File name:

TsarBomba.exe

Full analysis: https://app.any.run/tasks/f839e9a4-c9bb-420b-8ac8-c8ce32937f33
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: June 29, 2025, 11:49:40
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
valley
rat
discord
raworld
ransomware
meterpreter
backdoor
telegram
generic
purelogs
stealer
websocket
killmbr
mbr
cobaltstrike
tool
vidar
dbatloader
loader
redline
crypto-regex
java
delphi
dcrat
evasion
neshta
xor-url
lockbit
discordgrabber
umbralstealer
medusa
chaos
umbral
snake
keylogger
vipkeylogger
metasploit
framework
agenttesla
lumma
masslogger
resolverrat
adware
formbook
strrat
xorist
adesstealer
darkvision
avemaria
jlocker
discordtoken
screenconnect
rmm-tool
rdp
nanocore
hiddentear
asyncrat
rustystealer
auto-sch-xml
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 4 sections
MD5:

91025D6F02E542F2E37FFCE7D0CE8B51

SHA1:

E2D80EF6075556CD23CE0445473C061F200B5DD4

SHA256:

3755718DB9D33F4ABA2563DE454D4530A308B41B1096C904102D08E2101F2020

SSDEEP:

196608:OhuvCqhWk4mEsw8VKcgdiyXXLO7Lz30zVKHfXk7ra62OIkwYTQUR2NA:gg4t8VrgTioVcfXka62Bk7TQUR2NA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • VALLEY has been found (auto)

      • TsarBomba.exe (PID: 4412)
      • TsarBomba.exe (PID: 4412)
    • RANSOMWARE has been found (auto)

      • TsarBomba.exe (PID: 4412)
    • GENERIC has been found (auto)

      • TsarBomba.exe (PID: 4412)
      • TsarBomba.exe (PID: 4412)
    • FRAMEWORK has been found (auto)

      • TsarBomba.exe (PID: 4412)
    • DCRAT has been found (auto)

      • TsarBomba.exe (PID: 4412)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
    • PURELOGS has been found (auto)

      • TsarBomba.exe (PID: 4412)
    • DBATLOADER has been found (auto)

      • TsarBomba.exe (PID: 4412)
    • KILLMBR has been found (auto)

      • TsarBomba.exe (PID: 4412)
    • RAWORLD mutex has been found

      • 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe (PID: 640)
    • Deletes shadow copies

      • cmd.exe (PID: 6164)
      • cmd.exe (PID: 8096)
      • cmd.exe (PID: 9440)
      • cmd.exe (PID: 8152)
      • cmd.exe (PID: 11836)
      • cmd.exe (PID: 2780)
    • RANSOMWARE has been detected

      • 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe (PID: 640)
      • 77ebb550f38da3f28a65940a4c665ae3a679249ad906aa39387568a1f7ddd3fa.exe (PID: 5560)
      • 771a06e3a1bdb42a7249d1c888e740c2bc46ba30b54490188c17f6c84ca96e26.exe (PID: 7876)
    • Actions looks like stealing of personal data

      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe (PID: 9812)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 10164)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
    • Renames files like ransomware

      • 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe (PID: 640)
      • 77ebb550f38da3f28a65940a4c665ae3a679249ad906aa39387568a1f7ddd3fa.exe (PID: 5560)
      • 771a06e3a1bdb42a7249d1c888e740c2bc46ba30b54490188c17f6c84ca96e26.exe (PID: 7876)
    • Steals credentials from Web Browsers

      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe (PID: 9812)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 10164)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
    • Executing a file with an untrusted certificate

      • 7a8c864ed8b7ca908d3f317d7e63a30a85fb3e8c94070f23f2cf0bfa01c5e0b5.exe (PID: 1132)
      • cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe (PID: 8464)
      • remoteadmin.exe (PID: 3756)
    • STEALER has been found (auto)

      • TsarBomba.exe (PID: 4412)
    • Adds path to the Windows Defender exclusion list

      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba.exe (PID: 9180)
      • cmd.exe (PID: 8828)
      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
      • 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe (PID: 3048)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 8148)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
    • Changes Windows Defender settings

      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • cmd.exe (PID: 8828)
      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
    • VIDAR mutex has been found

      • MSBuild.exe (PID: 7476)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 7560)
      • powershell.exe (PID: 9224)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 7512)
      • cmd.exe (PID: 9108)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 10036)
      • cmd.exe (PID: 9684)
      • cmd.exe (PID: 4648)
    • ADWARE has been found (auto)

      • TsarBomba.exe (PID: 4412)
    • XORed URL has been found (YARA)

      • TsarBomba.exe (PID: 4412)
      • 1bad2b6e8ab16c5a692b2d05f68f7924a73a5818ddf3a9678ca8caab3568a78e.exe (PID: 4168)
    • RAT has been found (auto)

      • TsarBomba.exe (PID: 4412)
    • [YARA] LockBit is detected

      • TsarBomba.exe (PID: 4412)
    • UMBRALSTEALER has been detected (YARA)

      • TsarBomba.exe (PID: 4412)
    • DISCORDGRABBER has been detected (YARA)

      • TsarBomba.exe (PID: 4412)
    • METERPRETER has been detected (SURICATA)

      • 755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe (PID: 7644)
    • NANOCORE has been found (auto)

      • TsarBomba.exe (PID: 4412)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 10036)
    • XORIST has been found (auto)

      • TsarBomba.exe (PID: 4412)
      • e98182d44dc7ec4a154021757da3132769db318cf9d78f15fc06c92682f8a253.exe (PID: 9004)
    • ADESSTEALER has been found (auto)

      • TsarBomba.exe (PID: 4412)
    • Create files in the Startup directory

      • aead1f538ae65044f17554b188d4d1f88d7c4840bb554f3d70a2fe3ab86f6abf.exe (PID: 9032)
    • JLOCKER has been found (auto)

      • TsarBomba.exe (PID: 4412)
    • Changes the autorun value in the registry

      • e98182d44dc7ec4a154021757da3132769db318cf9d78f15fc06c92682f8a253.exe (PID: 9004)
      • svchost.exe (PID: 8404)
      • d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe (PID: 10220)
      • MSBuild.exe (PID: 9172)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 10036)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
    • NESHTA mutex has been found

      • InstallUtil.exe (PID: 6932)
    • DISCORDTOKEN has been found (auto)

      • TsarBomba.exe (PID: 4412)
    • REDLINE has been detected (YARA)

      • TsarBomba.exe (PID: 4412)
      • 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe (PID: 5712)
    • HIDDENTEAR has been found (auto)

      • TsarBomba.exe (PID: 4412)
    • Starts CMD.EXE for self-deleting

      • f74ea81bcd59a58e2784f74cd28c63744de51639ccc974507eff5619764b0f4d.exe (PID: 9196)
    • AVEMARIA has been found (auto)

      • d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe (PID: 10220)
    • Changes the login/logoff helper path in the registry

      • cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe (PID: 8464)
    • Changes the AppInit_DLLs value (autorun option)

      • cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe (PID: 8464)
    • Disables Windows Defender

      • RegAsm.exe (PID: 9832)
    • Connects to the CnC server

      • svchost.exe (PID: 2200)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2200)
    • Starts NET.EXE for service management

      • 1bad2b6e8ab16c5a692b2d05f68f7924a73a5818ddf3a9678ca8caab3568a78e.exe (PID: 4168)
      • net.exe (PID: 8416)
      • net.exe (PID: 10872)
      • net.exe (PID: 6636)
      • net.exe (PID: 9988)
      • net.exe (PID: 12100)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 9676)
    • Deletes a file (SCRIPT)

      • wscript.exe (PID: 9676)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 7560)
      • powershell.exe (PID: 9224)
    • Disables task manager

      • reg.exe (PID: 8088)
    • SNAKEKEYLOGGER has been detected (SURICATA)

      • 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe (PID: 9812)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 10164)
    • Disables the Run the Start menu

      • reg.exe (PID: 7376)
    • AGENTTESLA has been found (auto)

      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
      • 771a06e3a1bdb42a7249d1c888e740c2bc46ba30b54490188c17f6c84ca96e26.exe (PID: 7876)
    • Changes settings for real-time protection

      • powershell.exe (PID: 9424)
    • Changes settings for sending potential threat samples to Microsoft servers

      • powershell.exe (PID: 9424)
    • Changes settings for checking scripts for malicious actions

      • powershell.exe (PID: 9424)
    • Changes antivirus protection settings for downloading files from the Internet (IOAVProtection)

      • powershell.exe (PID: 9424)
    • Changes settings for protection against network attacks (IPS)

      • powershell.exe (PID: 9424)
    • Changes Controlled Folder Access settings

      • powershell.exe (PID: 9424)
    • Changes settings for reporting to Microsoft Active Protection Service (MAPS)

      • powershell.exe (PID: 9424)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • TsarBomba.exe (PID: 4412)
      • InstallUtil.exe (PID: 6932)
      • 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe (PID: 3048)
      • MSBuild.exe (PID: 9172)
    • Reads security settings of Internet Explorer

      • TsarBomba.exe (PID: 4412)
      • 4d5ecf3d1955458195771630f03f6ef42f5f62e66ed8e0681f8311d25aecc2bb.exe (PID: 6516)
      • 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe (PID: 640)
      • 755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe (PID: 7644)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • MSBuild.exe (PID: 7476)
      • CasPol.exe (PID: 7960)
      • ShellExperienceHost.exe (PID: 8740)
      • 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe (PID: 3048)
      • svchost.com (PID: 9696)
      • svchost.com (PID: 9884)
      • dfsvc.exe (PID: 9708)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 8148)
      • MSBuild.exe (PID: 9172)
      • cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe (PID: 8464)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
      • 0379d402a94f960380d7d91e3bfa106eeac01cd39ae7b0ba5010ba737088a215.exe (PID: 7404)
    • Starts a Microsoft application from unusual location

      • 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe (PID: 3048)
      • c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba.exe (PID: 9180)
    • Starts POWERSHELL.EXE for commands execution

      • 1bad2b6e8ab16c5a692b2d05f68f7924a73a5818ddf3a9678ca8caab3568a78e.exe (PID: 4168)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • mshta.exe (PID: 7528)
      • mshta.exe (PID: 9116)
      • cmd.exe (PID: 8828)
      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
      • RegAsm.exe (PID: 9832)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
    • Executable content was dropped or overwritten

      • TsarBomba.exe (PID: 4412)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • e98182d44dc7ec4a154021757da3132769db318cf9d78f15fc06c92682f8a253.exe (PID: 9004)
      • aead1f538ae65044f17554b188d4d1f88d7c4840bb554f3d70a2fe3ab86f6abf.exe (PID: 9032)
      • InstallUtil.exe (PID: 6932)
      • 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe (PID: 3048)
      • d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe (PID: 10220)
      • cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe (PID: 8464)
      • MSBuild.exe (PID: 9172)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 10036)
      • powershell.exe (PID: 7560)
      • powershell.exe (PID: 9224)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
      • 771a06e3a1bdb42a7249d1c888e740c2bc46ba30b54490188c17f6c84ca96e26.exe (PID: 7876)
    • Reads the date of Windows installation

      • 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe (PID: 640)
      • 4d5ecf3d1955458195771630f03f6ef42f5f62e66ed8e0681f8311d25aecc2bb.exe (PID: 6516)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe (PID: 8464)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
    • Starts CMD.EXE for commands execution

      • 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe (PID: 640)
      • 188c3798b6d41bdfa3981bb61a40b81f4fe123c64b9bed2d4c40951de2064f19.exe (PID: 7368)
      • 80e3a04fa68be799b3c91737e1918f8394b250603a231a251524244e4d7f77d9.exe (PID: 1984)
      • ab0acdb0c45ccafcc0ec594d30dc8153936574dde9ebe4e0b22504770361c666.exe (PID: 8944)
      • c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba.exe (PID: 9180)
      • 65fd5041c1a1c4115b0c59995221023486f02e5e5d8e313c3e48f3a42ef9a623.exe (PID: 3952)
      • f74ea81bcd59a58e2784f74cd28c63744de51639ccc974507eff5619764b0f4d.exe (PID: 9196)
      • cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe (PID: 8464)
      • images.exe (PID: 9040)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
    • Start notepad (likely ransomware note)

      • 4d5ecf3d1955458195771630f03f6ef42f5f62e66ed8e0681f8311d25aecc2bb.exe (PID: 6516)
    • Creates file in the systems drive root

      • 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe (PID: 640)
      • 77ebb550f38da3f28a65940a4c665ae3a679249ad906aa39387568a1f7ddd3fa.exe (PID: 5560)
    • Executes as Windows Service

      • VSSVC.exe (PID: 7328)
    • Script adds exclusion path to Windows Defender

      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • cmd.exe (PID: 8828)
      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
    • Creates or modifies Windows services

      • 539b377d4a33d1e884f18ecf0e0b0330e5dc26023b7ae051843cac8014142d98.exe (PID: 7500)
    • Write to the desktop.ini file (may be used to cloak folders)

      • 77ebb550f38da3f28a65940a4c665ae3a679249ad906aa39387568a1f7ddd3fa.exe (PID: 5560)
      • c348c7e4d9028bdf84aba828bbb81ce46ae55c0246a94351edbfb9c63e41a8ee.exe (PID: 8244)
    • Found IP address in command line

      • powershell.exe (PID: 7560)
      • powershell.exe (PID: 9224)
    • Starts process via Powershell

      • powershell.exe (PID: 7560)
      • powershell.exe (PID: 9224)
    • Manipulates environment variables

      • powershell.exe (PID: 7560)
      • powershell.exe (PID: 9224)
    • Probably download files using WebClient

      • mshta.exe (PID: 7528)
      • mshta.exe (PID: 9116)
    • Connects to unusual port

      • 4d5ecf3d1955458195771630f03f6ef42f5f62e66ed8e0681f8311d25aecc2bb.exe (PID: 6516)
      • 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe (PID: 5712)
      • 9c65d850589e6ab34c6c8e65b8a3b4aa26fa913ca850472023a3b708f95c226b.exe (PID: 5548)
      • 755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe (PID: 7644)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • images.exe (PID: 9040)
      • 145289accb8c684e583ca3d99532d64d0a6a40142062e648c65ffd8da070c4c9.exe (PID: 8600)
      • remoteadmin.exe (PID: 3756)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 10036)
    • Executed via WMI

      • schtasks.exe (PID: 7984)
      • schtasks.exe (PID: 8552)
      • schtasks.exe (PID: 9196)
      • schtasks.exe (PID: 6648)
      • schtasks.exe (PID: 9624)
      • schtasks.exe (PID: 9184)
      • schtasks.exe (PID: 8612)
      • schtasks.exe (PID: 9956)
      • schtasks.exe (PID: 9112)
      • schtasks.exe (PID: 7396)
      • schtasks.exe (PID: 9036)
      • schtasks.exe (PID: 10232)
      • schtasks.exe (PID: 9744)
      • schtasks.exe (PID: 7572)
      • schtasks.exe (PID: 10340)
      • schtasks.exe (PID: 10272)
      • schtasks.exe (PID: 8980)
      • schtasks.exe (PID: 10892)
    • Uses WMIC.EXE to obtain Windows Installer data

      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
    • The process executes VB scripts

      • CasPol.exe (PID: 7960)
      • MSBuild.exe (PID: 9172)
    • Executes application which crashes

      • 0379d402a94f960380d7d91e3bfa106eeac01cd39ae7b0ba5010ba737088a215.exe (PID: 7404)
      • d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe (PID: 7968)
      • e962736250ea5b158e2b690f6154ef8d3309c9e63aadb575583ebaded94b049e.exe (PID: 9020)
      • a10fe565f9891cb66e24299122c236e1e641451564a930b60ae91a24e09e6d62.exe (PID: 8876)
    • Multiple wallet extension IDs have been found

      • TsarBomba.exe (PID: 4412)
      • 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe (PID: 5712)
    • Found regular expressions for crypto-addresses (YARA)

      • TsarBomba.exe (PID: 4412)
    • Reads the BIOS version

      • aa76b4db29cf929b4b22457ccb8cd77308191f091cde2f69e578ade9708d7949.exe (PID: 8912)
    • Checks for Java to be installed

      • b066d97c63093902c0debe32ed5a001cc150eae3fb841d87a58408762d32466e.exe (PID: 9052)
    • Accesses product unique identifier via WMI (SCRIPT)

      • WMIC.exe (PID: 8224)
    • Mutex name with non-standard characters

      • InstallUtil.exe (PID: 6932)
    • Uses ATTRIB.EXE to modify file attributes

      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • MSBuild.exe (PID: 7476)
      • MSBuild.exe (PID: 6976)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 10164)
    • Adds/modifies Windows certificates

      • e0a8383a4c0beb02f1004468b777a85720343bf25e09f50d23975bb91fff4448.exe (PID: 6836)
    • Starts application with an unusual extension

      • TsarBomba.exe (PID: 4412)
      • 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe (PID: 640)
      • 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe (PID: 3048)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 8148)
      • powershell.exe (PID: 7560)
      • powershell.exe (PID: 9224)
      • cmd.exe (PID: 2072)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
    • Checks for external IP

      • svchost.exe (PID: 2200)
      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
      • e962736250ea5b158e2b690f6154ef8d3309c9e63aadb575583ebaded94b049e.exe (PID: 9020)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 10164)
      • 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe (PID: 9812)
    • The process executes via Task Scheduler

      • mshta.exe (PID: 10196)
    • Application launched itself

      • d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe (PID: 8004)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 7380)
      • images.exe (PID: 9764)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 8148)
      • 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe (PID: 8296)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 8436)
    • Starts itself from another location

      • d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe (PID: 10220)
      • cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe (PID: 8464)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 5080)
    • Query Microsoft Defender preferences

      • RegAsm.exe (PID: 9832)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2200)
    • The process creates files with name similar to system file names

      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 10036)
    • Deletes system .NET executable

      • wscript.exe (PID: 9676)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 9676)
    • Potential Corporate Privacy Violation

      • powershell.exe (PID: 7560)
      • powershell.exe (PID: 9224)
    • Process requests binary or script from the Internet

      • powershell.exe (PID: 7560)
      • powershell.exe (PID: 9224)
    • Connects to the server without a host name

      • powershell.exe (PID: 7560)
      • powershell.exe (PID: 9224)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 10592)
      • cmd.exe (PID: 2076)
    • Executing commands from a ".bat" file

      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
    • Probably delay the execution using 'w32tm.exe'

      • cmd.exe (PID: 2072)
    • Script disables Windows Defender's real-time protection

      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
    • Script disables Windows Defender's IPS

      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
  • INFO

    • The sample compiled with english language support

      • TsarBomba.exe (PID: 4412)
      • InstallUtil.exe (PID: 6932)
      • MSBuild.exe (PID: 9172)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 10036)
    • Checks supported languages

      • 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe (PID: 5712)
      • TsarBomba.exe (PID: 4412)
      • 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe (PID: 3048)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
      • 1bad2b6e8ab16c5a692b2d05f68f7924a73a5818ddf3a9678ca8caab3568a78e.exe (PID: 4168)
      • 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe (PID: 640)
      • 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exe (PID: 6828)
      • 7a8c864ed8b7ca908d3f317d7e63a30a85fb3e8c94070f23f2cf0bfa01c5e0b5.exe (PID: 1132)
      • 9c65d850589e6ab34c6c8e65b8a3b4aa26fa913ca850472023a3b708f95c226b.exe (PID: 5548)
      • 0fd46aca09c54c256d22420d2ac3e947ff204a42a24158dfcb562de18a77f3f1.exe (PID: 3780)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • 60e76eda46185d1d2e9463d15e31d4c87eb03535d368cc3471c55992bc99ad5f.exe (PID: 6868)
      • 4d5ecf3d1955458195771630f03f6ef42f5f62e66ed8e0681f8311d25aecc2bb.exe (PID: 6516)
      • 65fd5041c1a1c4115b0c59995221023486f02e5e5d8e313c3e48f3a42ef9a623.exe (PID: 3952)
      • 77ebb550f38da3f28a65940a4c665ae3a679249ad906aa39387568a1f7ddd3fa.exe (PID: 5560)
      • 80e3a04fa68be799b3c91737e1918f8394b250603a231a251524244e4d7f77d9.exe (PID: 1984)
      • 182fb9756b66963f458ebbe0f20ff2715a758825ac6655fc56ec85579df61330.exe (PID: 7196)
      • 0379d402a94f960380d7d91e3bfa106eeac01cd39ae7b0ba5010ba737088a215.exe (PID: 7404)
      • 188c3798b6d41bdfa3981bb61a40b81f4fe123c64b9bed2d4c40951de2064f19.exe (PID: 7368)
      • 577b3a152ddc9d6558ad1b38ef6da89257229adf06d298ea025048a6d5d2fcea.exe (PID: 7556)
      • 755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe (PID: 7644)
      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
      • 771a06e3a1bdb42a7249d1c888e740c2bc46ba30b54490188c17f6c84ca96e26.exe (PID: 7876)
      • MSBuild.exe (PID: 7476)
      • 954d8fcd6b74d76999f9ec033ca855ffdab6595be23039f03bc4c6017fa3932c.exe (PID: 8012)
      • CasPol.exe (PID: 7960)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 8148)
      • 539b377d4a33d1e884f18ecf0e0b0330e5dc26023b7ae051843cac8014142d98.exe (PID: 7500)
      • 4895f3e5549c1333698e23707fb39c0d24c33c31d1bc089b7970911fba3dc0f7.exe (PID: 5556)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
      • 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe (PID: 8296)
      • 145289accb8c684e583ca3d99532d64d0a6a40142062e648c65ffd8da070c4c9.exe (PID: 8600)
      • Chrome_boostrap.exe (PID: 8680)
      • ShellExperienceHost.exe (PID: 8740)
      • aa76b4db29cf929b4b22457ccb8cd77308191f091cde2f69e578ade9708d7949.exe (PID: 8912)
      • a0da672fdaf8943fc0453424197c5ae5539ed1cc86a47e955ea706a3e8365fe7.exe (PID: 8748)
      • ab0acdb0c45ccafcc0ec594d30dc8153936574dde9ebe4e0b22504770361c666.exe (PID: 8944)
      • aead1f538ae65044f17554b188d4d1f88d7c4840bb554f3d70a2fe3ab86f6abf.exe (PID: 9032)
      • b066d97c63093902c0debe32ed5a001cc150eae3fb841d87a58408762d32466e.exe (PID: 9052)
      • javaw.exe (PID: 9092)
      • c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba.exe (PID: 9180)
      • c348c7e4d9028bdf84aba828bbb81ce46ae55c0246a94351edbfb9c63e41a8ee.exe (PID: 8244)
      • c558e126c64a89887115a45276d5a8751f90c399eb32ca103f6e50901abc7abd.exe (PID: 8124)
      • b975f3981291f86d4a8f023b2cd5473abf6b8f4f33bb6f6cbb19bab0fa01d2ad.exe (PID: 9068)
      • d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe (PID: 8004)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 7380)
      • e0a8383a4c0beb02f1004468b777a85720343bf25e09f50d23975bb91fff4448.exe (PID: 6836)
      • e962736250ea5b158e2b690f6154ef8d3309c9e63aadb575583ebaded94b049e.exe (PID: 9020)
      • InstallUtil.exe (PID: 6932)
      • f74ea81bcd59a58e2784f74cd28c63744de51639ccc974507eff5619764b0f4d.exe (PID: 9196)
      • cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe (PID: 8464)
      • dfsvc.exe (PID: 9708)
      • svchost.com (PID: 9304)
      • eac7ea3969f4483a6f1ed27bad46dbb2f32c40be8f402e6e815d6917cd5731ac.exe (PID: 7516)
      • svchost.com (PID: 9552)
      • svchost.com (PID: 9588)
      • svchost.com (PID: 9884)
      • svchost.com (PID: 9696)
      • RegAsm.exe (PID: 9832)
      • e98182d44dc7ec4a154021757da3132769db318cf9d78f15fc06c92682f8a253.exe (PID: 9004)
      • d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe (PID: 10220)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 10036)
      • images.exe (PID: 9764)
      • MSBuild.exe (PID: 6976)
      • svchost.com (PID: 8812)
      • svchost.com (PID: 10140)
      • MSBuild.exe (PID: 9172)
      • images.exe (PID: 7332)
      • images.exe (PID: 9040)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 10164)
      • 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe (PID: 9812)
      • remoteadmin.exe (PID: 3756)
      • svchost.com (PID: 9724)
      • svchost.com (PID: 10872)
      • svchost.com (PID: 11572)
      • chcp.com (PID: 10728)
      • svchost.com (PID: 8428)
    • Reads the computer name

      • 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe (PID: 3048)
      • TsarBomba.exe (PID: 4412)
      • 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe (PID: 5712)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
      • 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe (PID: 640)
      • 4d5ecf3d1955458195771630f03f6ef42f5f62e66ed8e0681f8311d25aecc2bb.exe (PID: 6516)
      • 7a8c864ed8b7ca908d3f317d7e63a30a85fb3e8c94070f23f2cf0bfa01c5e0b5.exe (PID: 1132)
      • 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exe (PID: 6828)
      • 9c65d850589e6ab34c6c8e65b8a3b4aa26fa913ca850472023a3b708f95c226b.exe (PID: 5548)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • 60e76eda46185d1d2e9463d15e31d4c87eb03535d368cc3471c55992bc99ad5f.exe (PID: 6868)
      • 65fd5041c1a1c4115b0c59995221023486f02e5e5d8e313c3e48f3a42ef9a623.exe (PID: 3952)
      • 188c3798b6d41bdfa3981bb61a40b81f4fe123c64b9bed2d4c40951de2064f19.exe (PID: 7368)
      • 77ebb550f38da3f28a65940a4c665ae3a679249ad906aa39387568a1f7ddd3fa.exe (PID: 5560)
      • 80e3a04fa68be799b3c91737e1918f8394b250603a231a251524244e4d7f77d9.exe (PID: 1984)
      • 577b3a152ddc9d6558ad1b38ef6da89257229adf06d298ea025048a6d5d2fcea.exe (PID: 7556)
      • 539b377d4a33d1e884f18ecf0e0b0330e5dc26023b7ae051843cac8014142d98.exe (PID: 7500)
      • 755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe (PID: 7644)
      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
      • MSBuild.exe (PID: 7476)
      • 954d8fcd6b74d76999f9ec033ca855ffdab6595be23039f03bc4c6017fa3932c.exe (PID: 8012)
      • CasPol.exe (PID: 7960)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 8148)
      • 771a06e3a1bdb42a7249d1c888e740c2bc46ba30b54490188c17f6c84ca96e26.exe (PID: 7876)
      • 4895f3e5549c1333698e23707fb39c0d24c33c31d1bc089b7970911fba3dc0f7.exe (PID: 5556)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
      • 0379d402a94f960380d7d91e3bfa106eeac01cd39ae7b0ba5010ba737088a215.exe (PID: 7404)
      • 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe (PID: 8296)
      • 145289accb8c684e583ca3d99532d64d0a6a40142062e648c65ffd8da070c4c9.exe (PID: 8600)
      • Chrome_boostrap.exe (PID: 8680)
      • ShellExperienceHost.exe (PID: 8740)
      • aa76b4db29cf929b4b22457ccb8cd77308191f091cde2f69e578ade9708d7949.exe (PID: 8912)
      • ab0acdb0c45ccafcc0ec594d30dc8153936574dde9ebe4e0b22504770361c666.exe (PID: 8944)
      • aead1f538ae65044f17554b188d4d1f88d7c4840bb554f3d70a2fe3ab86f6abf.exe (PID: 9032)
      • c348c7e4d9028bdf84aba828bbb81ce46ae55c0246a94351edbfb9c63e41a8ee.exe (PID: 8244)
      • d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe (PID: 8004)
      • cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe (PID: 8464)
      • c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba.exe (PID: 9180)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 7380)
      • e962736250ea5b158e2b690f6154ef8d3309c9e63aadb575583ebaded94b049e.exe (PID: 9020)
      • f74ea81bcd59a58e2784f74cd28c63744de51639ccc974507eff5619764b0f4d.exe (PID: 9196)
      • e0a8383a4c0beb02f1004468b777a85720343bf25e09f50d23975bb91fff4448.exe (PID: 6836)
      • javaw.exe (PID: 9092)
      • dfsvc.exe (PID: 9708)
      • svchost.com (PID: 9304)
      • svchost.com (PID: 9552)
      • svchost.com (PID: 9884)
      • svchost.com (PID: 9588)
      • svchost.com (PID: 9696)
      • RegAsm.exe (PID: 9832)
      • images.exe (PID: 9764)
      • svchost.com (PID: 8812)
      • MSBuild.exe (PID: 6976)
      • MSBuild.exe (PID: 9172)
      • svchost.com (PID: 10140)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 10164)
      • 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe (PID: 9812)
      • images.exe (PID: 9040)
      • svchost.com (PID: 9724)
      • remoteadmin.exe (PID: 3756)
      • svchost.com (PID: 10872)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 10036)
      • svchost.com (PID: 11572)
      • svchost.com (PID: 8428)
    • Create files in a temporary directory

      • TsarBomba.exe (PID: 4412)
      • 188c3798b6d41bdfa3981bb61a40b81f4fe123c64b9bed2d4c40951de2064f19.exe (PID: 7368)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
      • javaw.exe (PID: 9092)
      • ab0acdb0c45ccafcc0ec594d30dc8153936574dde9ebe4e0b22504770361c666.exe (PID: 8944)
      • e98182d44dc7ec4a154021757da3132769db318cf9d78f15fc06c92682f8a253.exe (PID: 9004)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 7380)
      • svchost.com (PID: 9884)
      • svchost.com (PID: 9696)
      • 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe (PID: 3048)
      • MSBuild.exe (PID: 9172)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 10036)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
      • 771a06e3a1bdb42a7249d1c888e740c2bc46ba30b54490188c17f6c84ca96e26.exe (PID: 7876)
    • Process checks computer location settings

      • TsarBomba.exe (PID: 4412)
      • 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe (PID: 640)
      • 4d5ecf3d1955458195771630f03f6ef42f5f62e66ed8e0681f8311d25aecc2bb.exe (PID: 6516)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • CasPol.exe (PID: 7960)
      • 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe (PID: 3048)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 8148)
      • MSBuild.exe (PID: 9172)
      • cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe (PID: 8464)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
    • Reads the machine GUID from the registry

      • 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe (PID: 640)
      • 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exe (PID: 6828)
      • 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe (PID: 5712)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
      • 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe (PID: 3048)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • 577b3a152ddc9d6558ad1b38ef6da89257229adf06d298ea025048a6d5d2fcea.exe (PID: 7556)
      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
      • 80e3a04fa68be799b3c91737e1918f8394b250603a231a251524244e4d7f77d9.exe (PID: 1984)
      • 755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe (PID: 7644)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 8148)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
      • 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe (PID: 8296)
      • MSBuild.exe (PID: 7476)
      • 145289accb8c684e583ca3d99532d64d0a6a40142062e648c65ffd8da070c4c9.exe (PID: 8600)
      • 4895f3e5549c1333698e23707fb39c0d24c33c31d1bc089b7970911fba3dc0f7.exe (PID: 5556)
      • aa76b4db29cf929b4b22457ccb8cd77308191f091cde2f69e578ade9708d7949.exe (PID: 8912)
      • aead1f538ae65044f17554b188d4d1f88d7c4840bb554f3d70a2fe3ab86f6abf.exe (PID: 9032)
      • c348c7e4d9028bdf84aba828bbb81ce46ae55c0246a94351edbfb9c63e41a8ee.exe (PID: 8244)
      • e962736250ea5b158e2b690f6154ef8d3309c9e63aadb575583ebaded94b049e.exe (PID: 9020)
      • e0a8383a4c0beb02f1004468b777a85720343bf25e09f50d23975bb91fff4448.exe (PID: 6836)
      • cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe (PID: 8464)
      • dfsvc.exe (PID: 9708)
      • d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe (PID: 8004)
      • javaw.exe (PID: 9092)
      • svchost.com (PID: 9696)
      • svchost.com (PID: 9884)
      • RegAsm.exe (PID: 9832)
      • images.exe (PID: 9764)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 10164)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 10036)
      • remoteadmin.exe (PID: 3756)
      • 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe (PID: 9812)
    • Disables trace logs

      • 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exe (PID: 6828)
      • 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe (PID: 5712)
      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
      • e962736250ea5b158e2b690f6154ef8d3309c9e63aadb575583ebaded94b049e.exe (PID: 9020)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • dfsvc.exe (PID: 9708)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 10164)
      • 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe (PID: 9812)
      • powershell.exe (PID: 7560)
      • powershell.exe (PID: 9224)
    • Reads Environment values

      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
      • 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exe (PID: 6828)
      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • dfsvc.exe (PID: 9708)
    • Reads Microsoft Office registry keys

      • 4d5ecf3d1955458195771630f03f6ef42f5f62e66ed8e0681f8311d25aecc2bb.exe (PID: 6516)
    • The sample compiled with russian language support

      • TsarBomba.exe (PID: 4412)
    • Checks proxy server information

      • 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exe (PID: 6828)
      • 4d5ecf3d1955458195771630f03f6ef42f5f62e66ed8e0681f8311d25aecc2bb.exe (PID: 6516)
      • 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe (PID: 5712)
      • 755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe (PID: 7644)
      • MSBuild.exe (PID: 7476)
      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
      • e962736250ea5b158e2b690f6154ef8d3309c9e63aadb575583ebaded94b049e.exe (PID: 9020)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • dfsvc.exe (PID: 9708)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 10164)
      • 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe (PID: 9812)
      • powershell.exe (PID: 7560)
      • powershell.exe (PID: 9224)
      • WerFault.exe (PID: 7864)
      • 0379d402a94f960380d7d91e3bfa106eeac01cd39ae7b0ba5010ba737088a215.exe (PID: 7404)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 1208)
      • WMIC.exe (PID: 8224)
      • WMIC.exe (PID: 8452)
      • WMIC.exe (PID: 9456)
      • WMIC.exe (PID: 11392)
      • WMIC.exe (PID: 10284)
      • WMIC.exe (PID: 11348)
    • Creates files or folders in the user directory

      • 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe (PID: 640)
      • CasPol.exe (PID: 7960)
      • 77ebb550f38da3f28a65940a4c665ae3a679249ad906aa39387568a1f7ddd3fa.exe (PID: 5560)
      • MSBuild.exe (PID: 7476)
      • WerFault.exe (PID: 8388)
      • aead1f538ae65044f17554b188d4d1f88d7c4840bb554f3d70a2fe3ab86f6abf.exe (PID: 9032)
      • e962736250ea5b158e2b690f6154ef8d3309c9e63aadb575583ebaded94b049e.exe (PID: 9020)
      • 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe (PID: 3048)
      • WerFault.exe (PID: 8276)
      • 771a06e3a1bdb42a7249d1c888e740c2bc46ba30b54490188c17f6c84ca96e26.exe (PID: 7876)
      • javaw.exe (PID: 9092)
      • cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe (PID: 8464)
      • WerFault.exe (PID: 8516)
      • dfsvc.exe (PID: 9708)
      • WerFault.exe (PID: 10024)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 10036)
      • WerFault.exe (PID: 7600)
      • WerFault.exe (PID: 10484)
      • WerFault.exe (PID: 7864)
      • WerFault.exe (PID: 11344)
      • WerFault.exe (PID: 11212)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
      • WerFault.exe (PID: 11180)
    • Reads mouse settings

      • 188c3798b6d41bdfa3981bb61a40b81f4fe123c64b9bed2d4c40951de2064f19.exe (PID: 7368)
      • ab0acdb0c45ccafcc0ec594d30dc8153936574dde9ebe4e0b22504770361c666.exe (PID: 8944)
    • Reads the software policy settings

      • 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exe (PID: 6828)
      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 7924)
      • 755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe (PID: 7644)
      • MSBuild.exe (PID: 7476)
      • aa76b4db29cf929b4b22457ccb8cd77308191f091cde2f69e578ade9708d7949.exe (PID: 8912)
      • e962736250ea5b158e2b690f6154ef8d3309c9e63aadb575583ebaded94b049e.exe (PID: 9020)
      • MSBuild.exe (PID: 6976)
      • WerFault.exe (PID: 7864)
      • 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe (PID: 9812)
      • 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe (PID: 10164)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
    • Creates files in the program directory

      • 77ebb550f38da3f28a65940a4c665ae3a679249ad906aa39387568a1f7ddd3fa.exe (PID: 5560)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 424)
      • 771a06e3a1bdb42a7249d1c888e740c2bc46ba30b54490188c17f6c84ca96e26.exe (PID: 7876)
      • MSBuild.exe (PID: 7476)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
      • javaw.exe (PID: 9092)
      • e98182d44dc7ec4a154021757da3132769db318cf9d78f15fc06c92682f8a253.exe (PID: 9004)
      • c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba.exe (PID: 9180)
      • d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe (PID: 10220)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 10036)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 7528)
      • mshta.exe (PID: 9116)
    • Attempting to use instant messaging service

      • 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exe (PID: 6828)
      • svchost.exe (PID: 2200)
      • MSBuild.exe (PID: 7476)
    • Launching a file from Task Scheduler

      • cmd.exe (PID: 7512)
      • cmd.exe (PID: 9108)
      • cmd.exe (PID: 9684)
    • Compiled with Borland Delphi (YARA)

      • TsarBomba.exe (PID: 4412)
      • 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe (PID: 5712)
      • conhost.exe (PID: 3888)
    • Application based on Java

      • javaw.exe (PID: 9092)
    • Launching a file from a Registry key

      • e98182d44dc7ec4a154021757da3132769db318cf9d78f15fc06c92682f8a253.exe (PID: 9004)
      • svchost.exe (PID: 8404)
      • d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe (PID: 10220)
      • MSBuild.exe (PID: 9172)
      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 10036)
      • 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe (PID: 7772)
    • Launching a file from the Startup directory

      • aead1f538ae65044f17554b188d4d1f88d7c4840bb554f3d70a2fe3ab86f6abf.exe (PID: 9032)
    • Reads CPU info

      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 4684)
    • Process checks whether UAC notifications are on

      • def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe (PID: 10036)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7712)
      • powershell.exe (PID: 8236)
      • powershell.exe (PID: 9540)
      • powershell.exe (PID: 10980)
      • powershell.exe (PID: 10940)
      • powershell.exe (PID: 10932)
      • powershell.exe (PID: 11008)
      • powershell.exe (PID: 10908)
      • powershell.exe (PID: 11036)
      • powershell.exe (PID: 10996)
      • powershell.exe (PID: 10956)
      • powershell.exe (PID: 10988)
      • powershell.exe (PID: 10916)
      • powershell.exe (PID: 11024)
      • powershell.exe (PID: 11044)
      • powershell.exe (PID: 10924)
      • powershell.exe (PID: 8620)
      • powershell.exe (PID: 11016)
      • powershell.exe (PID: 11052)
      • powershell.exe (PID: 10948)
      • powershell.exe (PID: 11060)
      • powershell.exe (PID: 10964)
      • powershell.exe (PID: 10972)
    • Changes the display of characters in the console

      • cmd.exe (PID: 2072)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 8236)
      • powershell.exe (PID: 7712)
      • powershell.exe (PID: 11008)
      • powershell.exe (PID: 10956)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

xor-url

(PID) Process(4412) TsarBomba.exe
Decrypted-URLs (4)http://medusakxxtp3uo7vusntvubnytaph4d3amxivbggl3hnhpk2nmus34yd.onion/227098164ef1fdb119ef537986bbdf24
http://medusaxko7jxtrojdkxo66j7ck4q5tgktf7uqsqyfry4ebnxlcbkccyd.onion/
https://utox.org/uTox_win64.exe)
https://www.torproject.org/download/):
(PID) Process(4168) 1bad2b6e8ab16c5a692b2d05f68f7924a73a5818ddf3a9678ca8caab3568a78e.exe
Decrypted-URLs (4)http://medusakxxtp3uo7vusntvubnytaph4d3amxivbggl3hnhpk2nmus34yd.onion/227098164ef1fdb119ef537986bbdf24
http://medusaxko7jxtrojdkxo66j7ck4q5tgktf7uqsqyfry4ebnxlcbkccyd.onion/
https://utox.org/uTox_win64.exe)
https://www.torproject.org/download/):
Decrypted-URLs (3)http://medusakxxtp3uo7vusntvubnytaph4d3amxivbggl3hnhpk2nmus34yd.onion/227098164ef1fdb119ef537986bbdf24
http://medusaxko7jxtrojdkxo66j7ck4q5tgktf7uqsqyfry4ebnxlcbkccyd.onion/
https://www.torproject.org/download/):

RedLine

(PID) Process(5712) 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe
C2 (1)154.91.34.165:64951
Botnetcheat
Keys
Xor
Options
ErrorMessage
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (42.6)
.exe | Win16/32 Executable Delphi generic (19.5)
.exe | Generic Win/DOS Executable (18.9)
.exe | DOS Executable Generic (18.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit, No debug
PEType: PE32
LinkerVersion: 6
CodeSize: 5632
InitializedDataSize: 26406400
UninitializedDataSize: -
EntryPoint: 0x2321
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.6.6.6
ProductVersionNumber: 6.6.6.6
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Unknown (0)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: HELL
FileTitle: RAT Pack
FileDescription: Tsar Bomba RAT PACK
FileVersion: 6,6,6,6
LegalCopyright: 2025
LegalTrademark: HELL
ProductName: Tsar Bomba
ProductVersion: 6,6,6,6
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
422
Monitored processes
275
Malicious processes
48
Suspicious processes
10

Behavior graph

Click at the process to see the details
start #XOR-URL tsarbomba.exe #REDLINE 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe conhost.exe no specs 0fd46aca09c54c256d22420d2ac3e947ff204a42a24158dfcb562de18a77f3f1.exe no specs 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe #XOR-URL 1bad2b6e8ab16c5a692b2d05f68f7924a73a5818ddf3a9678ca8caab3568a78e.exe no specs conhost.exe no specs #RAWORLD 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe no specs conhost.exe no specs 4d5ecf3d1955458195771630f03f6ef42f5f62e66ed8e0681f8311d25aecc2bb.exe conhost.exe no specs #DCRAT 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exe powershell.exe no specs conhost.exe no specs 7a8c864ed8b7ca908d3f317d7e63a30a85fb3e8c94070f23f2cf0bfa01c5e0b5.exe no specs 9c65d850589e6ab34c6c8e65b8a3b4aa26fa913ca850472023a3b708f95c226b.exe 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe cmd.exe no specs 60e76eda46185d1d2e9463d15e31d4c87eb03535d368cc3471c55992bc99ad5f.exe no specs conhost.exe no specs 65fd5041c1a1c4115b0c59995221023486f02e5e5d8e313c3e48f3a42ef9a623.exe no specs notepad.exe no specs THREAT 77ebb550f38da3f28a65940a4c665ae3a679249ad906aa39387568a1f7ddd3fa.exe no specs 80e3a04fa68be799b3c91737e1918f8394b250603a231a251524244e4d7f77d9.exe no specs vssadmin.exe no specs 182fb9756b66963f458ebbe0f20ff2715a758825ac6655fc56ec85579df61330.exe no specs vssvc.exe no specs 188c3798b6d41bdfa3981bb61a40b81f4fe123c64b9bed2d4c40951de2064f19.exe no specs 0379d402a94f960380d7d91e3bfa106eeac01cd39ae7b0ba5010ba737088a215.exe msbuild.exe no specs #VIDAR msbuild.exe 539b377d4a33d1e884f18ecf0e0b0330e5dc26023b7ae051843cac8014142d98.exe cmd.exe no specs mshta.exe no specs 577b3a152ddc9d6558ad1b38ef6da89257229adf06d298ea025048a6d5d2fcea.exe no specs conhost.exe no specs #METERPRETER 755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe powershell.exe no specs THREAT 771a06e3a1bdb42a7249d1c888e740c2bc46ba30b54490188c17f6c84ca96e26.exe 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe caspol.exe no specs 954d8fcd6b74d76999f9ec033ca855ffdab6595be23039f03bc4c6017fa3932c.exe no specs cmd.exe no specs conhost.exe no specs 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe no specs conhost.exe no specs 4895f3e5549c1333698e23707fb39c0d24c33c31d1bc089b7970911fba3dc0f7.exe no specs powershell.exe conhost.exe no specs schtasks.exe no specs wscript.exe no specs #AGENTTESLA 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe schtasks.exe no specs wmic.exe no specs conhost.exe no specs 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe no specs werfault.exe no specs wmic.exe no specs schtasks.exe no specs 145289accb8c684e583ca3d99532d64d0a6a40142062e648c65ffd8da070c4c9.exe chrome_boostrap.exe no specs shellexperiencehost.exe no specs a0da672fdaf8943fc0453424197c5ae5539ed1cc86a47e955ea706a3e8365fe7.exe no specs a10fe565f9891cb66e24299122c236e1e641451564a930b60ae91a24e09e6d62.exe aa76b4db29cf929b4b22457ccb8cd77308191f091cde2f69e578ade9708d7949.exe ab0acdb0c45ccafcc0ec594d30dc8153936574dde9ebe4e0b22504770361c666.exe no specs aead1f538ae65044f17554b188d4d1f88d7c4840bb554f3d70a2fe3ab86f6abf.exe b066d97c63093902c0debe32ed5a001cc150eae3fb841d87a58408762d32466e.exe no specs b975f3981291f86d4a8f023b2cd5473abf6b8f4f33bb6f6cbb19bab0fa01d2ad.exe no specs javaw.exe cmd.exe no specs mshta.exe no specs conhost.exe no specs c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba.exe no specs schtasks.exe no specs c348c7e4d9028bdf84aba828bbb81ce46ae55c0246a94351edbfb9c63e41a8ee.exe no specs c558e126c64a89887115a45276d5a8751f90c399eb32ca103f6e50901abc7abd.exe no specs cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe no specs conhost.exe no specs def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe no specs icacls.exe no specs conhost.exe no specs e0a8383a4c0beb02f1004468b777a85720343bf25e09f50d23975bb91fff4448.exe no specs #XORIST e98182d44dc7ec4a154021757da3132769db318cf9d78f15fc06c92682f8a253.exe e962736250ea5b158e2b690f6154ef8d3309c9e63aadb575583ebaded94b049e.exe cmd.exe no specs schtasks.exe no specs eac7ea3969f4483a6f1ed27bad46dbb2f32c40be8f402e6e815d6917cd5731ac.exe no specs #NESHTA installutil.exe werfault.exe no specs conhost.exe no specs f74ea81bcd59a58e2784f74cd28c63744de51639ccc974507eff5619764b0f4d.exe no specs conhost.exe no specs #LUMMA svchost.exe cmd.exe no specs attrib.exe no specs conhost.exe no specs svchost.exe conhost.exe no specs powershell.exe conhost.exe no specs svchost.com no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs svchost.com no specs svchost.com no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs regasm.exe no specs svchost.com no specs dfsvc.exe no specs regasm.exe no specs conhost.exe no specs regasm.exe no specs svchost.com no specs conhost.exe no specs conhost.exe no specs mshta.exe no specs #AVEMARIA d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe schtasks.exe no specs cmd.exe no specs conhost.exe no specs msbuild.exe schtasks.exe no specs werfault.exe no specs werfault.exe powershell.exe no specs taskkill.exe no specs powershell.exe no specs werfault.exe no specs conhost.exe no specs #NANOCORE def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe schtasks.exe no specs images.exe no specs wmic.exe no specs svchost.com no specs conhost.exe no specs svchost.com no specs conhost.exe no specs schtasks.exe no specs msbuild.exe cmd.exe no specs cmd.exe no specs timeout.exe no specs conhost.exe no specs conhost.exe no specs images.exe no specs images.exe schtasks.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs werfault.exe no specs svchost.com no specs #SNAKEKEYLOGGER 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe schtasks.exe no specs conhost.exe no specs wscript.exe no specs net.exe no specs #SNAKEKEYLOGGER 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe schtasks.exe no specs cmd.exe no specs schtasks.exe no specs schtasks.exe no specs conhost.exe no specs conhost.exe no specs schtasks.exe no specs werfault.exe no specs cmd.exe no specs schtasks.exe no specs remoteadmin.exe conhost.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs conhost.exe no specs werfault.exe no specs cmd.exe no specs conhost.exe no specs svchost.com no specs schtasks.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs schtasks.exe no specs net1.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs net.exe no specs reg.exe no specs conhost.exe no specs werfault.exe no specs wmic.exe no specs svchost.com no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs net1.exe no specs chcp.com no specs net.exe no specs conhost.exe no specs net1.exe no specs wmic.exe no specs werfault.exe no specs net.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs werfault.exe no specs werfault.exe no specs net1.exe no specs svchost.com no specs conhost.exe no specs wmic.exe no specs net.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs w32tm.exe no specs conhost.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs tsarbomba.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
72\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
424"C:\Users\admin\AppData\Local\Temp\5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe" C:\Users\admin\AppData\Local\Temp\5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe
TsarBomba.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.2.7.1277
Modules
Images
c:\users\admin\appdata\local\temp\5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
620"C:\Windows\System32\wscript.exe" "C:\Users\admin\AppData\Roaming\mGxdd.vbs"C:\Windows\SysWOW64\wscript.exeCasPol.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Exit code:
1
Version:
5.812.10240.16384
Modules
Images
c:\windows\syswow64\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
640"C:\Users\admin\AppData\Local\Temp\3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe" C:\Users\admin\AppData\Local\Temp\3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe
TsarBomba.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
856\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1056C:\WINDOWS\system32\net1 stop "Sophos Clean Service" /yC:\Windows\SysWOW64\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
2
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
1132"C:\Users\admin\AppData\Local\Temp\7a8c864ed8b7ca908d3f317d7e63a30a85fb3e8c94070f23f2cf0bfa01c5e0b5.exe" C:\Users\admin\AppData\Local\Temp\7a8c864ed8b7ca908d3f317d7e63a30a85fb3e8c94070f23f2cf0bfa01c5e0b5.exeTsarBomba.exe
User:
admin
Company:
Composable Shell Shared Proxy Stub
Integrity Level:
HIGH
Description:
IE Sysprep Provider
Version:
3.5.3.6
Modules
Images
c:\users\admin\appdata\local\temp\7a8c864ed8b7ca908d3f317d7e63a30a85fb3e8c94070f23f2cf0bfa01c5e0b5.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1208"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\RANSOMNOTE.txtC:\Windows\System32\notepad.exe4d5ecf3d1955458195771630f03f6ef42f5f62e66ed8e0681f8311d25aecc2bb.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Notepad
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1880\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeicacls.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1984"C:\Users\admin\AppData\Local\Temp\80e3a04fa68be799b3c91737e1918f8394b250603a231a251524244e4d7f77d9.exe" C:\Users\admin\AppData\Local\Temp\80e3a04fa68be799b3c91737e1918f8394b250603a231a251524244e4d7f77d9.exeTsarBomba.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\80e3a04fa68be799b3c91737e1918f8394b250603a231a251524244e4d7f77d9.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
204 028
Read events
203 743
Write events
245
Delete events
40

Modification events

(PID) Process:(6828) 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6828) 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6828) 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6828) 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6828) 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6828) 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6828) 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6828) 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6828) 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6828) 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
129
Suspicious files
1 088
Text files
1 814
Unknown types
1

Dropped files

PID
Process
Filename
Type
4412TsarBomba.exeC:\Users\admin\AppData\Local\Temp\1bad2b6e8ab16c5a692b2d05f68f7924a73a5818ddf3a9678ca8caab3568a78e.exeexecutable
MD5:BD29231BC4F2C6D2F22FA026E2EACA40
SHA256:1BAD2B6E8AB16C5A692B2D05F68F7924A73A5818DDF3A9678CA8CAAB3568A78E
4412TsarBomba.exeC:\Users\admin\AppData\Local\Temp\0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exeexecutable
MD5:A85DED286361BD125CDFCEB0B6C93108
SHA256:0F78A658B60F0879ACCCF0933D9AE8A5D2C188E9F16B8E6F7B01BD0CC9B5C4E1
6403e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe\\?\Volume{2f5c5e71-85a9-11eb-90a8-9a9b76358421}\Data breach warning.txttext
MD5:E7264A4C331EAC851FA75438919E0531
SHA256:07AB218D5C865CB4FE78353340AB923E24A1F2881EC7206520651C5246B1A492
4412TsarBomba.exeC:\Users\admin\AppData\Local\Temp\6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exeexecutable
MD5:692726995AD5CF7D9DABAF873FEF7106
SHA256:6CA05DA8350D9F5E5D3A7547C0D4693EBC1190E3B76F58F4196021D0C080C722
6403e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe\\?\Volume{2f5c5e71-85a9-11eb-90a8-9a9b76358421}\EFI\Microsoft\Data breach warning.txttext
MD5:E7264A4C331EAC851FA75438919E0531
SHA256:07AB218D5C865CB4FE78353340AB923E24A1F2881EC7206520651C5246B1A492
65164d5ecf3d1955458195771630f03f6ef42f5f62e66ed8e0681f8311d25aecc2bb.exeC:\Users\admin\Desktop\RANSOMNOTE.txttext
MD5:0909012814B1C36B99230DB019721035
SHA256:5AB5B5296630C50B82EA8F4128FACE9AD97AAE62F46099D457C0638D8303D362
4412TsarBomba.exeC:\Users\admin\AppData\Local\Temp\3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exeexecutable
MD5:5887E7ED9DCEC96AC39CBDA2B19D8CC0
SHA256:3E3C7D3F5F93D7BF260ACA7612B4DBC5D0E90992841F7E6826D7FB7FA3ABE044
6403e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe\\?\Volume{2f5c5e71-85a9-11eb-90a8-9a9b76358421}\EFI\Microsoft\Recovery\BCD.LOG2.aosIt
MD5:
SHA256:
4412TsarBomba.exeC:\Users\admin\AppData\Local\Temp\80e3a04fa68be799b3c91737e1918f8394b250603a231a251524244e4d7f77d9.exeexecutable
MD5:F0410358A0D9DBD0DFF3113D9C744CA7
SHA256:80E3A04FA68BE799B3C91737E1918F8394B250603A231A251524244E4D7F77D9
6403e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe\\?\Volume{2f5c5e71-85a9-11eb-90a8-9a9b76358421}\EFI\Data breach warning.txttext
MD5:E7264A4C331EAC851FA75438919E0531
SHA256:07AB218D5C865CB4FE78353340AB923E24A1F2881EC7206520651C5246B1A492
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
29
TCP/UDP connections
167
DNS requests
66
Threats
112

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5944
MoUsoCoreWorker.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
9812
53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe
GET
200
132.226.247.73:80
http://checkip.dyndns.org/
unknown
whitelisted
10164
4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe
GET
132.226.247.73:80
http://checkip.dyndns.org/
unknown
whitelisted
9812
53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe
GET
200
132.226.247.73:80
http://checkip.dyndns.org/
unknown
whitelisted
9224
powershell.exe
GET
200
185.156.72.2:80
http://185.156.72.2/testmine/random.exe
unknown
unknown
7560
powershell.exe
GET
200
185.156.72.2:80
http://185.156.72.2/testmine/random.exe
unknown
unknown
7864
WerFault.exe
GET
200
2.16.241.14:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7864
WerFault.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
10164
4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe
GET
200
132.226.247.73:80
http://checkip.dyndns.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2276
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6516
4d5ecf3d1955458195771630f03f6ef42f5f62e66ed8e0681f8311d25aecc2bb.exe
98.177.107.142:60446
ASN-CXA-ALL-CCI-22773-RDC
US
unknown
6828
6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exe
162.159.135.234:443
gateway.discord.gg
CLOUDFLARENET
whitelisted
192.168.100.11:49717
unknown
5712
0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe
154.91.34.165:64951
Shanghai Anchang Network Security Technology Co.,Ltd.
US
unknown
7644
755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe
103.171.35.26:9443
VH Global Limited
HK
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.110
whitelisted
gateway.discord.gg
  • 162.159.135.234
  • 162.159.133.234
  • 162.159.134.234
  • 162.159.136.234
  • 162.159.130.234
whitelisted
t.me
  • 149.154.167.99
whitelisted
gstatic.com
  • 216.58.206.67
whitelisted
17.aa.4t.com
unknown
steamcommunity.com
  • 104.102.49.106
whitelisted
api.pcloud.com
  • 74.120.9.235
  • 74.120.8.13
  • 74.120.9.89
  • 74.120.9.234
  • 74.120.9.121
  • 74.120.9.90
  • 74.120.8.15
  • 74.120.8.6
  • 74.120.8.7
  • 74.120.9.233
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
login.live.com
  • 40.126.31.128
  • 20.190.159.73
  • 20.190.159.68
  • 40.126.31.0
  • 40.126.31.73
  • 40.126.31.1
  • 20.190.159.0
  • 20.190.159.71
whitelisted

Threats

PID
Process
Class
Message
2200
svchost.exe
Misc activity
ET INFO Discord Chat Service Domain in DNS Lookup (gateway .discord .gg)
6828
6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exe
Misc activity
ET INFO Observed Discord Service Domain (gateway .discord .gg) in TLS SNI
7644
755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe
Targeted Malicious Activity was Detected
ET HUNTING Suspicious Empty SSL Certificate - Observed in Cobalt Strike
7644
755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe
A Network Trojan was detected
ET MALWARE Meterpreter or Other Reverse Shell SSL Cert
7476
MSBuild.exe
Misc activity
ET INFO Observed Telegram Domain (t .me in TLS SNI)
Not Suspicious Traffic
INFO [ANY.RUN] Websocket Upgrade Request
7476
MSBuild.exe
Misc activity
ET INFO Observed Telegram Domain (t .me in TLS SNI)
7476
MSBuild.exe
Misc activity
ET INFO Observed Telegram Domain (t .me in TLS SNI)
2200
svchost.exe
Potentially Bad Traffic
ET INFO Cloud Storage API Related Domain in DNS Lookup (api .pcloud .com)
2200
svchost.exe
Misc activity
ET INFO Commonly Abused File Sharing Site Domain Observed in DNS Lookup (pcloud .com)
No debug info