File name:

deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.exe

Full analysis: https://app.any.run/tasks/6b2e4eba-6256-487d-b239-224933c74314
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: January 28, 2025, 07:18:03
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
inno
installer
delphi
stealer
lumma
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections
MD5:

CA48226DF272A89B2D2622EB0EA90E2A

SHA1:

55A245E4D74B6085FBB500474195E01BEA262F68

SHA256:

DEB84EDB1B68CF868BEB0E84E40D06CC101EE1CDE8CA03E112F710DB6CA07BFE

SSDEEP:

98304:H6GavilJmy6ZD/ejjm1+CBviv+0x+ctRYeJ84wr/AYrvy48MnYbY2bz0JqB6yrqA:dhWaE5sV0hFhqYH7q

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • KMSpico.exe (PID: 4668)
      • core.exe (PID: 5400)
      • KMSELDI.exe (PID: 4944)
      • AutoPico.exe (PID: 5856)
    • LUMMA mutex has been found

      • core.exe (PID: 5400)
    • Steals credentials from Web Browsers

      • core.exe (PID: 5400)
    • Actions looks like stealing of personal data

      • core.exe (PID: 5400)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 4052)
    • Changes image file execution options

      • AutoPico.exe (PID: 5856)
      • KMSELDI.exe (PID: 4944)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmp (PID: 5968)
      • KMSpico.tmp (PID: 5580)
    • Executable content was dropped or overwritten

      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmp (PID: 5968)
      • KMSpico.exe (PID: 1140)
      • KMSpico.tmp (PID: 5580)
      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.exe (PID: 540)
      • KMSpico.exe (PID: 4668)
      • KMSELDI.exe (PID: 4944)
    • Reads security settings of Internet Explorer

      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmp (PID: 5968)
      • KMSpico.tmp (PID: 4164)
    • Process drops legitimate windows executable

      • KMSpico.tmp (PID: 5580)
    • Modifies the phishing filter of IE

      • KMSpico.tmp (PID: 5580)
    • Starts CMD.EXE for commands execution

      • KMSpico.tmp (PID: 5580)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 4392)
    • Executing commands from ".cmd" file

      • KMSpico.tmp (PID: 5580)
    • Creates a new Windows service

      • sc.exe (PID: 8)
  • INFO

    • Checks supported languages

      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.exe (PID: 540)
      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmp (PID: 5968)
      • KMSpico.exe (PID: 4668)
      • KMSpico.tmp (PID: 4164)
      • KMSpico.tmp (PID: 5580)
      • KMSpico.exe (PID: 1140)
      • core.exe (PID: 5400)
      • UninsHs.exe (PID: 4076)
      • KMSELDI.exe (PID: 4944)
      • AutoPico.exe (PID: 5856)
      • SECOH-QAD.exe (PID: 4968)
    • Create files in a temporary directory

      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.exe (PID: 540)
      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmp (PID: 5968)
      • KMSpico.exe (PID: 1140)
      • KMSpico.tmp (PID: 5580)
      • core.exe (PID: 5400)
      • KMSpico.exe (PID: 4668)
    • Reads the computer name

      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmp (PID: 5968)
      • KMSpico.tmp (PID: 4164)
      • KMSpico.tmp (PID: 5580)
      • core.exe (PID: 5400)
      • KMSELDI.exe (PID: 4944)
      • AutoPico.exe (PID: 5856)
    • Creates files or folders in the user directory

      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmp (PID: 5968)
    • Detects InnoSetup installer (YARA)

      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.exe (PID: 540)
      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmp (PID: 5968)
      • KMSpico.exe (PID: 4668)
      • KMSpico.tmp (PID: 4164)
      • KMSpico.tmp (PID: 5580)
      • KMSpico.exe (PID: 1140)
    • Compiled with Borland Delphi (YARA)

      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmp (PID: 5968)
      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.exe (PID: 540)
      • KMSpico.tmp (PID: 5580)
      • KMSpico.tmp (PID: 4164)
    • Process checks computer location settings

      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmp (PID: 5968)
      • KMSpico.tmp (PID: 4164)
    • The sample compiled with english language support

      • KMSpico.tmp (PID: 5580)
    • Reads the machine GUID from the registry

      • core.exe (PID: 5400)
      • KMSELDI.exe (PID: 4944)
      • AutoPico.exe (PID: 5856)
    • Reads the software policy settings

      • core.exe (PID: 5400)
    • Creates a software uninstall entry

      • deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmp (PID: 5968)
      • KMSpico.tmp (PID: 5580)
    • Creates files in the program directory

      • KMSpico.tmp (PID: 5580)
      • KMSELDI.exe (PID: 4944)
      • AutoPico.exe (PID: 5856)
    • Reads Microsoft Office registry keys

      • KMSELDI.exe (PID: 4944)
      • AutoPico.exe (PID: 5856)
    • Reads Environment values

      • KMSELDI.exe (PID: 4944)
      • AutoPico.exe (PID: 5856)
    • Reads product name

      • KMSELDI.exe (PID: 4944)
      • AutoPico.exe (PID: 5856)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:01:08 15:36:35+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 684032
InitializedDataSize: 159744
UninitializedDataSize: -
EntryPoint: 0xa7f98
OSVersion: 6.1
ImageVersion: -
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: MyApp Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: MyApp
ProductVersion: 1.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
19
Malicious processes
9
Suspicious processes
0

Behavior graph

Click at the process to see the details
start deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.exe deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmp kmspico.exe kmspico.tmp no specs kmspico.exe kmspico.tmp #LUMMA core.exe svchost.exe cmd.exe no specs cmd.exe no specs uninshs.exe no specs conhost.exe no specs conhost.exe no specs kmseldi.exe sc.exe no specs schtasks.exe no specs autopico.exe secoh-qad.exe no specs sppextcomobj.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
8sc create "Service KMSELDI" binPath= "C:\Program Files\KMSpico\Service_KMS.exe" type= own error= normal start= auto DisplayName= "Service KMSELDI"C:\Windows\System32\sc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
540"C:\Users\admin\Desktop\deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.exe" C:\Users\admin\Desktop\deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
MyApp Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\desktop\deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
1140"C:\Users\admin\AppData\Roaming\MyApp\data\KMSpico.exe" /SPAWNWND=$20284 /NOTIFYWND=$50224 C:\Users\admin\AppData\Roaming\MyApp\data\KMSpico.exe
KMSpico.tmp
User:
admin
Company:
Integrity Level:
HIGH
Description:
KMSpico Setup
Exit code:
0
Version:
10.2.0
Modules
Images
c:\users\admin\appdata\roaming\myapp\data\kmspico.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1704\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3000C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.ExeSECOH-QAD.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
3224\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4052"C:\WINDOWS\system32\cmd.exe" /C ""C:\Program Files\KMSpico\scripts\Install_Task.cmd""C:\Windows\System32\cmd.exeKMSpico.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
4076"C:\Program Files\KMSpico\UninsHs.exe" /r0=KMSpico,default,C:\Users\admin\AppData\Roaming\MyApp\data\KMSpico.exeC:\Program Files\KMSpico\UninsHs.exeKMSpico.tmp
User:
admin
Company:
Han-soft
Integrity Level:
HIGH
Description:
Uninstall for InnoSetup by Han-soft
Exit code:
0
Version:
2.1.0.283
Modules
Images
c:\program files\kmspico\uninshs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
4164"C:\Users\admin\AppData\Local\Temp\is-SD5LG.tmp\KMSpico.tmp" /SL5="$50224,2952592,69120,C:\Users\admin\AppData\Roaming\MyApp\data\KMSpico.exe" C:\Users\admin\AppData\Local\Temp\is-SD5LG.tmp\KMSpico.tmpKMSpico.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-sd5lg.tmp\kmspico.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
9 300
Read events
9 217
Write events
72
Delete events
11

Modification events

(PID) Process:(5968) deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
Operation:writeName:Inno Setup: Setup Version
Value:
6.4.0
(PID) Process:(5968) deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Users\admin\AppData\Roaming\MyApp
(PID) Process:(5968) deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
Operation:writeName:InstallLocation
Value:
C:\Users\admin\AppData\Roaming\MyApp\
(PID) Process:(5968) deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
Operation:writeName:Inno Setup: Icon Group
Value:
MyApp
(PID) Process:(5968) deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
Operation:writeName:Inno Setup: User
Value:
admin
(PID) Process:(5968) deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
Operation:writeName:Inno Setup: Language
Value:
default
(PID) Process:(5968) deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
Operation:writeName:DisplayName
Value:
MyApp version 1.0
(PID) Process:(5968) deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\AppData\Roaming\MyApp\unins000.exe
(PID) Process:(5968) deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
Operation:writeName:UninstallString
Value:
"C:\Users\admin\AppData\Roaming\MyApp\unins000.exe"
(PID) Process:(5968) deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyApp_is1
Operation:writeName:QuietUninstallString
Value:
"C:\Users\admin\AppData\Roaming\MyApp\unins000.exe" /SILENT
Executable files
31
Suspicious files
35
Text files
716
Unknown types
1

Dropped files

PID
Process
Filename
Type
5968deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpC:\Users\admin\AppData\Roaming\MyApp\is-KQ83R.tmp
MD5:
SHA256:
5968deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpC:\Users\admin\AppData\Roaming\MyApp\core.exe
MD5:
SHA256:
5968deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpC:\Users\admin\AppData\Roaming\MyApp\is-U7FPG.tmpexecutable
MD5:4134EC81A9D645602B1FA265F98FBF35
SHA256:69966257CE41717F2121EA1F03F8BFA1486423ACECFCC977DD9F1E157C911AD4
5968deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpC:\Users\admin\AppData\Roaming\MyApp\unins000.exeexecutable
MD5:4134EC81A9D645602B1FA265F98FBF35
SHA256:69966257CE41717F2121EA1F03F8BFA1486423ACECFCC977DD9F1E157C911AD4
5968deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpC:\Users\admin\AppData\Roaming\MyApp\data\KMSpico.exeexecutable
MD5:A02164371A50C5FF9FA2870EF6E8CFA3
SHA256:64C731ADBE1B96CB5765203B1E215093DCF268D020B299445884A4AE62ED2D3A
5580KMSpico.tmpC:\Program Files\KMSpico\DevComponents.DotNetBar2.dllexecutable
MD5:1397B23F30681F97049DF61F94F54D05
SHA256:FA76151A783250014AC8FA55D4C833100A623FCAD1D6E2DDADCDE259F5709609
5580KMSpico.tmpC:\Program Files\KMSpico\is-EJSH8.tmpexecutable
MD5:3D733144477CADCF77009EF614413630
SHA256:392D73617FD0A55218261572ECE2F50301E0CFA29B5ED24C3F692130AA406AF3
540deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.exeC:\Users\admin\AppData\Local\Temp\is-OAUSH.tmp\deb84edb1b68cf868beb0e84e40d06cc101ee1cde8ca03e112f710db6ca07bfe.tmpexecutable
MD5:E4C43138CCB8240276872FD1AEC369BE
SHA256:46BE5E3F28A5E4ED63D66B901D927C25944B4DA36EFFEA9C97FB05994360EDF5
4668KMSpico.exeC:\Users\admin\AppData\Local\Temp\is-SD5LG.tmp\KMSpico.tmpexecutable
MD5:1778C1F66FF205875A6435A33229AB3C
SHA256:95C06ACAC4FE4598840E5556F9613D43AA1039C52DAC64536F59E45A70F79DA6
5580KMSpico.tmpC:\Program Files\KMSpico\AutoPico.exeexecutable
MD5:CFE1C391464C446099A5EB33276F6D57
SHA256:4A714D98CE40F5F3577C306A66CB4A6B1FF3FD01047C7F4581F8558F0BCDF5FA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
26
DNS requests
10
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
200
104.21.19.193:443
https://uniquetopstop.top/api
unknown
text
18.3 Kb
POST
204
104.126.37.185:443
https://www.bing.com/threshold/xls.aspx
unknown
whitelisted
POST
200
172.67.188.147:443
https://uniquetopstop.top/api
unknown
text
16 b
POST
200
104.21.19.193:443
https://uniquetopstop.top/api
unknown
text
16 b
POST
200
172.67.188.147:443
https://uniquetopstop.top/api
unknown
text
16 b
POST
200
172.67.188.147:443
https://uniquetopstop.top/api
unknown
text
16 b
POST
200
172.67.188.147:443
https://uniquetopstop.top/api
unknown
text
2 b
POST
200
104.21.19.193:443
https://uniquetopstop.top/api
unknown
text
16 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
104.126.37.162:443
Akamai International B.V.
DE
unknown
4712
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3976
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5400
core.exe
172.67.188.147:443
uniquetopstop.top
CLOUDFLARENET
US
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.206
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
uniquetopstop.top
  • 172.67.188.147
  • 104.21.19.193
unknown
1.pool.ntp.org
  • 81.7.16.52
  • 176.9.44.212
  • 94.130.23.46
  • 62.108.36.235
whitelisted
www.bing.com
  • 2.21.65.132
  • 2.21.65.153
  • 2.21.65.154
whitelisted
3.pool.ntp.org
  • 185.248.188.98
  • 51.75.67.47
  • 158.220.97.17
  • 116.202.14.29
whitelisted
self.events.data.microsoft.com
  • 20.189.173.8
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
No debug info