URL:

https://sites.google.com/view/exlauncher69/download

Full analysis: https://app.any.run/tasks/134a505a-e46d-452e-b371-2f593f14a9d5
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 18, 2025, 23:51:22
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
loader
opendir
autoit
Indicators:
MD5:

D6047A3BDF80E4D432B3DECCDE954FD5

SHA1:

985BA7853CC0A81640558A8AC770C52180860793

SHA256:

C3BC1B38D43A77EA73FEE2915E1D8C3DE3D6F0941D1E5E9D26BFC02181F9DBE3

SSDEEP:

3:N8BhLJ3u1ZeGSvBzp:2J+Pg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • vs-game-force-sof.exe (PID: 3288)
      • vs-game-force-sof.exe (PID: 1856)
      • 193TQNXGYIQ2SY63110RG2F2UJZEEBE.exe (PID: 1804)
      • XFJRY79UHCB1AWV9904CQY8R.exe (PID: 1400)
      • G175BK9D4LF9TFY72C4MBDZ7V6CW.exe (PID: 6252)
      • EKROQMZ4B5WHBOEU01DPGHCTQZAX.exe (PID: 6660)
    • LUMMA has been detected (SURICATA)

      • vs-game-force-sof.exe (PID: 3288)
      • vs-game-force-sof.exe (PID: 1856)
    • Actions looks like stealing of personal data

      • vs-game-force-sof.exe (PID: 3288)
      • vs-game-force-sof.exe (PID: 1856)
    • LUMMA mutex has been found

      • vs-game-force-sof.exe (PID: 3288)
      • vs-game-force-sof.exe (PID: 1856)
    • Steals credentials from Web Browsers

      • vs-game-force-sof.exe (PID: 3288)
      • vs-game-force-sof.exe (PID: 1856)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 3544)
      • powershell.exe (PID: 6072)
    • Changes powershell execution policy (Bypass)

      • vs-game-force-sof.exe (PID: 3288)
      • vs-game-force-sof.exe (PID: 1856)
    • Create files in the Startup directory

      • cmd.exe (PID: 7088)
    • Changes the autorun value in the registry

      • Humor.com (PID: 6704)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 5096)
      • WinRAR.exe (PID: 7052)
      • 193TQNXGYIQ2SY63110RG2F2UJZEEBE.exe (PID: 1804)
      • XFJRY79UHCB1AWV9904CQY8R.exe (PID: 1400)
      • G175BK9D4LF9TFY72C4MBDZ7V6CW.exe (PID: 6252)
      • EKROQMZ4B5WHBOEU01DPGHCTQZAX.exe (PID: 6660)
    • Searches for installed software

      • vs-game-force-sof.exe (PID: 3288)
      • vs-game-force-sof.exe (PID: 1856)
    • Application launched itself

      • WinRAR.exe (PID: 5096)
      • cmd.exe (PID: 6740)
      • cmd.exe (PID: 6536)
      • Humor.com (PID: 6880)
      • Humor.com (PID: 6344)
    • Executable content was dropped or overwritten

      • vs-game-force-sof.exe (PID: 3288)
      • Humor.com (PID: 6880)
      • vs-game-force-sof.exe (PID: 1856)
      • dllhost.exe (PID: 6212)
    • Checks Windows Trust Settings

      • 193TQNXGYIQ2SY63110RG2F2UJZEEBE.exe (PID: 1804)
      • G175BK9D4LF9TFY72C4MBDZ7V6CW.exe (PID: 6252)
    • Starts POWERSHELL.EXE for commands execution

      • vs-game-force-sof.exe (PID: 3288)
      • vs-game-force-sof.exe (PID: 1856)
    • The process executes Powershell scripts

      • vs-game-force-sof.exe (PID: 3288)
      • vs-game-force-sof.exe (PID: 1856)
    • Process requests binary or script from the Internet

      • vs-game-force-sof.exe (PID: 3288)
      • vs-game-force-sof.exe (PID: 1856)
      • dllhost.exe (PID: 6212)
    • Potential Corporate Privacy Violation

      • vs-game-force-sof.exe (PID: 3288)
      • vs-game-force-sof.exe (PID: 1856)
      • dllhost.exe (PID: 6212)
    • Executing commands from ".cmd" file

      • XFJRY79UHCB1AWV9904CQY8R.exe (PID: 1400)
      • EKROQMZ4B5WHBOEU01DPGHCTQZAX.exe (PID: 6660)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 6740)
      • cmd.exe (PID: 6536)
    • Starts CMD.EXE for commands execution

      • XFJRY79UHCB1AWV9904CQY8R.exe (PID: 1400)
      • cmd.exe (PID: 6740)
      • EKROQMZ4B5WHBOEU01DPGHCTQZAX.exe (PID: 6660)
      • cmd.exe (PID: 6536)
    • Get information on the list of running processes

      • cmd.exe (PID: 6740)
      • cmd.exe (PID: 6536)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 6740)
      • Humor.com (PID: 6880)
      • cmd.exe (PID: 6536)
      • Humor.com (PID: 6344)
    • The executable file from the user directory is run by the CMD process

      • Humor.com (PID: 6880)
      • Humor.com (PID: 6344)
    • Starts application with an unusual extension

      • cmd.exe (PID: 6740)
      • Humor.com (PID: 6880)
      • cmd.exe (PID: 6536)
      • Humor.com (PID: 6344)
  • INFO

    • The process uses the downloaded file

      • chrome.exe (PID: 6928)
      • chrome.exe (PID: 3832)
      • WinRAR.exe (PID: 7052)
      • WinRAR.exe (PID: 5096)
      • XFJRY79UHCB1AWV9904CQY8R.exe (PID: 1400)
      • EKROQMZ4B5WHBOEU01DPGHCTQZAX.exe (PID: 6660)
    • Application launched itself

      • chrome.exe (PID: 3832)
      • chrome.exe (PID: 6628)
    • Reads Microsoft Office registry keys

      • chrome.exe (PID: 3832)
    • Checks supported languages

      • vs-game-force-sof.exe (PID: 3288)
      • 193TQNXGYIQ2SY63110RG2F2UJZEEBE.exe (PID: 1804)
      • vs-game-force-sof.exe (PID: 1856)
      • XFJRY79UHCB1AWV9904CQY8R.exe (PID: 1400)
      • extrac32.exe (PID: 2212)
      • Humor.com (PID: 6880)
      • G175BK9D4LF9TFY72C4MBDZ7V6CW.exe (PID: 6252)
      • EKROQMZ4B5WHBOEU01DPGHCTQZAX.exe (PID: 6660)
      • extrac32.exe (PID: 4392)
      • Humor.com (PID: 6344)
      • Humor.com (PID: 6704)
      • Humor.com (PID: 5208)
    • Reads the computer name

      • vs-game-force-sof.exe (PID: 3288)
      • 193TQNXGYIQ2SY63110RG2F2UJZEEBE.exe (PID: 1804)
      • XFJRY79UHCB1AWV9904CQY8R.exe (PID: 1400)
      • extrac32.exe (PID: 2212)
      • Humor.com (PID: 6880)
      • vs-game-force-sof.exe (PID: 1856)
      • G175BK9D4LF9TFY72C4MBDZ7V6CW.exe (PID: 6252)
      • EKROQMZ4B5WHBOEU01DPGHCTQZAX.exe (PID: 6660)
      • extrac32.exe (PID: 4392)
      • Humor.com (PID: 6344)
      • Humor.com (PID: 6704)
      • Humor.com (PID: 5208)
    • Reads the software policy settings

      • vs-game-force-sof.exe (PID: 3288)
      • 193TQNXGYIQ2SY63110RG2F2UJZEEBE.exe (PID: 1804)
      • vs-game-force-sof.exe (PID: 1856)
      • G175BK9D4LF9TFY72C4MBDZ7V6CW.exe (PID: 6252)
    • Create files in a temporary directory

      • vs-game-force-sof.exe (PID: 3288)
      • 193TQNXGYIQ2SY63110RG2F2UJZEEBE.exe (PID: 1804)
      • XFJRY79UHCB1AWV9904CQY8R.exe (PID: 1400)
      • extrac32.exe (PID: 2212)
      • vs-game-force-sof.exe (PID: 1856)
      • G175BK9D4LF9TFY72C4MBDZ7V6CW.exe (PID: 6252)
      • EKROQMZ4B5WHBOEU01DPGHCTQZAX.exe (PID: 6660)
      • extrac32.exe (PID: 4392)
      • Humor.com (PID: 6704)
      • dllhost.exe (PID: 6212)
    • Creates files or folders in the user directory

      • 193TQNXGYIQ2SY63110RG2F2UJZEEBE.exe (PID: 1804)
      • Humor.com (PID: 6880)
      • Humor.com (PID: 6704)
      • dllhost.exe (PID: 6212)
    • The sample compiled with japanese language support

      • vs-game-force-sof.exe (PID: 3288)
      • vs-game-force-sof.exe (PID: 1856)
    • Reads the machine GUID from the registry

      • 193TQNXGYIQ2SY63110RG2F2UJZEEBE.exe (PID: 1804)
      • G175BK9D4LF9TFY72C4MBDZ7V6CW.exe (PID: 6252)
      • Humor.com (PID: 6704)
      • Humor.com (PID: 5208)
    • Checks proxy server information

      • 193TQNXGYIQ2SY63110RG2F2UJZEEBE.exe (PID: 1804)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 3544)
      • powershell.exe (PID: 6072)
    • Process checks computer location settings

      • XFJRY79UHCB1AWV9904CQY8R.exe (PID: 1400)
      • EKROQMZ4B5WHBOEU01DPGHCTQZAX.exe (PID: 6660)
    • Creates a new folder

      • cmd.exe (PID: 5912)
      • cmd.exe (PID: 6968)
    • Reads mouse settings

      • Humor.com (PID: 6880)
      • Humor.com (PID: 6344)
    • The sample compiled with english language support

      • Humor.com (PID: 6880)
    • Manual execution by a user

      • cmd.exe (PID: 7088)
      • chrome.exe (PID: 6628)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
200
Monitored processes
69
Malicious processes
10
Suspicious processes
6

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs winrar.exe no specs winrar.exe no specs #LUMMA vs-game-force-sof.exe #LUMMA vs-game-force-sof.exe 193tqnxgyiq2sy63110rg2f2ujzeebe.exe powershell.exe no specs conhost.exe no specs xfjry79uhcb1awv9904cqy8r.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs extrac32.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs humor.com choice.exe no specs cmd.exe conhost.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs g175bk9d4lf9tfy72c4mbdz7v6cw.exe no specs powershell.exe no specs conhost.exe no specs ekroqmz4b5whboeu01dpghctqzax.exe no specs chrome.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs humor.com extrac32.exe no specs cmd.exe no specs cmd.exe no specs humor.com no specs choice.exe no specs dllhost.exe humor.com no specs

Process information

PID
CMD
Path
Indicators
Parent process
768"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1880,i,6387666651891848970,2059601315168203751,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
876"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4640 --field-trial-handle=1852,i,7457672958036518584,12305626016116137911,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
900"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4552 --field-trial-handle=1852,i,7457672958036518584,12305626016116137911,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1076"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1876 --field-trial-handle=1880,i,6387666651891848970,2059601315168203751,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1140\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1400"C:\Users\admin\AppData\Local\Temp\XFJRY79UHCB1AWV9904CQY8R.exe"C:\Users\admin\AppData\Local\Temp\XFJRY79UHCB1AWV9904CQY8R.exevs-game-force-sof.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\xfjry79uhcb1awv9904cqy8r.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1412tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
1576choice /d y /t 5C:\Windows\SysWOW64\choice.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Offers the user a choice
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\choice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
1804"C:\Users\admin\AppData\Local\Temp\193TQNXGYIQ2SY63110RG2F2UJZEEBE.exe"C:\Users\admin\AppData\Local\Temp\193TQNXGYIQ2SY63110RG2F2UJZEEBE.exe
vs-game-force-sof.exe
User:
admin
Company:
Gakuto Matsumura
Integrity Level:
MEDIUM
Description:
thilmera 7
Exit code:
0
Version:
N/A
Modules
Images
c:\users\admin\appdata\local\temp\193tqnxgyiq2sy63110rg2f2ujzeebe.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
1856"C:\Users\admin\AppData\Local\Temp\Rar$EXb7052.15247\vs-game-force-sof.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb7052.15247\vs-game-force-sof.exe
WinRAR.exe
User:
admin
Company:
PhotoFiltre
Integrity Level:
MEDIUM
Description:
PhotoFiltre 7
Exit code:
0
Version:
7.2.1.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb7052.15247\vs-game-force-sof.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
28 731
Read events
28 666
Write events
62
Delete events
3

Modification events

(PID) Process:(3832) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3832) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3832) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3832) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(3832) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(6928) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
0100000000000000F7FF85F2036ADB01
(PID) Process:(3832) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Operation:writeName:WinRAR.ZIP
Value:
(PID) Process:(5096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
Executable files
8
Suspicious files
156
Text files
71
Unknown types
0

Dropped files

PID
Process
Filename
Type
3832chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF135fe6.TMP
MD5:
SHA256:
3832chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old~RF135fe6.TMP
MD5:
SHA256:
3832chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old~RF135fe6.TMP
MD5:
SHA256:
3832chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
3832chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
3832chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
3832chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old~RF135fe6.TMP
MD5:
SHA256:
3832chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
3832chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RF135fe6.TMP
MD5:
SHA256:
3832chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
30
TCP/UDP connections
156
DNS requests
132
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1804
193TQNXGYIQ2SY63110RG2F2UJZEEBE.exe
GET
200
2.17.100.234:80
http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRIH1V64SBkA%2BzJQVQ6VFBAcvLB3wQUtqFUOQLDoD%2BOirz61PgcptE6Dv0CEQCZo4AKJlU7ZavcboSms%2Bo5
unknown
whitelisted
1792
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
1804
193TQNXGYIQ2SY63110RG2F2UJZEEBE.exe
GET
200
2.17.100.226:80
http://crl.certum.pl/ctnca.crl
unknown
whitelisted
1792
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
1804
193TQNXGYIQ2SY63110RG2F2UJZEEBE.exe
GET
200
2.17.100.200:80
http://ccsca2021.ocsp-certum.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRxypYNH69rICCzQBIRXN0YAFa3AAQU3XRdTADbe5%2BgdMqxbvc8wDLAcM0CEDZYd%2BItDV2PKMYTCFM%2FLD8%3D
unknown
unknown
1792
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
1792
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
3040
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3040
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
192.168.100.255:137
whitelisted
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
104.126.37.130:443
www.bing.com
Akamai International B.V.
DE
whitelisted
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3832
chrome.exe
239.255.255.250:1900
whitelisted
1076
svchost.exe
184.30.18.9:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
6440
chrome.exe
142.250.74.206:443
sites.google.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.78
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
www.bing.com
  • 104.126.37.130
  • 104.126.37.131
  • 104.126.37.176
  • 104.126.37.145
  • 104.126.37.163
  • 104.126.37.144
  • 104.126.37.128
  • 104.126.37.136
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
go.microsoft.com
  • 184.30.18.9
whitelisted
sites.google.com
  • 142.250.74.206
whitelisted
accounts.google.com
  • 108.177.127.84
whitelisted
fonts.googleapis.com
  • 142.250.186.42
whitelisted
www.gstatic.com
  • 142.250.185.195
whitelisted
apis.google.com
  • 172.217.18.14
whitelisted

Threats

PID
Process
Class
Message
6440
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare R2 Storage (r2 .cloudflarestorage .com)
6440
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare R2 Storage (r2 .cloudflarestorage .com)
6440
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare R2 Storage (r2 .cloudflarestorage .com)
6440
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare R2 Storage (r2 .cloudflarestorage .com)
3288
vs-game-force-sof.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
3288
vs-game-force-sof.exe
Misc activity
ET FILE_SHARING File Sharing Domain Observed in TLS SNI (pixeldrain .com)
2192
svchost.exe
Misc activity
ET FILE_SHARING File Sharing Related Domain in DNS Lookup (pixeldrain .com)
3288
vs-game-force-sof.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
1856
vs-game-force-sof.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
1856
vs-game-force-sof.exe
Misc activity
ET FILE_SHARING File Sharing Domain Observed in TLS SNI (pixeldrain .com)
No debug info