File name:

SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310

Full analysis: https://app.any.run/tasks/08acc28b-4ffe-4405-95b4-ac229fb2c359
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: March 09, 2025, 13:11:56
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
rhadamanthys
stealer
lumma
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

428DEBEAD98E87580B9D650B373DC205

SHA1:

4965FB5C56DE9A62F4EACF49EC9FF523500A31C7

SHA256:

5C9F76F84ADFB563C3073625481286CFB5059A05D12D635EE26E758C6C881A8A

SSDEEP:

49152:iArWI+zip54+opJ4C+OMEMNusqAssNmZzcfCr739y:iAN+zoRoPBZpaisNmZzckb9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RHADAMANTHYS mutex has been found

      • fontdrvhost.exe (PID: 7216)
      • AddInProcess32.exe (PID: 5720)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2196)
    • Connects to the CnC server

      • svchost.exe (PID: 2196)
    • Actions looks like stealing of personal data

      • fontdrvhost.exe (PID: 7516)
      • chrome.exe (PID: 7740)
      • msedge.exe (PID: 8128)
    • RHADAMANTHYS has been detected (SURICATA)

      • fontdrvhost.exe (PID: 7516)
  • SUSPICIOUS

    • Application launched itself

      • AddInProcess32.exe (PID: 7988)
      • chrome.exe (PID: 7740)
      • msedge.exe (PID: 8128)
    • Executes application which crashes

      • AddInProcess32.exe (PID: 5720)
    • The process checks if it is being run in the virtual environment

      • fontdrvhost.exe (PID: 7216)
    • Connects to unusual port

      • fontdrvhost.exe (PID: 7216)
      • fontdrvhost.exe (PID: 7516)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2196)
    • Loads DLL from Mozilla Firefox

      • fontdrvhost.exe (PID: 7516)
    • Searches for installed software

      • fontdrvhost.exe (PID: 7516)
  • INFO

    • Reads the computer name

      • SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe (PID: 5956)
      • AddInProcess32.exe (PID: 7988)
      • AddInProcess32.exe (PID: 6300)
      • chrome.exe (PID: 7740)
      • identity_helper.exe (PID: 3100)
      • msedge.exe (PID: 8128)
    • The sample compiled with english language support

      • SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe (PID: 5956)
    • Disables trace logs

      • SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe (PID: 5956)
      • AddInProcess32.exe (PID: 7988)
    • Checks supported languages

      • SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe (PID: 5956)
      • AddInProcess32.exe (PID: 7988)
      • AddInProcess32.exe (PID: 5720)
      • AddInProcess32.exe (PID: 6300)
      • chrome.exe (PID: 7740)
      • identity_helper.exe (PID: 3100)
      • wmlaunch.exe (PID: 3828)
      • msedge.exe (PID: 8128)
    • Reads the software policy settings

      • SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe (PID: 5956)
      • AddInProcess32.exe (PID: 7988)
      • slui.exe (PID: 7372)
      • AddInProcess32.exe (PID: 6300)
    • Checks proxy server information

      • SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe (PID: 5956)
      • AddInProcess32.exe (PID: 7988)
      • chrome.exe (PID: 7740)
      • msedge.exe (PID: 8128)
    • Reads the machine GUID from the registry

      • SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe (PID: 5956)
      • AddInProcess32.exe (PID: 7988)
      • chrome.exe (PID: 7740)
      • wmlaunch.exe (PID: 3828)
    • Process checks computer location settings

      • chrome.exe (PID: 7740)
      • msedge.exe (PID: 8128)
    • Create files in a temporary directory

      • fontdrvhost.exe (PID: 7516)
      • chrome.exe (PID: 7740)
      • msedge.exe (PID: 8128)
    • Reads Environment values

      • chrome.exe (PID: 7740)
      • msedge.exe (PID: 8128)
      • identity_helper.exe (PID: 3100)
    • Manual execution by a user

      • msedge.exe (PID: 6112)
    • Application launched itself

      • msedge.exe (PID: 6112)
      • msedge.exe (PID: 7772)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1980:04:21 16:31:17+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 80
CodeSize: 988160
InitializedDataSize: 272384
UninitializedDataSize: -
EntryPoint: 0xf324e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 3.0.3.114
ProductVersionNumber: 3.0.3.114
FileFlagsMask: 0x003f
FileFlags: Debug
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: XAppset
FileDescription: XRecovery Installer
FileVersion: 3.0.3.114
InternalName: xrecovery_installer
LegalCopyright: Copyright (C) 2025 XAppset
OriginalFileName: xrecovery_installer.exe
ProductName: XRecovery
ProductVersion: 3.0.3.114
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
191
Monitored processes
53
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
start start securiteinfo.com.trojan.pws.lumma.1819.32341.28310.exe no specs securiteinfo.com.trojan.pws.lumma.1819.32341.28310.exe sppextcomobj.exe no specs slui.exe addinprocess32.exe #RHADAMANTHYS addinprocess32.exe addinprocess32.exe no specs addinprocess32.exe slui.exe no specs #RHADAMANTHYS fontdrvhost.exe werfault.exe no specs #RHADAMANTHYS fontdrvhost.exe #LUMMA svchost.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs wmlaunch.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
632"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1852,i,3719639938734050509,8611881841571375660,262144 --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
720"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3168 --field-trial-handle=2308,i,16710637559744958592,12777592699287122166,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Exit code:
3221226029
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\identity_helper.exe
c:\windows\system32\ntdll.dll
924"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3376 --field-trial-handle=2308,i,16710637559744958592,12777592699287122166,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1180"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeAddInProcess32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
AddInProcess.exe
Exit code:
4294967295
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\addinprocess32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1452C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1812"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x290,0x294,0x298,0x288,0x2a0,0x7ffc88935fd8,0x7ffc88935fe4,0x7ffc88935ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2040"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=4052 --field-trial-handle=2308,i,16710637559744958592,12777592699287122166,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2568"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x290,0x294,0x298,0x288,0x2a0,0x7ffc88935fd8,0x7ffc88935fe4,0x7ffc88935ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2616"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2276 --field-trial-handle=2280,i,8001109341055730577,16556224240379347845,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
13 471
Read events
13 414
Write events
56
Delete events
1

Modification events

(PID) Process:(5956) SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5956) SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5956) SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5956) SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5956) SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(5956) SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(5956) SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(5956) SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5956) SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5956) SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
12
Suspicious files
283
Text files
82
Unknown types
0

Dropped files

PID
Process
Filename
Type
7740chrome.exeC:\Users\admin\AppData\Local\Temp\chr389C.tmp\Default\History-journal
MD5:
SHA256:
7740chrome.exeC:\Users\admin\AppData\Local\Temp\chr389C.tmp\Default\READMEtext
MD5:883D62ACD72005F3AD7A14500D482033
SHA256:C43668EEC4A8D88A5B3A06A84F8846853FE33E54293C2DB56899A5A5DFB4D944
7740chrome.exeC:\Users\admin\AppData\Local\Temp\chr389C.tmp\Default\00bc7fbf-c84d-4b84-bc38-cf9a6a5feb2c.tmpbinary
MD5:5058F1AF8388633F609CADB75A75DC9D
SHA256:
7740chrome.exeC:\Users\admin\AppData\Local\Temp\chr389C.tmp\Crashpad\settings.datbinary
MD5:3CD15916947DF6609D29E9D6370BC319
SHA256:6A4B412AA9D9CB7E722A004CC206DF83C18A90DB70102E918DD8EB37DBD99FF7
7740chrome.exeC:\Users\admin\AppData\Local\Temp\chr389C.tmp\Default\Code Cache\js\indexbinary
MD5:54CB446F628B2EA4A5BCE5769910512E
SHA256:FBCFE23A2ECB82B7100C50811691DDE0A33AA3DA8D176BE9882A9DB485DC0F2D
7740chrome.exeC:\Users\admin\AppData\Local\Temp\chr389C.tmp\Default\Extension Rules\000001.dbtmptext
MD5:46295CAC801E5D4857D09837238A6394
SHA256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
7740chrome.exeC:\Users\admin\AppData\Local\Temp\chr389C.tmp\Default\Code Cache\js\index-dir\temp-indexbinary
MD5:A2BE971BD86D7A23EBA8C90A02B021EE
SHA256:47DDFFBE442B6F378C46CD0B6455555FA52C5812610C470BFCC56EEA71074174
7740chrome.exeC:\Users\admin\AppData\Local\Temp\chr389C.tmp\Default\Code Cache\wasm\indexbinary
MD5:54CB446F628B2EA4A5BCE5769910512E
SHA256:FBCFE23A2ECB82B7100C50811691DDE0A33AA3DA8D176BE9882A9DB485DC0F2D
7740chrome.exeC:\Users\admin\AppData\Local\Temp\chr389C.tmp\Default\Code Cache\wasm\index-dir\the-real-indexbinary
MD5:A2BE971BD86D7A23EBA8C90A02B021EE
SHA256:47DDFFBE442B6F378C46CD0B6455555FA52C5812610C470BFCC56EEA71074174
7740chrome.exeC:\Users\admin\AppData\Local\Temp\chr389C.tmp\Default\Code Cache\js\index-dir\the-real-indexbinary
MD5:A2BE971BD86D7A23EBA8C90A02B021EE
SHA256:47DDFFBE442B6F378C46CD0B6455555FA52C5812610C470BFCC56EEA71074174
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
60
DNS requests
59
Threats
14

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7288
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
8112
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8112
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5956
SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe
91.134.10.168:443
i.ibb.co
OVH SAS
FR
shared
3216
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.159.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
7288
backgroundTaskHost.exe
20.223.36.55:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7288
backgroundTaskHost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 142.250.186.142
whitelisted
i.ibb.co
  • 91.134.10.168
  • 91.134.10.182
  • 91.134.10.127
  • 91.134.82.79
  • 91.134.9.159
  • 91.134.9.160
shared
client.wns.windows.com
  • 40.113.103.199
whitelisted
login.live.com
  • 20.190.159.129
  • 20.190.159.131
  • 20.190.159.2
  • 20.190.159.71
  • 20.190.159.64
  • 40.126.31.69
  • 20.190.159.128
  • 20.190.159.23
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

PID
Process
Class
Message
5956
SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe
Not Suspicious Traffic
INFO [ANY.RUN] Image hosting service ImgBB
7988
AddInProcess32.exe
Not Suspicious Traffic
INFO [ANY.RUN] Image hosting service ImgBB
7216
fontdrvhost.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 4
2196
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (uncertainyelemz .bet)
2196
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (paleboreei .biz)
2196
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (hobbyedsmoker .live)
2196
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (subawhipnator .life)
2196
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (dsfljsdfjewf .info)
2196
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (deaddereaste .today)
2196
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (privileggoe .live)
No debug info