Analysis
-
max time kernel
241s -
max time network
244s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-01-2025 17:28
Static task
static1
General
-
Target
Fluxion Launcher.rar
-
Size
3.3MB
-
MD5
eee78ef06b0bee50ebeb26dd87c810ce
-
SHA1
a098985153e9b9c68f42e891045845cbb4d3b915
-
SHA256
ac9881ba3da632e68be376d6ac307962bd9116fa2240a3eb53f564f8f8d2673e
-
SHA512
135c0c65cd9cfc4f146aba090899ebaffbdbc71816365a568473e8837e0b43e0cb9e031f78dfa4469334a519d09d516db5204a344bbeedc65cf2840d40a776f3
-
SSDEEP
98304:3sMGdImCv5E3aYmlKvA43Y0Ozi/uIArpyKg:395mqE37A6XNOu/uNrpyL
Malware Config
Extracted
lumma
https://robinsharez.shop/api
https://handscreamny.shop/api
https://chipdonkeruz.shop/api
https://versersleep.shop/api
https://crowdwarek.shop/api
https://apporholis.shop/api
https://femalsabler.shop/api
https://soundtappysk.shop/api
https://letterdrive.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 54 IoCs
pid Process 2796 FREELUMMASTEALER.exe 4100 FREELUMMASTEALER.exe 3800 FREELUMMASTEALER.exe 2244 FREELUMMASTEALER.exe 2300 FREELUMMASTEALER.exe 4972 FREELUMMASTEALER.exe 1932 FREELUMMASTEALER.exe 1980 FREELUMMASTEALER.exe 3624 FREELUMMASTEALER.exe 4600 FREELUMMASTEALER.exe 3216 FREELUMMASTEALER.exe 3760 FREELUMMASTEALER.exe 1556 FREELUMMASTEALER.exe 5100 FREELUMMASTEALER.exe 2928 FREELUMMASTEALER.exe 2032 FREELUMMASTEALER.exe 2740 FREELUMMASTEALER.exe 1664 FREELUMMASTEALER.exe 5040 FREELUMMASTEALER.exe 2368 FREELUMMASTEALER.exe 4052 FREELUMMASTEALER.exe 3248 FREELUMMASTEALER.exe 2360 FREELUMMASTEALER.exe 3356 FREELUMMASTEALER.exe 1400 FREELUMMASTEALER.exe 4740 FREELUMMASTEALER.exe 2888 FREELUMMASTEALER.exe 3652 FREELUMMASTEALER.exe 5068 FREELUMMASTEALER.exe 3672 FREELUMMASTEALER.exe 3192 FREELUMMASTEALER.exe 596 FREELUMMASTEALER.exe 3284 FREELUMMASTEALER.exe 2316 FREELUMMASTEALER.exe 1288 FREELUMMASTEALER.exe 3888 FREELUMMASTEALER.exe 1236 FREELUMMASTEALER.exe 1756 FREELUMMASTEALER.exe 4124 FREELUMMASTEALER.exe 1480 FREELUMMASTEALER.exe 1564 FREELUMMASTEALER.exe 2028 FREELUMMASTEALER.exe 4820 FREELUMMASTEALER.exe 1892 FREELUMMASTEALER.exe 4956 FREELUMMASTEALER.exe 1736 FREELUMMASTEALER.exe 2600 FREELUMMASTEALER.exe 4728 FREELUMMASTEALER.exe 752 FREELUMMASTEALER.exe 796 FREELUMMASTEALER.exe 3380 FREELUMMASTEALER.exe 4760 FREELUMMASTEALER.exe 3644 FREELUMMASTEALER.exe 2308 FREELUMMASTEALER.exe -
Suspicious use of SetThreadContext 30 IoCs
description pid Process procid_target PID 2796 set thread context of 4100 2796 FREELUMMASTEALER.exe 106 PID 2796 set thread context of 3800 2796 FREELUMMASTEALER.exe 107 PID 2244 set thread context of 2300 2244 FREELUMMASTEALER.exe 113 PID 2244 set thread context of 4972 2244 FREELUMMASTEALER.exe 114 PID 1932 set thread context of 1980 1932 FREELUMMASTEALER.exe 119 PID 1932 set thread context of 3624 1932 FREELUMMASTEALER.exe 120 PID 4600 set thread context of 3216 4600 FREELUMMASTEALER.exe 125 PID 4600 set thread context of 3760 4600 FREELUMMASTEALER.exe 126 PID 1556 set thread context of 5100 1556 FREELUMMASTEALER.exe 131 PID 1556 set thread context of 2928 1556 FREELUMMASTEALER.exe 132 PID 2032 set thread context of 1664 2032 FREELUMMASTEALER.exe 138 PID 2032 set thread context of 2368 2032 FREELUMMASTEALER.exe 140 PID 4052 set thread context of 3248 4052 FREELUMMASTEALER.exe 145 PID 4052 set thread context of 2360 4052 FREELUMMASTEALER.exe 146 PID 3356 set thread context of 4740 3356 FREELUMMASTEALER.exe 152 PID 3356 set thread context of 5068 3356 FREELUMMASTEALER.exe 155 PID 3672 set thread context of 3192 3672 FREELUMMASTEALER.exe 160 PID 3672 set thread context of 3284 3672 FREELUMMASTEALER.exe 162 PID 2316 set thread context of 3888 2316 FREELUMMASTEALER.exe 168 PID 2316 set thread context of 1236 2316 FREELUMMASTEALER.exe 169 PID 1756 set thread context of 1564 1756 FREELUMMASTEALER.exe 176 PID 1756 set thread context of 2028 1756 FREELUMMASTEALER.exe 177 PID 4820 set thread context of 1892 4820 FREELUMMASTEALER.exe 182 PID 4820 set thread context of 4956 4820 FREELUMMASTEALER.exe 183 PID 1736 set thread context of 2600 1736 FREELUMMASTEALER.exe 188 PID 1736 set thread context of 4728 1736 FREELUMMASTEALER.exe 189 PID 752 set thread context of 796 752 FREELUMMASTEALER.exe 194 PID 752 set thread context of 3380 752 FREELUMMASTEALER.exe 195 PID 4760 set thread context of 3644 4760 FREELUMMASTEALER.exe 200 PID 4760 set thread context of 2308 4760 FREELUMMASTEALER.exe 201 -
Program crash 15 IoCs
pid pid_target Process procid_target 3020 2796 WerFault.exe 104 4756 2244 WerFault.exe 111 784 1932 WerFault.exe 117 3244 4600 WerFault.exe 123 1056 1556 WerFault.exe 128 1144 2032 WerFault.exe 135 1020 4052 WerFault.exe 143 1124 3356 WerFault.exe 149 3596 3672 WerFault.exe 158 4992 2316 WerFault.exe 165 956 1756 WerFault.exe 172 3720 4820 WerFault.exe 180 1192 1736 WerFault.exe 186 3064 752 WerFault.exe 192 1596 4760 WerFault.exe 197 -
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FREELUMMASTEALER.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2536 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 748 msedge.exe 748 msedge.exe 2840 msedge.exe 2840 msedge.exe 4044 identity_helper.exe 4044 identity_helper.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3492 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3492 7zFM.exe Token: 35 3492 7zFM.exe Token: SeSecurityPrivilege 3492 7zFM.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 3492 7zFM.exe 3492 7zFM.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2408 2840 msedge.exe 82 PID 2840 wrote to memory of 2408 2840 msedge.exe 82 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 1108 2840 msedge.exe 83 PID 2840 wrote to memory of 748 2840 msedge.exe 84 PID 2840 wrote to memory of 748 2840 msedge.exe 84 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85 PID 2840 wrote to memory of 1620 2840 msedge.exe 85
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Fluxion Launcher.rar"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3492
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff1d523cb8,0x7fff1d523cc8,0x7fff1d523cd82⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,17358298304273643454,15350122790935037741,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,17358298304273643454,15350122790935037741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,17358298304273643454,15350122790935037741,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17358298304273643454,15350122790935037741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17358298304273643454,15350122790935037741,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17358298304273643454,15350122790935037741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17358298304273643454,15350122790935037741,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,17358298304273643454,15350122790935037741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17358298304273643454,15350122790935037741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17358298304273643454,15350122790935037741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,17358298304273643454,15350122790935037741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17358298304273643454,15350122790935037741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17358298304273643454,15350122790935037741,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17358298304273643454,15350122790935037741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17358298304273643454,15350122790935037741,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:3020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3716
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\LUMMASTEALER\Config.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2536
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4100
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 7842⤵
- Program crash
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2796 -ip 27961⤵PID:3964
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2300
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 7762⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2244 -ip 22441⤵PID:2316
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1980
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 7842⤵
- Program crash
PID:784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1932 -ip 19321⤵PID:2504
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4600 -
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3216
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 8122⤵
- Program crash
PID:3244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4600 -ip 46001⤵PID:4912
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5100
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 7722⤵
- Program crash
PID:1056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 1556 -ip 15561⤵PID:1544
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
PID:2740
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1664
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
PID:5040
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 7922⤵
- Program crash
PID:1144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2032 -ip 20321⤵PID:728
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4052 -
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3248
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 1482⤵
- Program crash
PID:1020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4052 -ip 40521⤵PID:3220
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3356 -
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
PID:1400
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4740
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
PID:2888
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
PID:3652
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 8042⤵
- Program crash
PID:1124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3356 -ip 33561⤵PID:2160
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3672 -
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3192
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
PID:596
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 7882⤵
- Program crash
PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3672 -ip 36721⤵PID:2956
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
PID:1288
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3888
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 7842⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2316 -ip 23161⤵PID:2944
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
PID:4124
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
PID:1480
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1564
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 7162⤵
- Program crash
PID:956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1756 -ip 17561⤵PID:3240
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4820 -
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1892
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 8002⤵
- Program crash
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4820 -ip 48201⤵PID:4300
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2600
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 7762⤵
- Program crash
PID:1192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1736 -ip 17361⤵PID:1928
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:752 -
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:796
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 7802⤵
- Program crash
PID:3064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 752 -ip 7521⤵PID:2896
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4760 -
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3644
-
-
C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"C:\Users\Admin\Documents\LUMMASTEALER\FREELUMMASTEALER.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 7722⤵
- Program crash
PID:1596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4760 -ip 47601⤵PID:2472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e11c77d0fa99af6b1b282a22dcb1cf4a
SHA12593a41a6a63143d837700d01aa27b1817d17a4d
SHA256d96f9bfcc81ba66db49a3385266a631899a919ed802835e6fb6b9f7759476ea0
SHA512c8f69f503ab070a758e8e3ae57945c0172ead1894fdbfa2d853e5bb976ed3817ecc8f188eefd5092481effd4ef650788c8ff9a8d9a5ee4526f090952d7c859f3
-
Filesize
152B
MD5c0a1774f8079fe496e694f35dfdcf8bc
SHA1da3b4b9fca9a3f81b6be5b0cd6dd700603d448d3
SHA256c041da0b90a5343ede7364ccf0428852103832c4efa8065a0cd1e8ce1ff181cb
SHA51260d9e87f8383fe3afa2c8935f0e5a842624bb24b03b2d8057e0da342b08df18cf70bf55e41fa3ae54f73bc40a274cf6393d79ae01f6a1784273a25fa2761728b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5721012e29e8ab2fd2a2c39925620ba52
SHA1aeb89b6cc780eeb0752914ac0f5776499b2f4e68
SHA256d0f0c1a54532589fa24b415c5ee7fc89118543cc86f319227d67a90987eea643
SHA5121786d4e8b086fa287bfb661a3820c589e1bfbaa46e11ffc72450069640d3a15f2b52ba2f7e8de60fd0813f3d141aa6add093e3f1298210f3a7e3ff3ff8a6ee6d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize120B
MD5036855fa4b86b13fdfe85517625744ac
SHA1b27c048ac21e6ab82baba34b8834613e256d0207
SHA256472a99c33f3513c0457771af28d63997308eaea563ec5eeef644483ab8778d28
SHA51294cea706e223b3ffdfa709a18cd5a48e7473a1c489123c52e25852b6faf1cf3e5ab1c028dd200d6f5de38181765b8a96ff0f7c6083b7890106c4a97a1b695e3c
-
Filesize
1KB
MD5ed1d8834b7b2791efed64889d0762068
SHA1a959571b44fc41e3004168ec5f25df594bb2d300
SHA25680017595bffb6fd95a4682e7a5d88f909c5b5b273f80ec8a4fc3531afc11afa0
SHA5128133d42c7b0917f7cf0a3c5b43964fd79e329085302cd02fe3cd58e7ff3b1111ab4ba275230b5b5d185d9da641dd59abb85f90742ddc2a9862df57219b8bd1fb
-
Filesize
7KB
MD5b50a641738063a8d602c6eca64cebcd8
SHA1751f541ecb2853bdc4362fbbe4eb02a8d29e3b4e
SHA256b0bb87e78def3070eae26eaa3f8db6836e478d71e3e20557a1eec64c117c0482
SHA512736946e8151142aa8fd62ac3195abc150190135a4ab8f05745533e3ca51d3c9d7a7a3dd90553752dfb55e1b6fe9abe6425812d3835efbf593cdeba58f91b46a6
-
Filesize
6KB
MD59eea5c7f77958a50ee97704679dc841f
SHA10cbcb80102b5bba493fe89d49a7b709866383552
SHA256e513ea65cef31fe87999a12a368a26a40da0b958463c9fd9314b4f98709125b0
SHA5121a20926ccbdf2a4318c8447f9b8a306e439128723374c07a64234807eddb48b0e551f8654840f9c6d498ac36aebc99a92bc98e40aa9d1c75faf37a0b9cb6ce4e
-
Filesize
5KB
MD55736dea54643b118ccddfc506442b520
SHA13c520aa482d1e3074a087bdaaefd17a06fc3ec4e
SHA256f0b75274453b8ae4500b1a4d2ce631bd7c93bca408682429e737b76ae6aedf88
SHA5127c77b815af87cc76f9c7a4ad57f6eb2c49bff8fbedea06118e46c7d328a2ecfd84243f253da584a1812af381b89f2de0682d4d50c77a8e3501603bce763380ad
-
Filesize
6KB
MD55c26033b3221d6bf54b9e5ee68a1520e
SHA1e3dc584a70d3a18e7816e363a937bfa4a7247f20
SHA2568708171a9b8b321e890a72e6c37f76f7699d1d94d5db2ec8ee896cf254fb1ae5
SHA5122204846867cbdae968727b0d3ddcb6935789fb4d630ed47985ac4f78fcd440473f647808355468b1817794aa364dca78672748339b83251431808c96b7a2fa68
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD523278a01c5db586461119d34d85cf6db
SHA1d6a7b31be6b03489c4c3781fd8e6c3a5ae859d83
SHA25632452abf755e89684082b80cb894b1502799d713383ca0fd212eb30793ddf7f9
SHA512f33523ac453bde8c65bc462fde63b3c6d4c7cb38d7c1cd79ecf330aef2a054c66a033438880f26b6649bef6248a62f8b59a90187029ed1d2ec7b07091e5c2727
-
Filesize
10KB
MD54238dca7f4db90ed30609a6d24a09aee
SHA1732818d96335b0df2bbf057edb3ed942a5c55020
SHA2564c043da4e94851fcca5e7ec8447d8e675e2bca74e7dc2fc3f42632c7aff42af7
SHA512491b96fde8d174631422978b187f6969987169d2921b61306438489cc225df15ffce0a959b74c0a4eb74afb8418d1a5efb87360a312c6e733d301ac47800ceed
-
Filesize
10KB
MD5c45c9ca85a058e37bf9f086079c24224
SHA1b9e12533f56204c4f1711d57907f3b7468483695
SHA2562b7c808b45cc2fa61441a347c21853bd1267c0896ac7ea4070107bf4931daa7c
SHA512c5484f228ba53b2f7e42ca99d23e5ac87a74f48a6bf8848fa7df01ef6fc68ccf245a1d5d464dbdbf76bf39550a2c2998170bea2a9a28f86f7fd56bfc94b1b2d9
-
Filesize
10KB
MD5f0b06fae38b7df7f32cc6f7ba9d96556
SHA1b0e8fce0dc0258b0c2b4071957dc0c7a44f16388
SHA2567c6c10502b2a88e70a05b48d1ea3ba4d60dac8bcf9917afe8af58ec59df13feb
SHA5125b619e4a2e40928965fa1717e948e5baaa73dffcdd0f45b44c605b9216724aa8cc4357aefdab57900d1460355471bcc3708c181892d7f79e228f07e19651743d
-
Filesize
2.5MB
MD551397005ac7db572e3af109699f4ba73
SHA1c9bcb56dd1a4c4b687917aac34f703908a5d4bde
SHA25607bd44748b663d9efbf35cd962408b57ad72a7ce65bdc2722db284f343b2d891
SHA512512740d00adf5512cd8f6ca163a1c137a0e17091243d880271945b90306f7ddc6b47928b27985c5b60b4474e5be57273308babe50986fda638dc6b8ea2f0f2c8
-
Filesize
339KB
MD50faa74d371ad58d493b2df890c610774
SHA1c7a155aca4a20258fc1105b91d5d94205415546a
SHA2564d6330d6d983a30c5a0e469058075e96b6e8109daff1ac41a910aab2621f488d
SHA512fa603a7a93062d72ff33e3a0562357169148470ac0defef8145d629a5efa7e87f5481a82ee1a7c4e8bcb26e242f7fa4074076f2ca0a08fa0e0b158544f9da223
-
Filesize
5.0MB
MD57bfe885d87026d0d41dba5fb4173201c
SHA1027637e1c7fd24a7bbaba6b926cce67e47d8e7dc
SHA2562b529e8afa002053744bb4e2430513e7745f91b5052446ef2d0568e91d5b1280
SHA512d2ded5d1c216900e340425f652c585398f2662f3aefe552e80161af90d1656d2ed202366c2ac794564dbf6eca0c1d769f62fcb979a0d666ea06540e389a30951
-
Filesize
183KB
MD56d7f976b644410f6251697469e25af61
SHA1faa26974833529f162cde7273405bcc6a945a9b6
SHA256bb83eb8a0ae75c425f6ec72af554e5f8158eb4ffa0a898e26b564fc0217c8ae5
SHA512e160464239b42bdaade8a50e762e233053627c67bccd435c8431aff5efed36945f5524b5e1e56821625ff71456eb5b640ace959aa728d0cf186c1c91a7cf39d7