File name:

bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe

Full analysis: https://app.any.run/tasks/fb68bfb2-d828-4ce5-9f0e-3d77bd3e8563
Verdict: Malicious activity
Analysis date: October 22, 2024, 13:49:16
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

EEB85A876C2E5F3163486D6C567D6EE4

SHA1:

BB3E309B37BCACDA56DBD5CB0EDD8ECA1205B1AE

SHA256:

35F9B8D70BF0C6176761A105752B142BAF1B3E9483DE38DE39FA60D97A792BCB

SSDEEP:

98304:epyWFrQ0fPvjA+fUrJwTS6LJm1uAVSlwLdqMNRavOv78avFQHvU7nRq/MTzKiecB:4myCjIm+u

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • bomgar-scc.exe (PID: 6280)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
      • bomgar-scc.exe (PID: 5788)
      • bomgar-scc.exe (PID: 6280)
    • The process creates files with name similar to system file names

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
    • Reads security settings of Internet Explorer

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
      • bomgar-scc.exe (PID: 5788)
    • Starts CMD.EXE for commands execution

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
    • Executing commands from ".cmd" file

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
    • The executable file from the user directory is run by the CMD process

      • spinner.exe (PID: 4808)
    • Process drops legitimate windows executable

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
      • bomgar-scc.exe (PID: 5788)
    • Starts itself from another location

      • bomgar-scc.exe (PID: 5788)
    • Checks Windows Trust Settings

      • bomgar-scc.exe (PID: 5788)
    • Application launched itself

      • bomgar-scc.exe (PID: 6280)
      • bomgar-scc.exe (PID: 5748)
    • Executes as Windows Service

      • bomgar-scc.exe (PID: 5748)
  • INFO

    • Checks supported languages

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
      • spinner.exe (PID: 4808)
      • bomgar-scc.exe (PID: 6280)
      • bomgar-scc.exe (PID: 5788)
    • Create files in a temporary directory

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
      • bomgar-scc.exe (PID: 5788)
    • Reads the computer name

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
      • spinner.exe (PID: 4808)
      • bomgar-scc.exe (PID: 5788)
      • bomgar-scc.exe (PID: 6280)
    • Process checks computer location settings

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
    • The process uses the downloaded file

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
    • Sends debugging messages

      • spinner.exe (PID: 4808)
    • Reads product name

      • bomgar-scc.exe (PID: 5788)
      • bomgar-scc.exe (PID: 6280)
    • Creates files in the program directory

      • bomgar-scc.exe (PID: 5788)
      • bomgar-scc.exe (PID: 6280)
    • Reads Environment values

      • bomgar-scc.exe (PID: 5788)
      • bomgar-scc.exe (PID: 6280)
    • Reads the software policy settings

      • bomgar-scc.exe (PID: 5788)
    • Reads the machine GUID from the registry

      • bomgar-scc.exe (PID: 5788)
      • bomgar-scc.exe (PID: 6280)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:04:02 03:20:09+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 24064
InitializedDataSize: 120320
UninitializedDataSize: 1024
EntryPoint: 0x326c
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 23.3.5.4158
ProductVersionNumber: 23.3.5.4158
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Windows, Latin1
CompanyName: bomgar
FileDescription: BeyondTrust Remote Support
FileVersion: 23.3.5.4158
LegalCopyright: Copyright (C) 2002-2023 BeyondTrust Corporation. Redistribution Prohibited. All Rights Reserved.
ProductName: BeyondTrust Remote Support
ProductVersion: 23.3.5 (4158-e73a359ab9e31243011a2ce7932a8ba5fae597b5)
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
10
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe cmd.exe no specs conhost.exe no specs spinner.exe bomgar-scc.exe bomgar-scc.exe bomgar-scc.exe no specs bomgar-scc.exe bomgar-scc.exe no specs bomgar-scc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1452\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2224"C:\Users\admin\AppData\Local\Temp\bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe" C:\Users\admin\AppData\Local\Temp\bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3028C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\start.cmd" "C:\Windows\SysWOW64\cmd.exebomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3532"C:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exe" -elevateC:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exe
bomgar-scc.exe
User:
admin
Company:
BeyondTrust
Integrity Level:
HIGH
Description:
Remote Support Customer Client
Exit code:
0
Version:
23.3.5 (4158-e73a359ab9e31243011a2ce7932a8ba5fae597b5)
4808"C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner.exe" --instance-id $SPIN_INSTANCE --icofile $SPIN_ICON C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Description:
spinner Module
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\nspdfeb.tmpspinner-$spin_instance\spinner.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5524C:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exe -proxydetectC:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exebomgar-scc.exe
User:
admin
Company:
BeyondTrust
Integrity Level:
MEDIUM
Description:
Remote Support Customer Client
Exit code:
0
Version:
23.3.5 (4158-e73a359ab9e31243011a2ce7932a8ba5fae597b5)
5748"C:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exe" -pinned elevatedC:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exeservices.exe
User:
SYSTEM
Company:
BeyondTrust
Integrity Level:
SYSTEM
Description:
Remote Support Customer Client
Version:
23.3.5 (4158-e73a359ab9e31243011a2ce7932a8ba5fae597b5)
5788"C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\bomgar-scc.exe" "C:\Users\admin\AppData\Local\Temp\bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe" -install1 "C:\Users\admin\AppData\Local\Temp\bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe" --installer-pwd "C:\Users\admin\AppData\Local\Temp"C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\bomgar-scc.exe
bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nspdfeb.tmpb\bomgar-scc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6280C:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exe C:\Users\admin\AppData\Local\Temp\bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe -install2 C:\Users\admin\AppData\Local\Temp\bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\ C:\ProgramData\bomgar-scc-0x6717ad6c\ --installer-pwd C:\Users\admin\AppData\Local\TempC:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exe
bomgar-scc.exe
User:
admin
Company:
BeyondTrust
Integrity Level:
MEDIUM
Description:
Remote Support Customer Client
Exit code:
0
Version:
23.3.5 (4158-e73a359ab9e31243011a2ce7932a8ba5fae597b5)
Modules
Images
c:\programdata\bomgar-scc-0x6717ad6c\bomgar-scc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6476"C:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exe" -pinned droneC:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exebomgar-scc.exe
User:
SYSTEM
Company:
BeyondTrust
Integrity Level:
SYSTEM
Description:
Remote Support Customer Client
Version:
23.3.5 (4158-e73a359ab9e31243011a2ce7932a8ba5fae597b5)
Total events
3 402
Read events
3 401
Write events
1
Delete events
0

Modification events

(PID) Process:(6280) bomgar-scc.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Bomgar_Cleanup_ZD5848127433
Value:
cmd.exe /C rd /S /Q "C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb" & reg.exe delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Bomgar_Cleanup_ZD5848127433 /f
Executable files
23
Suspicious files
6
Text files
72
Unknown types
2

Dropped files

PID
Process
Filename
Type
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\spinner.exeexecutable
MD5:D8FFF6ACA80D1F46B3181E3B42B85B4C
SHA256:82E0F1B13DF9F6EF804BA15126E71659DEA770EAB23B9B13DAF3558F1808735F
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\startup_animation_3.bmpimage
MD5:915B8A9DE4CCEF690B17A5A66B945487
SHA256:BD8E3F9CCF7F108DEFDF28C74D238AFA01BD22F119A782497C1FFDCDB0CD0CC8
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmp\System.dllexecutable
MD5:D76DF4ED7A935E9E9EFFC492BFABD876
SHA256:2B7A5A8C98358AE32B0BCB468C7142C46CB2BAB5A1FDA11D3EE67D7013476925
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\startup_animation_1.bmpimage
MD5:7604363A3DB0D8202ABFD9C16D154D4E
SHA256:D732DD994C232E710145E43062E5E085E3897B885ACFB5422B6C395E3295042D
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\startup_animation_2.bmpimage
MD5:0B312FD112C34504680ABCE9FE6EAA13
SHA256:EB3FF2CACD409461C6A8DDE65D278C296745401FAFFFD6ECDCF470E595C98008
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\preload-en-us.rdfbinary
MD5:DB00C76F7156C7AFF856C6DFD991D672
SHA256:F376B993B43C00B8448A6311B84E1CB3D0A8993290A1F6D8358130F84090552B
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-4.bmpimage
MD5:EBCFFEA1A5E062435B12BAFA37509C9D
SHA256:B41EF27CDCDC734B675F6A057D0130DB083B232C1456DF89F6B29DDCF2E01C45
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-3.bmpimage
MD5:915B8A9DE4CCEF690B17A5A66B945487
SHA256:BD8E3F9CCF7F108DEFDF28C74D238AFA01BD22F119A782497C1FFDCDB0CD0CC8
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-5.bmpimage
MD5:0DB01E512C8B09FEA1C1BCB93DDF0650
SHA256:B42445F9D216CDEEBB1463F018616AB955FEF00B3F86548D88910CF60C7B5DE8
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-1.bmpimage
MD5:7604363A3DB0D8202ABFD9C16D154D4E
SHA256:D732DD994C232E710145E43062E5E085E3897B885ACFB5422B6C395E3295042D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
58
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.177:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.48.23.177:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
104.126.37.176:443
th.bing.com
Akamai International B.V.
DE
whitelisted
23.48.23.177:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
192.168.100.255:138
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
104.126.37.178:443
th.bing.com
Akamai International B.V.
DE
whitelisted
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.48.23.177
  • 23.48.23.156
  • 23.48.23.176
  • 23.48.23.147
  • 23.48.23.164
  • 23.48.23.173
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 172.217.23.110
whitelisted
login.live.com
  • 20.190.159.68
  • 20.190.159.64
  • 20.190.159.73
  • 20.190.159.23
  • 20.190.159.2
  • 20.190.159.0
  • 40.126.31.69
  • 40.126.31.67
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
th.bing.com
  • 104.126.37.178
  • 104.126.37.185
  • 104.126.37.176
  • 104.126.37.171
  • 104.126.37.177
  • 104.126.37.179
  • 104.126.37.184
  • 104.126.37.123
  • 104.126.37.186
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
eriez.beyondtrustcloud.com
  • 3.17.193.226
unknown
client.wns.windows.com
  • 40.83.240.146
whitelisted

Threats

No threats detected
Process
Message
spinner.exe
SPN(1084):>CMainWindow::CMainWindow
spinner.exe
SPN(1084):image C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-1.bmp
spinner.exe
SPN(1084):image C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-2.bmp
spinner.exe
SPN(1084):image C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-3.bmp
spinner.exe
SPN(1084):image C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-4.bmp
spinner.exe
SPN(1084):image C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-5.bmp
spinner.exe
SPN(1084):<CMainWindow::CMainWindow
spinner.exe
SPN(1084):>CMainWindow::Create
spinner.exe
SPN(1084):>CMainWindow::OnCreate
spinner.exe
SPN(1084):<CMainWindow::OnCreate