File name:

SecuriteInfo.com.Win32.MalwareX-gen.5654.2590

Full analysis: https://app.any.run/tasks/0be42b2e-9baf-4a17-96ae-4b820391e572
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: April 11, 2025, 21:31:12
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
lumma
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

87B0BF2A247442920423C0DBCFC83EF6

SHA1:

42DC555A9843220C3A9B770DB6C158328C98B9A4

SHA256:

F2E5AA1AB6B0664E1AACB3CE242F6D18F877E00B10F5071F9D5E540EC35084D2

SSDEEP:

24576:ChFCl1AGdDSBgtUHA/m+6nquuq0MG3aHZaGFIZcveXMocUtmAL7wobS5pud8uunT:ChFCl1AGdDSBgtUHA/m+6nquuq0MG3aj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6476)
    • LUMMA mutex has been found

      • MSBuild.exe (PID: 7148)
    • Steals credentials from Web Browsers

      • MSBuild.exe (PID: 7148)
    • Actions looks like stealing of personal data

      • MSBuild.exe (PID: 7148)
    • LUMMA has been detected (YARA)

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6476)
      • MSBuild.exe (PID: 7148)
  • SUSPICIOUS

    • Starts itself from another location

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 5680)
    • Reads security settings of Internet Explorer

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 5680)
      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6476)
    • Executable content was dropped or overwritten

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 5680)
    • There is functionality for taking screenshot (YARA)

      • MSBuild.exe (PID: 7148)
    • Searches for installed software

      • MSBuild.exe (PID: 7148)
  • INFO

    • Creates files or folders in the user directory

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 5680)
      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6476)
    • Reads the computer name

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 5680)
      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6476)
      • MSBuild.exe (PID: 7148)
    • Checks proxy server information

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 5680)
      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6476)
    • Checks supported languages

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 5680)
      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6476)
      • MSBuild.exe (PID: 7148)
    • Reads the machine GUID from the registry

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6476)
      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 5680)
    • Reads the software policy settings

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 5680)
      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6476)
      • MSBuild.exe (PID: 7148)
      • slui.exe (PID: 3896)
    • Create files in a temporary directory

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 5680)
    • Process checks computer location settings

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 5680)
    • Application launched itself

      • Acrobat.exe (PID: 6272)
      • AcroCEF.exe (PID: 6592)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Lumma

(PID) Process(7148) MSBuild.exe
C2 (9)moldwaye.live/ingso
grxeasyw.digital/xxepw
krxspint.digital/kendwz
jrxsafer.top/shpaoz
advennture.top/GKsiio
xrfxcaseq.live/gspaz
rhxhube.run/pogrs
ywmedici.top/noagis
targett.top/dsANGt
No Malware configuration.

TRiD

.exe | InstallShield setup (36.8)
.exe | Win32 Executable MS Visual C++ (generic) (26.6)
.exe | Win64 Executable (generic) (23.6)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:04:04 09:12:47+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.44
CodeSize: 400384
InitializedDataSize: 311808
UninitializedDataSize: -
EntryPoint: 0x42173
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
18
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start securiteinfo.com.win32.malwarex-gen.5654.2590.exe sppextcomobj.exe no specs slui.exe acrobat.exe #LUMMA securiteinfo.com.win32.malwarex-gen.5654.2590.exe acrobat.exe no specs #LUMMA msbuild.exe acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs acrocef.exe acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2108"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" --type=renderer /prefetch:1 "C:\Users\admin\AppData\Local\Temp\chicos.pdf"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeAcrobat.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrobat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
3888"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=gpu-process --log-severity=disable --user-agent-product="ReaderServices/23.1.20093 Chrome/105.0.0.0" --lang=en-US --gpu-preferences=UAAAAAAAAADgACAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1548 --field-trial-handle=1636,i,12661365155717785624,4720498177556608132,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:2C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeAcroCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe AcroCEF
Exit code:
0
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrocef_1\acrocef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
3896"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4844"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --log-severity=disable --user-agent-product="ReaderServices/23.1.20093 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2148 --field-trial-handle=1636,i,12661365155717785624,4720498177556608132,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeAcroCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe AcroCEF
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrocef_1\acrocef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5244"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.1.20093 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2156 --field-trial-handle=1636,i,12661365155717785624,4720498177556608132,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
AcroCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe AcroCEF
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrocef_1\acrocef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5548"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=renderer --log-severity=disable --user-agent-product="ReaderServices/23.1.20093 Chrome/105.0.0.0" --first-renderer-process --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --touch-events=enabled --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1636,i,12661365155717785624,4720498177556608132,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:1C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeAcroCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe AcroCEF
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrocef_1\acrocef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5680"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.malwarex-gen.5654.2590.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6272"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\admin\AppData\Local\Temp\chicos.pdf"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrobat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6476"C:\Users\admin\AppData\Roaming\SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe" C:\Users\admin\AppData\Roaming\SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\roaming\securiteinfo.com.win32.malwarex-gen.5654.2590.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6592"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16514043C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeAcrobat.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe AcroCEF
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrocef_1\acrocef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
17 899
Read events
17 789
Write events
108
Delete events
2

Modification events

(PID) Process:(5680) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5680) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5680) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(5680) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\OpenWithProgids
Operation:writeName:Acrobat.Document.DC
Value:
(PID) Process:(2108) Acrobat.exeKey:HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\ExitSection
Operation:writeName:bLastExitNormal
Value:
0
(PID) Process:(6272) Acrobat.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-2034283098-2252572593-1072577386-2659511007-3245387615-27016815-3920691934
Operation:writeName:DisplayName
Value:
Adobe Acrobat Reader Protected Mode
(PID) Process:(6476) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:AutoStartApp
Value:
C:\Users\admin\AppData\Roaming\SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
(PID) Process:(6476) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6476) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6476) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
1
Suspicious files
179
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
5680SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619binary
MD5:05B72805101920D9D85074BEC30FF032
SHA256:00BA8A8EE50F4028AB0A9966A5277285797799B463820E5B7D0C2AFDF3C07F15
5680SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\chicos[1].pdfpdf
MD5:61C00A9DFCB26BEEFACCCD451888768C
SHA256:CD3D0545081CE0C0DB329F8556C09852195C03A40118DAF90B10A4F988EFA377
5680SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeC:\Users\admin\AppData\Roaming\SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeexecutable
MD5:87B0BF2A247442920423C0DBCFC83EF6
SHA256:F2E5AA1AB6B0664E1AACB3CE242F6D18F877E00B10F5071F9D5E540EC35084D2
6476SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeC:\Users\admin\AppData\Roaming\text.txttext
MD5:406CAB15343CADC478FB6FC134A6B3D8
SHA256:4A69EB35E51D4DAFA5FA24E48150DB637D5DC17ADC654F0FEDFD91C55DAD28B8
2108Acrobat.exeC:\Users\admin\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txttext
MD5:5608F761C6C8C3D9DB2A2542B339163F
SHA256:BF560B2E50A840B63AB8B43AF7670C35B81D145050A769D9C65B86CA3A4E26C1
2108Acrobat.exeC:\Users\admin\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.1.20093.6 2025-04-11 21-31-28-831.logtext
MD5:460C6041966002D8384A18C895A65EB0
SHA256:C83EC6E8FB3EC62481289C033238C1D9B08DB8076EAAD304099FD7A7F594F1B9
2108Acrobat.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.jsonbinary
MD5:837C1211E392A24D64C670DC10E8DA1B
SHA256:8013AC030684B86D754BBFBAB8A9CEC20CAA4DD9C03022715FF353DC10E14031
5680SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeC:\Users\admin\AppData\Local\Temp\chicos.pdfpdf
MD5:61C00A9DFCB26BEEFACCCD451888768C
SHA256:CD3D0545081CE0C0DB329F8556C09852195C03A40118DAF90B10A4F988EFA377
2108Acrobat.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTINGbinary
MD5:DC84B0D741E5BEAE8070013ADDCC8C28
SHA256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
2108Acrobat.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journalbinary
MD5:063FAE7B9D1620B5E1D2CC7BB27076C3
SHA256:0ABCD4D9CC03AFC14253428124140F7ADDF896671D698E045EEF74746B6F5156
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
37
DNS requests
23
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5680
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
GET
200
18.245.38.41:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEjgLnWaIozse2b%2BczaaODg8%3D
unknown
whitelisted
5680
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRJ9L2KGL92BpjF3kAtaDtxauTmhgQUPdNQpdagre7zSmAKZdMh1Pj41g8CEAkYRDeSr3%2FByrQh0es68D8%3D
unknown
whitelisted
6272
Acrobat.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAfy81yHqHeveu%2FpR5k1Jb0%3D
unknown
whitelisted
8108
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8108
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5680
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
GET
200
18.245.65.219:80
http://ocsp.r2m01.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBShdVEFnSEQ0gG5CBtzM48cPMe9XwQUgbgOY4qJEhjl%2Bjs7UJWf5uWQE4UCEA1Li7YBN7RrmcmQi5xUsGk%3D
unknown
whitelisted
5680
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.147:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5680
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
185.166.143.50:443
bitbucket.org
AMAZON-02
NL
whitelisted
5680
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
5680
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
52.217.163.17:443
bbuseruploads.s3.amazonaws.com
AMAZON-02
US
whitelisted
5680
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
18.245.38.41:80
ocsp.rootca1.amazontrust.com
US
whitelisted
5680
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
18.245.65.219:80
ocsp.r2m01.amazontrust.com
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 23.48.23.147
  • 23.48.23.166
  • 23.48.23.176
  • 23.48.23.177
  • 23.48.23.164
  • 23.48.23.156
  • 23.48.23.173
whitelisted
bitbucket.org
  • 185.166.143.50
  • 185.166.143.49
  • 185.166.143.48
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
bbuseruploads.s3.amazonaws.com
  • 52.217.163.17
  • 52.217.201.1
  • 54.231.139.193
  • 3.5.28.65
  • 16.15.193.10
  • 3.5.2.68
  • 52.216.48.217
  • 3.5.24.97
whitelisted
ocsp.rootca1.amazontrust.com
  • 18.245.38.41
whitelisted
ocsp.r2m01.amazontrust.com
  • 18.245.65.219
whitelisted
login.live.com
  • 40.126.31.73
  • 20.190.159.2
  • 40.126.31.0
  • 40.126.31.129
  • 40.126.31.131
  • 20.190.159.129
  • 40.126.31.1
  • 20.190.159.71
whitelisted

Threats

No threats detected
No debug info