AppxPackageRelativeId
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
Size
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
Language
\REGISTRY\A\{264edcad-8ec9-80f4-6e4c-f974b9cc4da6}\Root\InventoryApplicationFile\lhhfxu6y37.exe|b1c2010aa258af2b
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3DD000
unkown
page read and write
malicious
A60000
heap
page read and write
C9C000
heap
page read and write
11FF000
stack
page read and write
3D3000
unkown
page readonly
436000
unkown
page read and write
A85000
heap
page read and write
2BBD000
stack
page read and write
E40000
heap
page read and write
1000000
heap
page read and write
9D0000
heap
page read and write
96C000
stack
page read and write
9C0000
heap
page read and write
26FE000
stack
page read and write
A80000
heap
page read and write
1017000
heap
page read and write
BFC000
heap
page read and write
438000
unkown
page readonly
100E000
heap
page read and write
438000
unkown
page readonly
C23000
heap
page read and write
A3E000
stack
page read and write
3D3000
unkown
page readonly
27FD000
stack
page read and write
2E1F000
stack
page read and write
E0E000
stack
page read and write
BD0000
heap
page read and write
B8F000
stack
page read and write
920000
heap
page read and write
2CBE000
stack
page read and write
3B0000
unkown
page readonly
F8E000
stack
page read and write
100A000
heap
page read and write
BE8000
heap
page read and write
3B1000
unkown
page execute read
8FC000
stack
page read and write
FDF000
stack
page read and write
F4E000
stack
page read and write
5BC000
stack
page read and write
BE0000
heap
page read and write
435000
unkown
page execute and read and write
3DD000
unkown
page write copy
25BD000
stack
page read and write
3B0000
unkown
page readonly
C40000
heap
page read and write
45F000
remote allocation
page execute and read and write
BCE000
stack
page read and write
C36000
heap
page read and write
A40000
heap
page read and write
26BD000
stack
page read and write
400000
remote allocation
page execute and read and write
2D1E000
stack
page read and write
3B1000
unkown
page execute read
CFD000
stack
page read and write
C0D000
heap
page read and write
There are 45 hidden memdumps, click here to show them.