URL:

dro.pm/b8

Full analysis: https://app.any.run/tasks/97303f94-7a45-4867-9846-b075d26e2592
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: May 19, 2025, 00:04:54
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
sextortion
scam
sality
sainbox
rat
discord
meterpreter
backdoor
silverfox
auto
generic
medusa
ransomware
metasploit
framework
floxif
killmbr
evasion
java
telegram
adware
umbral
stealer
adesstealer
darkvision
discordtoken
strrat
hiddentear
jlocker
fsg
upx
Indicators:
MD5:

22808E0E88D6F318CABFCC27EDA11697

SHA1:

AF1E451EA042339C00AF270F52DF56C1083FDE10

SHA256:

37DF30BD62180E8A7CE71493D86490687F790D3841A097768E5159B425DF26B1

SSDEEP:

3:cLVtn:cLzn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • BACKDOOR has been found (auto)

      • Tsar2.exe (PID: 9064)
    • FLOXIF has been found (auto)

      • Tsar2.exe (PID: 9064)
      • Tsar2.exe (PID: 8688)
    • Changes Security Center notification settings

      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 9044)
    • Changes firewall settings

      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 9044)
    • SAINBOX has been detected

      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 9044)
    • Disables Windows firewall

      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 9044)
    • SALITY mutex has been found

      • e934e286e2ec0985f44cc3109c6db434a65aeb731a8979e931164881ba2d4729.exe (PID: 9056)
      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 9044)
      • Tsar2.exe (PID: 9064)
    • Executing a file with an untrusted certificate

      • e934e286e2ec0985f44cc3109c6db434a65aeb731a8979e931164881ba2d4729.exe (PID: 9056)
      • 7a8c864ed8b7ca908d3f317d7e63a30a85fb3e8c94070f23f2cf0bfa01c5e0b5.exe (PID: 8620)
      • cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe (PID: 8220)
      • e934e286e2ec0985f44cc3109c6db434a65aeb731a8979e931164881ba2d4729.exe (PID: 13332)
    • UAC/LUA settings modification

      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 9044)
    • RANSOMWARE has been found (auto)

      • TsarBomba.exe (PID: 6048)
    • FRAMEWORK has been found (auto)

      • TsarBomba.exe (PID: 6048)
    • GENERIC has been found (auto)

      • TsarBomba.exe (PID: 6048)
      • TsarBomba.exe (PID: 6048)
    • KILLMBR has been found (auto)

      • Tsar3.exe (PID: 8156)
    • ADWARE has been found (auto)

      • TsarBomba.exe (PID: 6048)
    • STEALER has been found (auto)

      • TsarBomba.exe (PID: 6048)
    • Deletes shadow copies

      • cmd.exe (PID: 8940)
      • cmd.exe (PID: 9936)
    • METERPRETER has been detected (SURICATA)

      • 755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe (PID: 7228)
    • Connects to the CnC server

      • 9c65d850589e6ab34c6c8e65b8a3b4aa26fa913ca850472023a3b708f95c226b.exe (PID: 8892)
    • SILVERFOX has been detected (SURICATA)

      • 9c65d850589e6ab34c6c8e65b8a3b4aa26fa913ca850472023a3b708f95c226b.exe (PID: 8892)
    • RAT has been found (auto)

      • TsarBomba.exe (PID: 6048)
    • ADESSTEALER has been found (auto)

      • TsarBomba.exe (PID: 6048)
    • DISCORDTOKEN has been found (auto)

      • TsarBomba.exe (PID: 6048)
    • JLOCKER has been found (auto)

      • TsarBomba.exe (PID: 6048)
    • HIDDENTEAR has been found (auto)

      • TsarBomba.exe (PID: 6048)
    • Adds path to the Windows Defender exclusion list

      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 4428)
      • c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba.exe (PID: 9084)
      • cmd.exe (PID: 13140)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 10896)
      • cmd.exe (PID: 10312)
    • Changes Windows Defender settings

      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 4428)
      • cmd.exe (PID: 13140)
    • Starts CMD.EXE for self-deleting

      • f74ea81bcd59a58e2784f74cd28c63744de51639ccc974507eff5619764b0f4d.exe (PID: 8232)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • Tsar2.exe (PID: 9064)
      • e934e286e2ec0985f44cc3109c6db434a65aeb731a8979e931164881ba2d4729.exe (PID: 9056)
      • TsarBomba.exe (PID: 6048)
      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 9044)
      • InstallUtil.exe (PID: 11048)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 9088)
      • Tsar2.exe (PID: 9064)
      • ShellExperienceHost.exe (PID: 8148)
      • TsarBomba.exe (PID: 6048)
    • Executable content was dropped or overwritten

      • Tsar2.exe (PID: 9064)
      • e934e286e2ec0985f44cc3109c6db434a65aeb731a8979e931164881ba2d4729.exe (PID: 9056)
      • TsarBomba.exe (PID: 6048)
      • Tsar3.exe (PID: 8156)
      • ResonateII.exe (PID: 6268)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 4428)
      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 9044)
      • e98182d44dc7ec4a154021757da3132769db318cf9d78f15fc06c92682f8a253.exe (PID: 9944)
      • f497e0f58f93c129f70a89f01aa20b3a5372e4e9f83580ad9a1d8e613ab389a9.exe (PID: 10440)
      • ffcc4cc79785d4b96b26d0db89383627e084c3483b1e787ac1150d8e6917f506.exe (PID: 10552)
      • Tsar2.exe (PID: 8688)
      • TsarBomba.exe (PID: 10184)
      • aead1f538ae65044f17554b188d4d1f88d7c4840bb554f3d70a2fe3ab86f6abf.exe (PID: 9960)
      • setup_x86_x64_install.exe (PID: 11724)
      • InstallUtil.exe (PID: 11048)
    • Starts a Microsoft application from unusual location

      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 9044)
      • 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe (PID: 1088)
      • c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba.exe (PID: 9084)
      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 13184)
    • Reads the history of recent RDP connections

      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 9044)
    • Executes as Windows Service

      • VSSVC.exe (PID: 6264)
    • Uses WMIC.EXE to obtain Windows Installer data

      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 660)
    • Starts POWERSHELL.EXE for commands execution

      • 1bad2b6e8ab16c5a692b2d05f68f7924a73a5818ddf3a9678ca8caab3568a78e.exe (PID: 5772)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 4428)
      • f258f660f30a7f9669b025d9c2d5663f16c576a03f48e6fc169af692d43336c3.exe (PID: 10292)
      • cmd.exe (PID: 13140)
    • Starts CMD.EXE for commands execution

      • 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe (PID: 8200)
      • 188c3798b6d41bdfa3981bb61a40b81f4fe123c64b9bed2d4c40951de2064f19.exe (PID: 8608)
      • ab0acdb0c45ccafcc0ec594d30dc8153936574dde9ebe4e0b22504770361c666.exe (PID: 9916)
      • c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba.exe (PID: 9084)
      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 4428)
      • f74ea81bcd59a58e2784f74cd28c63744de51639ccc974507eff5619764b0f4d.exe (PID: 8232)
    • Contacting a server suspected of hosting an CnC

      • 9c65d850589e6ab34c6c8e65b8a3b4aa26fa913ca850472023a3b708f95c226b.exe (PID: 8892)
    • Executes application which crashes

      • 954d8fcd6b74d76999f9ec033ca855ffdab6595be23039f03bc4c6017fa3932c.exe (PID: 664)
      • d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe (PID: 13404)
      • 0379d402a94f960380d7d91e3bfa106eeac01cd39ae7b0ba5010ba737088a215.exe (PID: 9132)
      • d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe (PID: 13352)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe (PID: 660)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 8968)
      • e962736250ea5b158e2b690f6154ef8d3309c9e63aadb575583ebaded94b049e.exe (PID: 9016)
    • Connects to unusual port

      • 9c65d850589e6ab34c6c8e65b8a3b4aa26fa913ca850472023a3b708f95c226b.exe (PID: 8892)
      • 755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe (PID: 7228)
      • 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe (PID: 668)
      • 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe (PID: 8968)
    • Executed via WMI

      • schtasks.exe (PID: 10328)
      • schtasks.exe (PID: 10376)
      • schtasks.exe (PID: 10528)
      • schtasks.exe (PID: 10580)
      • schtasks.exe (PID: 10448)
      • schtasks.exe (PID: 4200)
      • schtasks.exe (PID: 10532)
      • schtasks.exe (PID: 10620)
      • schtasks.exe (PID: 10660)
      • schtasks.exe (PID: 11024)
      • schtasks.exe (PID: 11096)
      • schtasks.exe (PID: 11148)
      • schtasks.exe (PID: 11180)
      • schtasks.exe (PID: 8328)
      • schtasks.exe (PID: 10512)
      • schtasks.exe (PID: 10492)
      • schtasks.exe (PID: 10356)
      • schtasks.exe (PID: 10596)
    • Script adds exclusion path to Windows Defender

      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 4428)
      • cmd.exe (PID: 13140)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • MSBuild.exe (PID: 10272)
      • MSBuild.exe (PID: 8680)
    • Application launched itself

      • MEMZ.exe (PID: 7352)
      • d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe (PID: 8088)
    • Executing commands from a ".bat" file

      • 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe (PID: 4428)
    • The process executes via Task Scheduler

      • mshta.exe (PID: 14332)
    • BASE64 encoded PowerShell command has been detected

      • f258f660f30a7f9669b025d9c2d5663f16c576a03f48e6fc169af692d43336c3.exe (PID: 10292)
    • Base64-obfuscated command line is found

      • f258f660f30a7f9669b025d9c2d5663f16c576a03f48e6fc169af692d43336c3.exe (PID: 10292)
    • Drops 7-zip archiver for unpacking

      • setup_x86_x64_install.exe (PID: 11724)
    • Starts application with an unusual extension

      • cmd.exe (PID: 12968)
    • Start notepad (likely ransomware note)

      • MEMZ.exe (PID: 13928)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 1116)
  • INFO

    • Checks supported languages

      • identity_helper.exe (PID: 8532)
      • Tsar2.exe (PID: 9064)
      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 9044)
      • e934e286e2ec0985f44cc3109c6db434a65aeb731a8979e931164881ba2d4729.exe (PID: 9056)
      • ResonateII.exe (PID: 6268)
      • ShellExperienceHost.exe (PID: 8148)
      • 0fd46aca09c54c256d22420d2ac3e947ff204a42a24158dfcb562de18a77f3f1.exe (PID: 4628)
      • 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe (PID: 668)
      • 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe (PID: 1088)
      • TsarBomba.exe (PID: 6048)
    • Manual execution by a user

      • WinRAR.exe (PID: 9088)
      • WinRAR.exe (PID: 8764)
    • Application launched itself

      • msedge.exe (PID: 7180)
    • Reads Environment values

      • identity_helper.exe (PID: 8532)
    • Reads the computer name

      • identity_helper.exe (PID: 8532)
      • Tsar2.exe (PID: 9064)
      • e934e286e2ec0985f44cc3109c6db434a65aeb731a8979e931164881ba2d4729.exe (PID: 9056)
      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 9044)
      • TsarBomba.exe (PID: 6048)
      • 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe (PID: 668)
      • 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe (PID: 1088)
      • ShellExperienceHost.exe (PID: 8148)
      • ResonateII.exe (PID: 6268)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 9088)
      • e934e286e2ec0985f44cc3109c6db434a65aeb731a8979e931164881ba2d4729.exe (PID: 9056)
      • TsarBomba.exe (PID: 6048)
      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 9044)
      • setup_x86_x64_install.exe (PID: 11724)
      • InstallUtil.exe (PID: 11048)
    • The sample compiled with chinese language support

      • Tsar2.exe (PID: 9064)
    • Create files in a temporary directory

      • Tsar2.exe (PID: 9064)
      • TsarBomba.exe (PID: 6048)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 9088)
    • Process checks computer location settings

      • Tsar2.exe (PID: 9064)
      • TsarBomba.exe (PID: 6048)
    • Creates files in the program directory

      • e934e286e2ec0985f44cc3109c6db434a65aeb731a8979e931164881ba2d4729.exe (PID: 9056)
    • The sample compiled with russian language support

      • TsarBomba.exe (PID: 6048)
    • FSG packer has been detected

      • DIANTRE.exe (PID: 7816)
    • Attempting to use instant messaging service

      • svchost.exe (PID: 2196)
      • MSBuild.exe (PID: 10272)
    • UPX packer has been detected

      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 9044)
    • Compiled with Borland Delphi (YARA)

      • aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe (PID: 9044)
    • Application based on Java

      • javaw.exe (PID: 10964)
    • Changes the display of characters in the console

      • cmd.exe (PID: 12968)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
380
Monitored processes
236
Malicious processes
15
Suspicious processes
5

Behavior graph

Click at the process to see the details
start iexplore.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs sppextcomobj.exe no specs slui.exe identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs rundll32.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs winrar.exe no specs winrar.exe diantre.exe no specs diantre.exe no specs tsar2.exe no specs #SALITY tsar2.exe #SALITY aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe #SALITY e934e286e2ec0985f44cc3109c6db434a65aeb731a8979e931164881ba2d4729.exe resonateii.exe shellexperiencehost.exe no specs #GENERIC tsarbomba.exe 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe conhost.exe no specs 0fd46aca09c54c256d22420d2ac3e947ff204a42a24158dfcb562de18a77f3f1.exe no specs 01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe no specs tsar3.exe no specs 1bad2b6e8ab16c5a692b2d05f68f7924a73a5818ddf3a9678ca8caab3568a78e.exe no specs conhost.exe no specs 3e3c7d3f5f93d7bf260aca7612b4dbc5d0e90992841f7e6826d7fb7fa3abe044.exe no specs conhost.exe no specs 4d5ecf3d1955458195771630f03f6ef42f5f62e66ed8e0681f8311d25aecc2bb.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs 5f7dbb2374af6314df4cd22c830ffaced38bc2ea8ec16775e502d7422ca74f35.exe 6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exe 7a8c864ed8b7ca908d3f317d7e63a30a85fb3e8c94070f23f2cf0bfa01c5e0b5.exe no specs #SILVERFOX 9c65d850589e6ab34c6c8e65b8a3b4aa26fa913ca850472023a3b708f95c226b.exe cmd.exe no specs 59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe conhost.exe no specs #KILLMBR tsar3.exe 60e76eda46185d1d2e9463d15e31d4c87eb03535d368cc3471c55992bc99ad5f.exe no specs vssadmin.exe no specs 65fd5041c1a1c4115b0c59995221023486f02e5e5d8e313c3e48f3a42ef9a623.exe no specs vssvc.exe no specs monoxidex64.exe no specs msbuild.exe 77ebb550f38da3f28a65940a4c665ae3a679249ad906aa39387568a1f7ddd3fa.exe no specs memz.exe no specs 80e3a04fa68be799b3c91737e1918f8394b250603a231a251524244e4d7f77d9.exe no specs 03834e6c7a8bac7bb283f0ffca293cda50b4547237cc32c8b6e16501771cb705.exe no specs 182fb9756b66963f458ebbe0f20ff2715a758825ac6655fc56ec85579df61330.exe no specs 188c3798b6d41bdfa3981bb61a40b81f4fe123c64b9bed2d4c40951de2064f19.exe no specs 0379d402a94f960380d7d91e3bfa106eeac01cd39ae7b0ba5010ba737088a215.exe 539b377d4a33d1e884f18ecf0e0b0330e5dc26023b7ae051843cac8014142d98.exe #FLOXIF tsar2.exe 577b3a152ddc9d6558ad1b38ef6da89257229adf06d298ea025048a6d5d2fcea.exe no specs #METERPRETER 755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe 771a06e3a1bdb42a7249d1c888e740c2bc46ba30b54490188c17f6c84ca96e26.exe no specs 876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe 954d8fcd6b74d76999f9ec033ca855ffdab6595be23039f03bc4c6017fa3932c.exe 4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe no specs 4895f3e5549c1333698e23707fb39c0d24c33c31d1bc089b7970911fba3dc0f7.exe 06922dd72ff4f3e3cffcfe8a6f2070672c341588f3a8ea1f847a0cdf601854d5.exe no specs wmic.exe no specs 53055b6d2651d5c6b4a0bf9ee2f50c73918e65c9d36acfd10eb2eefb0d3e957f.exe no specs conhost.exe no specs 145289accb8c684e583ca3d99532d64d0a6a40142062e648c65ffd8da070c4c9.exe no specs a0da672fdaf8943fc0453424197c5ae5539ed1cc86a47e955ea706a3e8365fe7.exe no specs a10fe565f9891cb66e24299122c236e1e641451564a930b60ae91a24e09e6d62.exe no specs aa76b4db29cf929b4b22457ccb8cd77308191f091cde2f69e578ade9708d7949.exe tsarbomba.exe no specs ab0acdb0c45ccafcc0ec594d30dc8153936574dde9ebe4e0b22504770361c666.exe no specs msedge.exe no specs cmd.exe no specs aead1f538ae65044f17554b188d4d1f88d7c4840bb554f3d70a2fe3ab86f6abf.exe conhost.exe no specs msedge.exe no specs vssadmin.exe no specs b066d97c63093902c0debe32ed5a001cc150eae3fb841d87a58408762d32466e.exe no specs b975f3981291f86d4a8f023b2cd5473abf6b8f4f33bb6f6cbb19bab0fa01d2ad.exe no specs conhost.exe no specs c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba.exe no specs tsarbomba.exe c348c7e4d9028bdf84aba828bbb81ce46ae55c0246a94351edbfb9c63e41a8ee.exe no specs werfault.exe no specs c558e126c64a89887115a45276d5a8751f90c399eb32ca103f6e50901abc7abd.exe no specs cf75a4bb6793649841a5c9c4a7dcd93e3bea2924333d13bb855b8996b2cb8955.exe no specs d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe no specs def98259bba7c128a22dbb9100a3e9512911d9775ec82175f8a8a3c26b993dbf.exe no specs svchost.exe e0a8383a4c0beb02f1004468b777a85720343bf25e09f50d23975bb91fff4448.exe no specs e98182d44dc7ec4a154021757da3132769db318cf9d78f15fc06c92682f8a253.exe e962736250ea5b158e2b690f6154ef8d3309c9e63aadb575583ebaded94b049e.exe eac7ea3969f4483a6f1ed27bad46dbb2f32c40be8f402e6e815d6917cd5731ac.exe no specs conhost.exe no specs f74ea81bcd59a58e2784f74cd28c63744de51639ccc974507eff5619764b0f4d.exe no specs msbuild.exe f258f660f30a7f9669b025d9c2d5663f16c576a03f48e6fc169af692d43336c3.exe no specs cmd.exe no specs schtasks.exe no specs schtasks.exe no specs f497e0f58f93c129f70a89f01aa20b3a5372e4e9f83580ad9a1d8e613ab389a9.exe schtasks.exe no specs schtasks.exe no specs ffcc4cc79785d4b96b26d0db89383627e084c3483b1e787ac1150d8e6917f506.exe schtasks.exe no specs dd71256ff21fa4337f050ad39ef5e00650c9dc13c9b8a7eb4fe7e8d64150ce45.exe schtasks.exe no specs schtasks.exe no specs regasm.exe no specs conhost.exe no specs conhost.exe no specs mshta.exe no specs cmd.exe no specs mshta.exe no specs javaw.exe no specs schtasks.exe no specs caspol.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs setup_x86_x64_install.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs setup_x86_x64_install.exe conhost.exe no specs slui.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs memz.exe no specs aae8a9852809300d5ee4f5a8031f42f660dff3e427aef081d9aeabb2dca84058.exe no specs svchost.exe schtasks.exe no specs icacls.exe no specs conhost.exe no specs conhost.exe no specs 0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe no specs memz.exe no specs cmd.exe no specs e934e286e2ec0985f44cc3109c6db434a65aeb731a8979e931164881ba2d4729.exe no specs d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe schtasks.exe no specs d371d9409cca4b22d1e90df46524f7112e06bf74a90f65f236957b63fdad2c1b.exe werfault.exe no specs werfault.exe no specs werfault.exe no specs powershell.exe no specs memz.exe no specs conhost.exe no specs conhost.exe no specs memz.exe no specs memz.exe no specs memz.exe no specs conhost.exe no specs dfsvc.exe no specs powershell.exe no specs setup_installer.exe no specs conhost.exe no specs resonateii.exe no specs mshta.exe no specs cmd.exe no specs chcp.com no specs installutil.exe conhost.exe no specs notepad.exe no specs timeout.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
660"C:\Users\admin\AppData\Local\Temp\876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe" C:\Users\admin\AppData\Local\Temp\876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe
TsarBomba.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
664"C:\Users\admin\AppData\Local\Temp\954d8fcd6b74d76999f9ec033ca855ffdab6595be23039f03bc4c6017fa3932c.exe" C:\Users\admin\AppData\Local\Temp\954d8fcd6b74d76999f9ec033ca855ffdab6595be23039f03bc4c6017fa3932c.exe
TsarBomba.exe
User:
admin
Integrity Level:
HIGH
Description:
Exit code:
3762504530
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\954d8fcd6b74d76999f9ec033ca855ffdab6595be23039f03bc4c6017fa3932c.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
668"C:\Users\admin\AppData\Local\Temp\0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe" C:\Users\admin\AppData\Local\Temp\0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe
TsarBomba.exe
User:
admin
Integrity Level:
HIGH
Description:
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\0f78a658b60f0879acccf0933d9ae8a5d2c188e9f16b8e6f7b01bd0cc9b5c4e1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
684"C:\Users\admin\AppData\Local\Temp\60e76eda46185d1d2e9463d15e31d4c87eb03535d368cc3471c55992bc99ad5f.exe" C:\Users\admin\AppData\Local\Temp\60e76eda46185d1d2e9463d15e31d4c87eb03535d368cc3471c55992bc99ad5f.exeTsarBomba.exe
User:
admin
Company:
VAN32
Integrity Level:
HIGH
Description:
WinLocker Builder
Version:
0.4.0.0
Modules
Images
c:\users\admin\appdata\local\temp\60e76eda46185d1d2e9463d15e31d4c87eb03535d368cc3471c55992bc99ad5f.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
968powershell -Command "& { }"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe1bad2b6e8ab16c5a692b2d05f68f7924a73a5818ddf3a9678ca8caab3568a78e.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1020"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=6864 --field-trial-handle=2164,i,14310189153868690160,1868098558587580948,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1056"C:\Users\admin\AppData\Local\Temp\4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe" C:\Users\admin\AppData\Local\Temp\4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exeTsarBomba.exe
User:
admin
Company:
博典创新科技
Integrity Level:
HIGH
Description:
亚历山大学者版
Version:
3.5.2240.18
Modules
Images
c:\users\admin\appdata\local\temp\4797cb80b22ba0da0ede6593bfc16399a5ffc289400155115c8de7786ea0db49.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1088"C:\Users\admin\AppData\Local\Temp\01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe" C:\Users\admin\AppData\Local\Temp\01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exeTsarBomba.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Shell Extension
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\01ec7b1066df7c55e262dc375bff5fd13a1fc9706c3db4b3522ac8b9d2453b52.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1116"cmd.exe" /C timeout 1 && del "C:\Users\admin\AppData\Local\Temp\f74ea81bcd59a58e2784f74cd28c63744de51639ccc974507eff5619764b0f4d.exe"C:\Windows\SysWOW64\cmd.exef74ea81bcd59a58e2784f74cd28c63744de51639ccc974507eff5619764b0f4d.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1184"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=7312 --field-trial-handle=2164,i,14310189153868690160,1868098558587580948,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
92 161
Read events
90 759
Write events
1 393
Delete events
9

Modification events

(PID) Process:(4112) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4112) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4112) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(4112) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(4112) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(4112) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:DisableFirstRunCustomize
Value:
1
(PID) Process:(7180) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(7180) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(7180) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(7180) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
Executable files
142
Suspicious files
669
Text files
369
Unknown types
0

Dropped files

PID
Process
Filename
Type
7180msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF10b0c4.TMP
MD5:
SHA256:
7180msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF10b0d3.TMP
MD5:
SHA256:
7180msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
7180msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
7180msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF10b0d3.TMP
MD5:
SHA256:
7180msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF10b0e3.TMP
MD5:
SHA256:
7180msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
7180msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
7180msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF10b0f3.TMP
MD5:
SHA256:
7180msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
99
DNS requests
95
Threats
23

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
8620
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8620
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
660
876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
whitelisted
8968
59ab63c99285e35679153e299e411aa32a94d25482566428a6fd7d908f04d4ad.exe
GET
200
208.95.112.1:80
http://ip-api.com/json/
unknown
whitelisted
1852
svchost.exe
HEAD
200
2.19.126.157:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/fb6dd03b-99d7-4cc8-a878-91c8e655c2d3?P1=1747698237&P2=404&P3=2&P4=JWjeqkFDxuz2FSSaz%2bHpMrunvxl4wDEGRnFpv4%2fUhq9DCXQYRuYcPrW3z0zilEgoeF9i1TJ28RM2v2pAx6pjSw%3d%3d
unknown
whitelisted
9016
e962736250ea5b158e2b690f6154ef8d3309c9e63aadb575583ebaded94b049e.exe
GET
200
208.95.112.1:80
http://ip-api.com/json/84.17.48.85
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
7180
msedge.exe
239.255.255.250:1900
whitelisted
7420
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7420
msedge.exe
86.80.32.182:80
dro.pm
KPN B.V.
NL
unknown
7420
msedge.exe
150.171.28.11:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7420
msedge.exe
13.107.246.45:443
edge-mobile-static.azureedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
  • 23.216.77.42
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
google.com
  • 142.250.185.206
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
dro.pm
  • 86.80.32.182
unknown
edge.microsoft.com
  • 150.171.28.11
  • 150.171.27.11
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted
update.googleapis.com
  • 216.58.206.67
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Misc activity
ET INFO Discord Chat Service Domain in DNS Lookup (gateway .discord .gg)
8856
6ca05da8350d9f5e5d3a7547c0d4693ebc1190e3b76f58f4196021d0c080c722.exe
Misc activity
ET INFO Observed Discord Service Domain (gateway .discord .gg) in TLS SNI
7228
755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe
Targeted Malicious Activity was Detected
ET HUNTING Suspicious Empty SSL Certificate - Observed in Cobalt Strike
7228
755b9e89416a664f52a0dfee6de54687f15ae900a7317763b0a4144996724f6a.exe
A Network Trojan was detected
ET MALWARE Meterpreter or Other Reverse Shell SSL Cert
8892
9c65d850589e6ab34c6c8e65b8a3b4aa26fa913ca850472023a3b708f95c226b.exe
Malware Command and Control Activity Detected
ET MALWARE Winos4.0 Framework CnC Login Message
8892
9c65d850589e6ab34c6c8e65b8a3b4aa26fa913ca850472023a3b708f95c226b.exe
Malware Command and Control Activity Detected
BACKDOOR [ANY.RUN] SilverFox Keep-Alive Client Packet
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
660
876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
660
876ba1145745c2e088c0df36f8241a20916a092211d05646eae5c7004dd4d429.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
2196
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
No debug info