File name:

SecuriteInfo.com.Win32.MalwareX-gen.5654.2590

Full analysis: https://app.any.run/tasks/40171c3d-b1d1-4835-a156-81e6998184ac
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: April 11, 2025, 21:33:42
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
lumma
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

87B0BF2A247442920423C0DBCFC83EF6

SHA1:

42DC555A9843220C3A9B770DB6C158328C98B9A4

SHA256:

F2E5AA1AB6B0664E1AACB3CE242F6D18F877E00B10F5071F9D5E540EC35084D2

SSDEEP:

24576:ChFCl1AGdDSBgtUHA/m+6nquuq0MG3aHZaGFIZcveXMocUtmAL7wobS5pud8uunT:ChFCl1AGdDSBgtUHA/m+6nquuq0MG3aj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6540)
    • LUMMA mutex has been found

      • RegAsm.exe (PID: 6700)
    • LUMMA has been detected (YARA)

      • RegAsm.exe (PID: 6700)
      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6540)
    • Actions looks like stealing of personal data

      • RegAsm.exe (PID: 6700)
    • Steals credentials from Web Browsers

      • RegAsm.exe (PID: 6700)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 1628)
      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6540)
    • Starts itself from another location

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 1628)
    • Executable content was dropped or overwritten

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 1628)
    • There is functionality for taking screenshot (YARA)

      • RegAsm.exe (PID: 6700)
    • Searches for installed software

      • RegAsm.exe (PID: 6700)
  • INFO

    • Creates files or folders in the user directory

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 1628)
      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6540)
    • Reads the computer name

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 1628)
      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6540)
      • RegAsm.exe (PID: 6700)
    • Checks proxy server information

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 1628)
      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6540)
    • Reads the software policy settings

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 1628)
      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6540)
      • RegAsm.exe (PID: 6700)
      • slui.exe (PID: 5280)
    • Reads the machine GUID from the registry

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 1628)
      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6540)
    • Create files in a temporary directory

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 1628)
    • Checks supported languages

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 1628)
      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 6540)
      • RegAsm.exe (PID: 6700)
    • Process checks computer location settings

      • SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe (PID: 1628)
    • Application launched itself

      • Acrobat.exe (PID: 5772)
      • AcroCEF.exe (PID: 7368)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Lumma

(PID) Process(6700) RegAsm.exe
C2 (9)moldwaye.live/ingso
grxeasyw.digital/xxepw
krxspint.digital/kendwz
jrxsafer.top/shpaoz
advennture.top/GKsiio
xrfxcaseq.live/gspaz
rhxhube.run/pogrs
ywmedici.top/noagis
targett.top/dsANGt
No Malware configuration.

TRiD

.exe | InstallShield setup (36.8)
.exe | Win32 Executable MS Visual C++ (generic) (26.6)
.exe | Win64 Executable (generic) (23.6)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:04:04 09:12:47+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.44
CodeSize: 400384
InitializedDataSize: 311808
UninitializedDataSize: -
EntryPoint: 0x42173
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
148
Monitored processes
19
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start securiteinfo.com.win32.malwarex-gen.5654.2590.exe sppextcomobj.exe no specs slui.exe acrobat.exe #LUMMA securiteinfo.com.win32.malwarex-gen.5654.2590.exe acrobat.exe no specs msbuild.exe no specs #LUMMA regasm.exe acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs acrocef.exe acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1052"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" --type=renderer /prefetch:1 "C:\Users\admin\AppData\Local\Temp\chicos.pdf"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeAcrobat.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrobat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1616"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1628"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.malwarex-gen.5654.2590.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2384C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5176"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=renderer --log-severity=disable --user-agent-product="ReaderServices/23.1.20093 Chrome/105.0.0.0" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --touch-events=enabled --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2972 --field-trial-handle=1644,i,10092482653571258124,6446509314011919326,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:1C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeAcroCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe AcroCEF
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrocef_1\acrocef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5280"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5772"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\admin\AppData\Local\Temp\chicos.pdf"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrobat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6540"C:\Users\admin\AppData\Roaming\SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe" C:\Users\admin\AppData\Roaming\SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\roaming\securiteinfo.com.win32.malwarex-gen.5654.2590.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6700"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Lumma
(PID) Process(6700) RegAsm.exe
C2 (9)moldwaye.live/ingso
grxeasyw.digital/xxepw
krxspint.digital/kendwz
jrxsafer.top/shpaoz
advennture.top/GKsiio
xrfxcaseq.live/gspaz
rhxhube.run/pogrs
ywmedici.top/noagis
targett.top/dsANGt
7368"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16514043C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeAcrobat.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe AcroCEF
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrocef_1\acrocef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
17 948
Read events
17 838
Write events
108
Delete events
2

Modification events

(PID) Process:(1628) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1628) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1628) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1628) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\OpenWithProgids
Operation:writeName:Acrobat.Document.DC
Value:
(PID) Process:(5772) Acrobat.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-2034283098-2252572593-1072577386-2659511007-3245387615-27016815-3920691934
Operation:writeName:DisplayName
Value:
Adobe Acrobat Reader Protected Mode
(PID) Process:(6540) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6540) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6540) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6540) SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:AutoStartApp
Value:
C:\Users\admin\AppData\Roaming\SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
(PID) Process:(1052) Acrobat.exeKey:HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\ExitSection
Operation:writeName:bLastExitNormal
Value:
0
Executable files
1
Suspicious files
187
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
1628SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8binary
MD5:9FF3988EFC57CB95437EAACFBE45497B
SHA256:9B413A9CEB32DC9723B5DCA1C673A4AB640BC56DC1895A09EE1B2ECAC9AC32CB
1628SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4D1ED785E3365DE6C966A82E99CCE8EA_4FF21E9CE9761A304E66D2F0263F90A7binary
MD5:8EDCC60CBEB52F257A874328CCC397D3
SHA256:CBB98D3AC9ECCB9E29DAAC69F9F60860BE732847875C006C4F938B490986FD5E
1628SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619binary
MD5:7D9035F84CB0F0DDD4DC083B90F33A13
SHA256:4A5E3DB99EA442FA647E769EB0E2BD326EC2984661D0A20689765177E944F72F
1628SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619binary
MD5:BC691AC9817AFAA658B8A038F946F515
SHA256:BB7837D9DE3C3A71537A26195A01A942D062E21B043DCA1F75D209F90BA68F22
1628SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4D1ED785E3365DE6C966A82E99CCE8EA_4FF21E9CE9761A304E66D2F0263F90A7binary
MD5:CD8B8406DFFEBFF46D0CDC061B704D5C
SHA256:7D0EA2D38BE455729401DEC0B1CD9344DEC70DDA1E4032C5E6A638F587DFE529
1628SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8binary
MD5:25BD6FF355FB464F31020B83FC6549F6
SHA256:FE7CB8D614998B02C1C795A5A83162BB2AA36008B0F1F9CD6D54AE73CECBFBFB
1052Acrobat.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTINGbinary
MD5:DC84B0D741E5BEAE8070013ADDCC8C28
SHA256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
1052Acrobat.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journalbinary
MD5:C431C9CEEA8BAB1C8320961B86D6ED6F
SHA256:1BD1B85F079EFD14BB43B2AF30C65648D26CB9B62B72C90D253456D40169979D
7368AcroCEF.exeC:\Users\admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old~RF10dd52.TMPtext
MD5:D012E5B4EB91B61F6E8AE2F8EC3C623E
SHA256:1BDA750084F20306722008016420E1912BA608CA8EFB9C661F7E7EFCF5E89673
1628SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exeC:\Users\admin\AppData\Local\Temp\pdf_already_downloaded.txttext
MD5:B4A23833E6F714468CB4A6AD46530137
SHA256:6D8FEEC4F0482B0A5C6D7EC201EDA787A4276ABEC4E71BFE67B1B144109269F6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
36
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1628
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D
unknown
whitelisted
1628
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRJ9L2KGL92BpjF3kAtaDtxauTmhgQUPdNQpdagre7zSmAKZdMh1Pj41g8CEAkYRDeSr3%2FByrQh0es68D8%3D
unknown
whitelisted
1628
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
GET
200
18.161.96.75:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEjgLnWaIozse2b%2BczaaODg8%3D
unknown
whitelisted
1628
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
GET
200
18.245.65.219:80
http://ocsp.r2m01.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBShdVEFnSEQ0gG5CBtzM48cPMe9XwQUgbgOY4qJEhjl%2Bjs7UJWf5uWQE4UCEA1Li7YBN7RrmcmQi5xUsGk%3D
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3268
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5772
Acrobat.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAfy81yHqHeveu%2FpR5k1Jb0%3D
unknown
whitelisted
3268
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1628
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
185.166.143.48:443
bitbucket.org
AMAZON-02
NL
whitelisted
1628
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1628
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
52.217.9.196:443
bbuseruploads.s3.amazonaws.com
AMAZON-02
US
whitelisted
1628
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
18.161.96.75:80
ocsp.rootca1.amazontrust.com
AMAZON-02
US
whitelisted
1628
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
18.245.65.219:80
ocsp.r2m01.amazontrust.com
US
whitelisted
6540
SecuriteInfo.com.Win32.MalwareX-gen.5654.2590.exe
185.166.143.49:443
bitbucket.org
AMAZON-02
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
google.com
  • 142.250.186.110
whitelisted
bitbucket.org
  • 185.166.143.48
  • 185.166.143.50
  • 185.166.143.49
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 184.30.131.245
whitelisted
bbuseruploads.s3.amazonaws.com
  • 52.217.9.196
  • 3.5.27.22
  • 3.5.29.251
  • 52.216.86.187
  • 3.5.25.181
  • 54.231.232.233
  • 52.217.138.233
  • 16.15.185.231
whitelisted
ocsp.rootca1.amazontrust.com
  • 18.161.96.75
whitelisted
ocsp.r2m01.amazontrust.com
  • 18.245.65.219
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
moldwaye.live
  • 188.114.97.3
  • 188.114.96.3
unknown

Threats

No threats detected
No debug info