File name:

bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe

Full analysis: https://app.any.run/tasks/fb68bfb2-d828-4ce5-9f0e-3d77bd3e8563
Verdict: Malicious activity
Analysis date: October 22, 2024, 13:49:16
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

EEB85A876C2E5F3163486D6C567D6EE4

SHA1:

BB3E309B37BCACDA56DBD5CB0EDD8ECA1205B1AE

SHA256:

35F9B8D70BF0C6176761A105752B142BAF1B3E9483DE38DE39FA60D97A792BCB

SSDEEP:

98304:epyWFrQ0fPvjA+fUrJwTS6LJm1uAVSlwLdqMNRavOv78avFQHvU7nRq/MTzKiecB:4myCjIm+u

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • bomgar-scc.exe (PID: 6280)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
    • The process creates files with name similar to system file names

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
    • Reads security settings of Internet Explorer

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
      • bomgar-scc.exe (PID: 5788)
    • Executable content was dropped or overwritten

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
      • bomgar-scc.exe (PID: 5788)
      • bomgar-scc.exe (PID: 6280)
    • The executable file from the user directory is run by the CMD process

      • spinner.exe (PID: 4808)
    • Starts CMD.EXE for commands execution

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
    • Executing commands from ".cmd" file

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
    • Process drops legitimate windows executable

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
      • bomgar-scc.exe (PID: 5788)
    • Starts itself from another location

      • bomgar-scc.exe (PID: 5788)
    • Checks Windows Trust Settings

      • bomgar-scc.exe (PID: 5788)
    • Application launched itself

      • bomgar-scc.exe (PID: 6280)
      • bomgar-scc.exe (PID: 5748)
    • Executes as Windows Service

      • bomgar-scc.exe (PID: 5748)
  • INFO

    • Create files in a temporary directory

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
      • bomgar-scc.exe (PID: 5788)
    • The process uses the downloaded file

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
    • Process checks computer location settings

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
    • Sends debugging messages

      • spinner.exe (PID: 4808)
    • Checks supported languages

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
      • spinner.exe (PID: 4808)
      • bomgar-scc.exe (PID: 5788)
      • bomgar-scc.exe (PID: 6280)
    • Reads the computer name

      • bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe (PID: 2224)
      • bomgar-scc.exe (PID: 5788)
      • spinner.exe (PID: 4808)
      • bomgar-scc.exe (PID: 6280)
    • Reads product name

      • bomgar-scc.exe (PID: 5788)
      • bomgar-scc.exe (PID: 6280)
    • Reads Environment values

      • bomgar-scc.exe (PID: 5788)
      • bomgar-scc.exe (PID: 6280)
    • Creates files in the program directory

      • bomgar-scc.exe (PID: 5788)
      • bomgar-scc.exe (PID: 6280)
    • Reads the machine GUID from the registry

      • bomgar-scc.exe (PID: 6280)
      • bomgar-scc.exe (PID: 5788)
    • Reads the software policy settings

      • bomgar-scc.exe (PID: 5788)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:04:02 03:20:09+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 24064
InitializedDataSize: 120320
UninitializedDataSize: 1024
EntryPoint: 0x326c
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 23.3.5.4158
ProductVersionNumber: 23.3.5.4158
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Windows, Latin1
CompanyName: bomgar
FileDescription: BeyondTrust Remote Support
FileVersion: 23.3.5.4158
LegalCopyright: Copyright (C) 2002-2023 BeyondTrust Corporation. Redistribution Prohibited. All Rights Reserved.
ProductName: BeyondTrust Remote Support
ProductVersion: 23.3.5 (4158-e73a359ab9e31243011a2ce7932a8ba5fae597b5)
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
10
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe cmd.exe no specs conhost.exe no specs spinner.exe bomgar-scc.exe bomgar-scc.exe bomgar-scc.exe no specs bomgar-scc.exe bomgar-scc.exe no specs bomgar-scc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1452\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2224"C:\Users\admin\AppData\Local\Temp\bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe" C:\Users\admin\AppData\Local\Temp\bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3028C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\start.cmd" "C:\Windows\SysWOW64\cmd.exebomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3532"C:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exe" -elevateC:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exe
bomgar-scc.exe
User:
admin
Company:
BeyondTrust
Integrity Level:
HIGH
Description:
Remote Support Customer Client
Exit code:
0
Version:
23.3.5 (4158-e73a359ab9e31243011a2ce7932a8ba5fae597b5)
4808"C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner.exe" --instance-id $SPIN_INSTANCE --icofile $SPIN_ICON C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Description:
spinner Module
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\nspdfeb.tmpspinner-$spin_instance\spinner.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5524C:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exe -proxydetectC:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exebomgar-scc.exe
User:
admin
Company:
BeyondTrust
Integrity Level:
MEDIUM
Description:
Remote Support Customer Client
Exit code:
0
Version:
23.3.5 (4158-e73a359ab9e31243011a2ce7932a8ba5fae597b5)
5748"C:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exe" -pinned elevatedC:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exeservices.exe
User:
SYSTEM
Company:
BeyondTrust
Integrity Level:
SYSTEM
Description:
Remote Support Customer Client
Version:
23.3.5 (4158-e73a359ab9e31243011a2ce7932a8ba5fae597b5)
5788"C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\bomgar-scc.exe" "C:\Users\admin\AppData\Local\Temp\bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe" -install1 "C:\Users\admin\AppData\Local\Temp\bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe" --installer-pwd "C:\Users\admin\AppData\Local\Temp"C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\bomgar-scc.exe
bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nspdfeb.tmpb\bomgar-scc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6280C:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exe C:\Users\admin\AppData\Local\Temp\bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe -install2 C:\Users\admin\AppData\Local\Temp\bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exe C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\ C:\ProgramData\bomgar-scc-0x6717ad6c\ --installer-pwd C:\Users\admin\AppData\Local\TempC:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exe
bomgar-scc.exe
User:
admin
Company:
BeyondTrust
Integrity Level:
MEDIUM
Description:
Remote Support Customer Client
Exit code:
0
Version:
23.3.5 (4158-e73a359ab9e31243011a2ce7932a8ba5fae597b5)
Modules
Images
c:\programdata\bomgar-scc-0x6717ad6c\bomgar-scc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6476"C:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exe" -pinned droneC:\ProgramData\bomgar-scc-0x6717ad6c\bomgar-scc.exebomgar-scc.exe
User:
SYSTEM
Company:
BeyondTrust
Integrity Level:
SYSTEM
Description:
Remote Support Customer Client
Version:
23.3.5 (4158-e73a359ab9e31243011a2ce7932a8ba5fae597b5)
Total events
3 402
Read events
3 401
Write events
1
Delete events
0

Modification events

(PID) Process:(6280) bomgar-scc.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Bomgar_Cleanup_ZD5848127433
Value:
cmd.exe /C rd /S /Q "C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb" & reg.exe delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Bomgar_Cleanup_ZD5848127433 /f
Executable files
23
Suspicious files
6
Text files
72
Unknown types
2

Dropped files

PID
Process
Filename
Type
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\spinner.exeexecutable
MD5:D8FFF6ACA80D1F46B3181E3B42B85B4C
SHA256:82E0F1B13DF9F6EF804BA15126E71659DEA770EAB23B9B13DAF3558F1808735F
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-1.bmpimage
MD5:7604363A3DB0D8202ABFD9C16D154D4E
SHA256:D732DD994C232E710145E43062E5E085E3897B885ACFB5422B6C395E3295042D
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\startup_animation_1.bmpimage
MD5:7604363A3DB0D8202ABFD9C16D154D4E
SHA256:D732DD994C232E710145E43062E5E085E3897B885ACFB5422B6C395E3295042D
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\startup_animation_5.bmpimage
MD5:0DB01E512C8B09FEA1C1BCB93DDF0650
SHA256:B42445F9D216CDEEBB1463F018616AB955FEF00B3F86548D88910CF60C7B5DE8
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\startup_animation_2.bmpimage
MD5:0B312FD112C34504680ABCE9FE6EAA13
SHA256:EB3FF2CACD409461C6A8DDE65D278C296745401FAFFFD6ECDCF470E595C98008
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-2.bmpimage
MD5:0B312FD112C34504680ABCE9FE6EAA13
SHA256:EB3FF2CACD409461C6A8DDE65D278C296745401FAFFFD6ECDCF470E595C98008
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\bc-status-alert.pngimage
MD5:CD021CCBE9692C635BEC0CCA1A8726D7
SHA256:4E6D31C815B0D1A80E6E76D597FA260EE4E697F74861C968BA788F3766569991
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpb\chat.wavwav
MD5:08071F39F4EB5F201776D297F16DD75D
SHA256:9D11DC231676F783BE1C370178CA63FDC3AAD5536B1791457AA2EEDF08553E34
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-5.bmpimage
MD5:0DB01E512C8B09FEA1C1BCB93DDF0650
SHA256:B42445F9D216CDEEBB1463F018616AB955FEF00B3F86548D88910CF60C7B5DE8
2224bomgar-scc-w0eec30hwzddj85fzhh1i7yyfihwh8i66d1yhezc40hc90.exeC:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner.exeexecutable
MD5:D8FFF6ACA80D1F46B3181E3B42B85B4C
SHA256:82E0F1B13DF9F6EF804BA15126E71659DEA770EAB23B9B13DAF3558F1808735F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
58
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.177:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.48.23.177:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
104.126.37.176:443
th.bing.com
Akamai International B.V.
DE
whitelisted
23.48.23.177:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
192.168.100.255:138
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
104.126.37.178:443
th.bing.com
Akamai International B.V.
DE
whitelisted
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.48.23.177
  • 23.48.23.156
  • 23.48.23.176
  • 23.48.23.147
  • 23.48.23.164
  • 23.48.23.173
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 172.217.23.110
whitelisted
login.live.com
  • 20.190.159.68
  • 20.190.159.64
  • 20.190.159.73
  • 20.190.159.23
  • 20.190.159.2
  • 20.190.159.0
  • 40.126.31.69
  • 40.126.31.67
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
th.bing.com
  • 104.126.37.178
  • 104.126.37.185
  • 104.126.37.176
  • 104.126.37.171
  • 104.126.37.177
  • 104.126.37.179
  • 104.126.37.184
  • 104.126.37.123
  • 104.126.37.186
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
eriez.beyondtrustcloud.com
  • 3.17.193.226
unknown
client.wns.windows.com
  • 40.83.240.146
whitelisted

Threats

No threats detected
Process
Message
spinner.exe
SPN(1084):>CMainWindow::CMainWindow
spinner.exe
SPN(1084):image C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-1.bmp
spinner.exe
SPN(1084):image C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-2.bmp
spinner.exe
SPN(1084):image C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-3.bmp
spinner.exe
SPN(1084):image C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-4.bmp
spinner.exe
SPN(1084):image C:\Users\admin\AppData\Local\Temp\nspDFEB.tmpspinner-$SPIN_INSTANCE\spinner-5.bmp
spinner.exe
SPN(1084):<CMainWindow::CMainWindow
spinner.exe
SPN(1084):>CMainWindow::Create
spinner.exe
SPN(1084):>CMainWindow::OnCreate
spinner.exe
SPN(1084):<CMainWindow::OnCreate