File name:

164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.zip

Full analysis: https://app.any.run/tasks/a8e5903f-8a9b-4ba8-ae81-34160c7420eb
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: November 14, 2025, 09:58:16
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
auto
lumma
stealer
autoit
anti-evasion
rhadamanthys
Indicators:
MIME: application/zip
File info: Zip archive data, at least v5.1 to extract, compression method=AES Encrypted
MD5:

0F293089EEF06714EA06F1D7F6B48E0D

SHA1:

E254B33EFB2A28ADD4852CB9330F72F927E93E97

SHA256:

AB5FEFCADC5F5832E4A14BC73A435297E3B1197F2C7BA25368F7DB512CB0A8CD

SSDEEP:

196608:r7wZwr+pSX/wivGRRBpXVyc8fWKdGOulmOWNX67duok:rUSypDpXVVQ5d5LlHok

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA has been found (auto)

      • WinRAR.exe (PID: 5580)
  • SUSPICIOUS

    • Executing commands from a ".bat" file

      • 164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.exe (PID: 4080)
    • Starts CMD.EXE for commands execution

      • 164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.exe (PID: 4080)
    • Get information on the list of running processes

      • cmd.exe (PID: 2284)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 2284)
    • Starts application with an unusual extension

      • cmd.exe (PID: 2284)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 2284)
    • The executable file from the user directory is run by the CMD process

      • Tvs.scr (PID: 4644)
    • Executes application which crashes

      • Tvs.scr (PID: 1128)
    • The process checks if it is being run in the virtual environment

      • OpenWith.exe (PID: 5692)
  • INFO

    • Checks supported languages

      • 164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.exe (PID: 4080)
      • extrac32.exe (PID: 6120)
      • Tvs.scr (PID: 4644)
      • Tvs.scr (PID: 1128)
    • Manual execution by a user

      • 164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.exe (PID: 4080)
      • Tvs.scr (PID: 1128)
    • Reads the computer name

      • extrac32.exe (PID: 6120)
      • Tvs.scr (PID: 4644)
    • Create files in a temporary directory

      • 164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.exe (PID: 4080)
      • extrac32.exe (PID: 6120)
    • Reads mouse settings

      • Tvs.scr (PID: 4644)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 51
ZipBitFlag: 0x0003
ZipCompression: Unknown (99)
ZipModifyDate: 2025:11:01 18:28:52
ZipCRC: 0x0566160f
ZipCompressedSize: 17164639
ZipUncompressedSize: 33968128
ZipFileName: 164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.exe
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
158
Monitored processes
16
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start winrar.exe no specs 164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.exe no specs checknetisolation.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs extrac32.exe no specs findstr.exe no specs tvs.scr no specs tvs.scr waitfor.exe no specs openwith.exe werfault.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1128C:\Users\admin\AppData\Local\Temp\IXP000.TMP\800530\Tvs.scr C:\Users\admin\AppData\Local\Temp\IXP000.TMP\800530\Tvs.scr
explorer.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Exit code:
3221225477
Version:
3, 3, 17, 0
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\800530\tvs.scr
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1264findstr /V "Skip" Attending C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
1300CheckNetIsolation.exeC:\Windows\System32\CheckNetIsolation.exe164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
AppContainer Network Isolation Diagnostic Tool
Exit code:
87
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\checknetisolation.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
2060\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2284cmd /c move Respondent.psd Respondent.psd.bat && Respondent.psd.batC:\Windows\System32\cmd.exe164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
3032findstr "bdservicehost ekrn AvastUI SophosHealth AVGUI nsWscSvc" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
3236waitfor /T 5 eYYQFFTIIQURTKyXPqXC:\Windows\System32\waitfor.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
waitfor - wait/send a signal over a network
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\waitfor.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
3684\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeCheckNetIsolation.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4080"C:\Users\admin\Desktop\164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.exe" C:\Users\admin\Desktop\164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4568tasklist C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
6 207
Read events
6 197
Write events
10
Delete events
0

Modification events

(PID) Process:(5580) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(5580) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(5580) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5580) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5580) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5580) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.zip
(PID) Process:(5580) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5580) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5580) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5580) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
0
Suspicious files
21
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
4080164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Chevy.psdbinary
MD5:D6594FC6429EE09988174388B7B84739
SHA256:97FB3DBB72AD59275D71087400329038778B50E116B8EE9CE1AEF4C7FFEDE2E3
4080164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Fda.psdbinary
MD5:280002D1843174FFD7A57C096D5F133F
SHA256:CBE7EA7A5F3C7C4E90060521DD0E256107EC9F3E0C43F8CC61E02454547D6EB9
4080164cf907a514a586ed298d4194ceef8d7a1876e7eb091e41c9466611ad9daab8.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Swing.psdbinary
MD5:2BBAD57F9829F9C1C5D4D915ED7410D9
SHA256:8287D24A90B7CD8FA286DCF53086419FFF1739C7AD2FF0BBCCB3A60C760FD1D4
2284cmd.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Respondent.psd.battext
MD5:2B131140BBC896FD81E58910866DBB93
SHA256:08FEDCF2D3131F5A5B13A6632667C6EE914D5E53A3EF69CDB58A69AF36B4939F
6120extrac32.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Presentedbinary
MD5:692A43FDFF675D73B7A17B392D63C66F
SHA256:9F67FB323B7BC55FE0C9687779CC768C078CE3285149251F037959FD85DE5565
6120extrac32.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Avonbinary
MD5:406E2CAD1703BB61A3F1921DFD045E6E
SHA256:16F5D3343F4ADA77DB96F8D42E3880E4341B5694E35232B350533CE32FE97E15
6120extrac32.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Surgicalbinary
MD5:0149ADD902ADAA30263487508CB62BE1
SHA256:1D2EA9468BF82DB1B35DBDE01B0CE58A2C4C9703D9185EC2607ABC73F3B332E5
6120extrac32.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Mentbinary
MD5:437721419863AD35077DF57149E169A4
SHA256:C4A07B7757FABCA2F5B462CD2C5B775E878A7DEF4110729B67735E3CC83DC513
6120extrac32.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Bakerbinary
MD5:67D5F51BFF253D495169023BE14AD9DE
SHA256:C1CAB6C6C1033A585B62C5CBD63772A9F4BC32465F628158D05DA0C598D66F72
6120extrac32.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Murderbinary
MD5:3074B271342E4D2FF8A9597697132FF0
SHA256:C5EF7F21D4966440DA160C19AB209957C0CC6B4CF24A026B2F3C2BF523410389
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
30
TCP/UDP connections
46
DNS requests
13
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
404
49.13.77.253:443
https://49.13.77.253/RST2.srf
unknown
341 b
whitelisted
POST
404
49.13.77.253:443
https://49.13.77.253/RST2.srf
unknown
341 b
whitelisted
POST
404
49.13.77.253:443
https://49.13.77.253/RST2.srf
unknown
341 b
whitelisted
POST
404
49.13.77.253:443
https://49.13.77.253/RST2.srf
unknown
341 b
whitelisted
POST
404
49.13.77.253:443
https://49.13.77.253/RST2.srf
unknown
341 b
whitelisted
POST
404
49.13.77.253:443
https://49.13.77.253/RST2.srf
unknown
341 b
whitelisted
POST
404
49.13.77.253:443
https://49.13.77.253/RST2.srf
unknown
341 b
whitelisted
POST
404
49.13.77.253:443
https://49.13.77.253/RST2.srf
unknown
341 b
whitelisted
POST
404
49.13.77.253:443
https://49.13.77.253/RST2.srf
unknown
341 b
whitelisted
POST
404
49.13.77.253:443
https://49.13.77.253/RST2.srf
unknown
341 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5232
svchost.exe
40.126.32.140:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2972
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5596
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5232
svchost.exe
20.190.160.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3236
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5524
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4244
SIHClient.exe
74.178.240.61:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4244
SIHClient.exe
52.165.164.15:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.126.32.140
  • 20.190.160.130
  • 40.126.32.74
  • 40.126.32.76
  • 40.126.32.68
  • 20.190.160.128
  • 20.190.160.2
  • 20.190.160.4
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.46
whitelisted
ZVFVtcVCsVZDOyLbtlvVUO.ZVFVtcVCsVZDOyLbtlvVUO
  • 49.13.77.253
unknown
slscr.update.microsoft.com
  • 74.178.240.61
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
  • 2a01:111:f100:a000::4134:4847
whitelisted
15.164.165.52.in-addr.arpa
whitelisted
7.4.8.4.4.3.1.4.0.0.0.0.0.0.0.0.0.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa
whitelisted
activation-v2.sls.microsoft.com
  • 4.154.185.43
whitelisted

Threats

PID
Process
Class
Message
A Network Trojan was detected
MALWARE [ANY.RUN] Win32/Rhadamanthys Stage Payload HTTP Request outbound
A Network Trojan was detected
MALWARE [ANY.RUN] Win32/Rhadamanthys Stage Payload HTTP Request outbound
A Network Trojan was detected
MALWARE [ANY.RUN] Win32/Rhadamanthys Stage Payload HTTP Request outbound
A Network Trojan was detected
MALWARE [ANY.RUN] Win32/Rhadamanthys Stage Payload HTTP Request outbound
No debug info