File name:

Bootstrapper.exe

Full analysis: https://app.any.run/tasks/054d0f2a-be49-4da2-b940-d98242f09d0c
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: July 06, 2025, 01:38:45
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
autoit
lumma
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

5F6445D04A2B17CE1C974B4A47BDE804

SHA1:

76A986FAC07F3AE5E2255740705F56ED9826D026

SHA256:

1BF8FBFC44C5875285AF1653FE8E2CE6EE4BC90BDBF732DF92ADEF21BF1F493B

SSDEEP:

49152:n123ywHdNJlLEJXYmnZB2qL024f61vJUplX8nLbej1MFHCZztMDiWlIzOjIMvXI7:0FJ9EFYKv024y1vcOLk2dCbMLiYIMvbA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • Bootstrapper.exe (PID: 6240)
    • Steals credentials from Web Browsers

      • Govt.com (PID: 4552)
    • LUMMA mutex has been found

      • Govt.com (PID: 4552)
    • Actions looks like stealing of personal data

      • Govt.com (PID: 4552)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Bootstrapper.exe (PID: 6240)
    • Starts CMD.EXE for commands execution

      • Bootstrapper.exe (PID: 6240)
    • Executing commands from a ".bat" file

      • Bootstrapper.exe (PID: 6240)
    • Get information on the list of running processes

      • cmd.exe (PID: 4968)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 4968)
    • The executable file from the user directory is run by the CMD process

      • Govt.com (PID: 4552)
    • Starts application with an unusual extension

      • cmd.exe (PID: 4968)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 4968)
    • There is functionality for taking screenshot (YARA)

      • Govt.com (PID: 4552)
    • Searches for installed software

      • Govt.com (PID: 4552)
  • INFO

    • Reads the computer name

      • Bootstrapper.exe (PID: 6240)
      • extrac32.exe (PID: 4644)
      • Govt.com (PID: 4552)
    • Checks supported languages

      • Bootstrapper.exe (PID: 6240)
      • extrac32.exe (PID: 4644)
      • Govt.com (PID: 4552)
    • Process checks computer location settings

      • Bootstrapper.exe (PID: 6240)
    • Create files in a temporary directory

      • Bootstrapper.exe (PID: 6240)
      • extrac32.exe (PID: 4644)
    • The sample compiled with english language support

      • Bootstrapper.exe (PID: 6240)
    • Reads mouse settings

      • Govt.com (PID: 4552)
    • Reads the software policy settings

      • Govt.com (PID: 4552)
      • slui.exe (PID: 4828)
    • Application launched itself

      • msedge.exe (PID: 2596)
      • chrome.exe (PID: 6188)
      • chrome.exe (PID: 6224)
      • chrome.exe (PID: 6896)
      • chrome.exe (PID: 5780)
      • msedge.exe (PID: 3108)
      • msedge.exe (PID: 1056)
      • msedge.exe (PID: 6724)
      • msedge.exe (PID: 3392)
      • msedge.exe (PID: 2836)
    • Reads the machine GUID from the registry

      • Govt.com (PID: 4552)
    • Checks proxy server information

      • slui.exe (PID: 4828)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:04:10 12:19:23+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 25600
InitializedDataSize: 527872
UninitializedDataSize: 16896
EntryPoint: 0x33e9
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 5.863.3.785
ProductVersionNumber: 5.863.3.785
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: Virtual synthesizer software for electronic music enthusiasts.
CompanyName: WaveCraft Studios Inc.
FileDescription: Virtual synthesizer software for electronic music enthusiasts.
FileVersion: 5.863.3.0785
LegalCopyright: Copyright © WaveCraft Studios Inc. 2018 All rights reserved.
LegalTrademarks: WaveCraftX is a trademark of WaveCraft Studios Inc.
ProductName: WaveCraftX
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
209
Monitored processes
74
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start bootstrapper.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs extrac32.exe no specs findstr.exe no specs #LUMMA govt.com choice.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs slui.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1056"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeGovt.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1296tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1484\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1512"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2024,i,13028017631980482239,6255722555275230979,262144 --variations-seed-version --mojo-platform-channel-handle=1900 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1740"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,5553619064675310528,1433097308711467690,262144 --variations-seed-version=20250221-144540.991000 --mojo-platform-channel-handle=3224 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\133.0.6943.127\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1852"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3524,i,7664728619732986749,739635614799985140,262144 --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1932"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --field-trial-handle=2400,i,13028017631980482239,6255722555275230979,262144 --variations-seed-version --mojo-platform-channel-handle=1916 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\133.0.6943.127\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2040"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3636,i,16904785132279733940,14109823749263442586,262144 --variations-seed-version --mojo-platform-channel-handle=3664 /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2148"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --field-trial-handle=2260,i,400189798954336088,15745799250342451971,262144 --variations-seed-version=20250221-144540.991000 --mojo-platform-channel-handle=1992 /prefetch:3C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2192"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=2280,i,16904785132279733940,14109823749263442586,262144 --variations-seed-version --mojo-platform-channel-handle=2292 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
22 532
Read events
22 486
Write events
46
Delete events
0

Modification events

(PID) Process:(6188) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(6188) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(6188) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(6188) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(6188) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(6224) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(6224) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(6224) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(6224) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(6224) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
10
Suspicious files
112
Text files
161
Unknown types
0

Dropped files

PID
Process
Filename
Type
6240Bootstrapper.exeC:\Users\admin\AppData\Local\Temp\Customize.aifcbinary
MD5:DAE417DC73E65C08040702F0346908F3
SHA256:315F27D308303C1271E9874B96A619DFC2DB29EAD55E6FBC453BACCF7E541E5D
6240Bootstrapper.exeC:\Users\admin\AppData\Local\Temp\Belfast.aifcbinary
MD5:125BCFEF56BF9543128257355C012E83
SHA256:C6BEE0E758426ABD130841883157554C3A3104ACCAD72BE7C24D01DE57E2F58D
6240Bootstrapper.exeC:\Users\admin\AppData\Local\Temp\Pe.aifcbinary
MD5:2272D73E83671CD8FCFEC4AB00367D2A
SHA256:9589C2BF0A6560B6E88F6CA0D179D146B65516B1FE292F549D57A9A18B970F4C
6240Bootstrapper.exeC:\Users\admin\AppData\Local\Temp\Minolta.aifcbinary
MD5:EC1AE56E58475B011A61D59323A04B22
SHA256:7E3353DB9E649DD7D8BB115C41ECFAE63CDC4793B4AAC4B9EF4FF5DB35B20290
6240Bootstrapper.exeC:\Users\admin\AppData\Local\Temp\Mac.aifctext
MD5:3D076546F903B8B17CE91155D48322A4
SHA256:BC0F04A2E51F4363E59AA646BB781EFD7DDAF1427976DBEF11CF98001EF36D72
6240Bootstrapper.exeC:\Users\admin\AppData\Local\Temp\Dave.aifcbinary
MD5:109A24D7210899C46911AFBC2072E67E
SHA256:81870499C10A6B97AEF9999E0CC6E6BA617025EC2C1E49783C5D39EE05B4FF79
4644extrac32.exeC:\Users\admin\AppData\Local\Temp\Perrybinary
MD5:3A6A85BBDDEF219AA30503E64CF3C10C
SHA256:DC1C92F7A729305F27A35005C4D7E85D53B5A83A60F301AE8EF0112A4E11C029
4644extrac32.exeC:\Users\admin\AppData\Local\Temp\Suppliesbinary
MD5:66A2DBF3CD7E61F99E90630D882C894A
SHA256:54E1D5965879216E29D333C733C4A3CE3BB9D5DB6113397C2FC0203159595931
4644extrac32.exeC:\Users\admin\AppData\Local\Temp\Thanksbinary
MD5:75700EE95FDA8AD3815D05033D1C1A2B
SHA256:94A691697614E49BF4C5ECDF6AEC77A491497AE55510AF92C774AF936E44503C
4644extrac32.exeC:\Users\admin\AppData\Local\Temp\Dustbinary
MD5:B1734ECA86FC64E40ABDB9068763E5DC
SHA256:482B13A513A7E8B3A24727E61D120D75A5B1D00378046A7D9F89C290D75A378C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
81
TCP/UDP connections
108
DNS requests
95
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5944
MoUsoCoreWorker.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3980
RUXIMICS.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3980
RUXIMICS.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
200
144.172.115.212:443
https://concvek.shop/gfhj
unknown
binary
29.9 Kb
GET
200
142.250.74.195:443
https://clientservices.googleapis.com/chrome-variations/seed?osname=win&channel=stable&milestone=133
unknown
compressed
61.3 Kb
whitelisted
GET
142.250.185.170:443
https://safebrowsingohttpgateway.googleapis.com/v1/ohttp/hpkekeyconfig?key=AIzaSyA2KlwBX3mkFo30om9LUFYQhpqLoa_BNhE
unknown
POST
200
74.125.206.84:443
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
unknown
text
17 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3980
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3980
RUXIMICS.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 172.217.18.110
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
KsTszTZrynXxvcDDiyihNDKAOg.KsTszTZrynXxvcDDiyihNDKAOg
unknown
concvek.shop
  • 144.172.115.212
unknown
clientservices.googleapis.com
  • 142.250.74.195
whitelisted
safebrowsingohttpgateway.googleapis.com
  • 142.250.186.42
  • 216.58.206.42
  • 142.250.185.106
  • 142.250.186.74
  • 142.250.185.202
  • 142.250.181.234
  • 172.217.23.106
  • 142.250.186.170
  • 142.250.185.138
  • 216.58.212.170
  • 142.250.186.138
  • 142.250.185.74
  • 172.217.16.202
  • 142.250.185.170
  • 142.250.185.234
  • 142.250.74.202
whitelisted
clients2.google.com
  • 142.250.186.142
whitelisted
accounts.google.com
  • 74.125.206.84
whitelisted

Threats

PID
Process
Class
Message
Malware Command and Control Activity Detected
MALWARE [ANY.RUN] Win32/Lumma CnC HTTP Activity observed
Malware Command and Control Activity Detected
MALWARE [ANY.RUN] Win32/Lumma CnC HTTP Activity observed
No debug info