| File name: | steam_auto_cracker_gui.exe |
| Full analysis: | https://app.any.run/tasks/3d844002-6842-4460-9c9e-6080e4ceeb28 |
| Verdict: | Malicious activity |
| Analysis date: | December 27, 2024, 15:06:57 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 7 sections |
| MD5: | 9B13D23586BC94A9A03A74C703544D2F |
| SHA1: | 404294664583896FC4E2FA82EFCF30CEA4D24A26 |
| SHA256: | 4544DD9CCCE49465D264ED6725036551C32975AB96014322F65499B79497F56A |
| SSDEEP: | 98304:FbX+u8MRtSpupLGPW37nSJq+xI/iuqrW7VTfxTlRplE9bbL/lHe6BISGlbI9SseR:5kYbreI4y |
| .exe | | | InstallShield setup (57.6) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (36.9) |
| .exe | | | Generic Win/DOS Executable (2.6) |
| .exe | | | DOS Executable Generic (2.6) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:08:14 02:04:40+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.34 |
| CodeSize: | 165888 |
| InitializedDataSize: | 108544 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xb310 |
| OSVersion: | 5.2 |
| ImageVersion: | - |
| SubsystemVersion: | 5.2 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 5464 | "C:\Users\admin\AppData\Local\Temp\steam_auto_cracker_gui.exe" | C:\Users\admin\AppData\Local\Temp\steam_auto_cracker_gui.exe | steam_auto_cracker_gui.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 6220 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6228 | C:\WINDOWS\system32\cmd.exe /c "ver" | C:\Windows\System32\cmd.exe | — | steam_auto_cracker_gui.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6396 | "C:\Users\admin\AppData\Local\Temp\steam_auto_cracker_gui.exe" | C:\Users\admin\AppData\Local\Temp\steam_auto_cracker_gui.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6396 | steam_auto_cracker_gui.exe | C:\Users\admin\AppData\Local\Temp\_MEI63962\_bz2.pyd | executable | |
MD5:B024A6F227EAFA8D43EDFC1A560FE651 | SHA256:C0DD9496B19BA9536A78A43A97704E7D4BEF3C901D196ED385E771366682819D | |||
| 6396 | steam_auto_cracker_gui.exe | C:\Users\admin\AppData\Local\Temp\_MEI63962\VCRUNTIME140.dll | executable | |
MD5:F34EB034AA4A9735218686590CBA2E8B | SHA256:9D2B40F0395CC5D1B4D5EA17B84970C29971D448C37104676DB577586D4AD1B1 | |||
| 6396 | steam_auto_cracker_gui.exe | C:\Users\admin\AppData\Local\Temp\_MEI63962\api-ms-win-core-file-l2-1-0.dll | executable | |
MD5:36CBC4736E74209433334B394F8EAAAC | SHA256:90C2C7B8BE4F8B51201C932C08AC1AF643C764EC92C7D6D9A03A6DFBA30955CA | |||
| 6396 | steam_auto_cracker_gui.exe | C:\Users\admin\AppData\Local\Temp\_MEI63962\api-ms-win-core-handle-l1-1-0.dll | executable | |
MD5:36CC4DD2039DBF6E096A29C0CD41BE56 | SHA256:0CF78976F12E91F442E188B819FC686DA59C626019DDD9E3269F24DFA9D202B0 | |||
| 6396 | steam_auto_cracker_gui.exe | C:\Users\admin\AppData\Local\Temp\_MEI63962\api-ms-win-core-file-l1-2-0.dll | executable | |
MD5:D9FB770DF3592B312C812D7A9B50C3C4 | SHA256:764624E3C0BFDAD64540628DE21EE223F8A57F04FB1CC86C69C74CE3B5589279 | |||
| 6396 | steam_auto_cracker_gui.exe | C:\Users\admin\AppData\Local\Temp\_MEI63962\_lzma.pyd | executable | |
MD5:77B78B43D58FE7CE9EB2FBB1420889FA | SHA256:6E571D93CE55D09583EC91C607883A43C1DA3D4D36794D68C6ECD6BEA4AB466A | |||
| 6396 | steam_auto_cracker_gui.exe | C:\Users\admin\AppData\Local\Temp\_MEI63962\_tkinter.pyd | executable | |
MD5:77CF63868CAE43963B69B4561114CD19 | SHA256:313FB33E72028FCC893EC7874E0C825C035CDCEBE1B5B7C7D8D11EF3AD1B354F | |||
| 6396 | steam_auto_cracker_gui.exe | C:\Users\admin\AppData\Local\Temp\_MEI63962\_socket.pyd | executable | |
MD5:CD56F508E7C305D4BFDEB820ECF3A323 | SHA256:9E97B782B55400E5A914171817714BBBC713C0A396E30496C645FC82835E4B34 | |||
| 6396 | steam_auto_cracker_gui.exe | C:\Users\admin\AppData\Local\Temp\_MEI63962\_queue.pyd | executable | |
MD5:328E41B501A51B58644C7C6930B03234 | SHA256:2782CF3C04801EDE65011BE282E99CD34D163B2B2B2333FD3147B33F7D5E72AB | |||
| 6396 | steam_auto_cracker_gui.exe | C:\Users\admin\AppData\Local\Temp\_MEI63962\api-ms-win-core-interlocked-l1-1-0.dll | executable | |
MD5:24E193B2850E4476CCBDFE29FCCC0FAE | SHA256:3D67A733EC8FD6078F9A8EC8AE864583D1A0195E070A088BA1942402E984A8EF | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.155:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
6456 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
1176 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
7044 | SIHClient.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
7044 | SIHClient.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.48.23.155:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5064 | SearchApp.exe | 104.126.37.170:443 | www.bing.com | Akamai International B.V. | DE | unknown |
— | — | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1076 | svchost.exe | 23.218.210.69:443 | go.microsoft.com | AKAMAI-AS | DE | whitelisted |
1176 | svchost.exe | 40.126.32.133:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1176 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
arc.msn.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2192 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |