File name:

7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe

Full analysis: https://app.any.run/tasks/1ab3d3a7-7f49-431d-a776-c31f2c60006f
Verdict: Malicious activity
Threats:

Crypto mining malware is a resource-intensive threat that infiltrates computers with the purpose of mining cryptocurrencies. This type of threat can be deployed either on an infected machine or a compromised website. In both cases the miner will utilize the computing power of the device and its network bandwidth.

Analysis date: June 23, 2024, 04:24:18
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
miner
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

2F9281010BF12890403934BDB517C2C4

SHA1:

6E822864DD45FA4A09D29B6E0DC5906DBF96E3D1

SHA256:

7CCEF9AF5267C22A56BDBAF2F9109A02611BBA461E0B0321BED42B5911163272

SSDEEP:

98304:A+cD4dn2JsQP3sBI6IauBPDZONh4DkLmDYfuXqGQoHbHL7WdAIyTjlKmWOSd5gUf:FAFLs

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe (PID: 1484)
      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe (PID: 232)
      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 5124)
      • BitComet_2.08_setup.exe (PID: 3052)
      • prod0.exe (PID: 4432)
      • 2f0x0dds.exe (PID: 2008)
      • UnifiedStub-installer.exe (PID: 1540)
    • Scans artifacts that could help determine the target

      • BitComet_stats.exe (PID: 1388)
      • BitComet.exe (PID: 696)
    • Actions looks like stealing of personal data

      • UnifiedStub-installer.exe (PID: 1540)
      • rsEngineSvc.exe (PID: 6992)
    • Creates a writable file in the system directory

      • UnifiedStub-installer.exe (PID: 1540)
      • rsEDRSvc.exe (PID: 2328)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 2720)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 4624)
      • BitComet_2.08_setup.exe (PID: 3052)
      • BitComet_stats.exe (PID: 1388)
      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 5124)
      • prod0.exe (PID: 4432)
      • BitComet.exe (PID: 696)
      • rsWSC.exe (PID: 6592)
      • UnifiedStub-installer.exe (PID: 1540)
      • rsEngineSvc.exe (PID: 3168)
      • rsEDRSvc.exe (PID: 7080)
    • Executable content was dropped or overwritten

      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe (PID: 1484)
      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe (PID: 232)
      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 5124)
      • BitComet_2.08_setup.exe (PID: 3052)
      • prod0.exe (PID: 4432)
      • 2f0x0dds.exe (PID: 2008)
      • UnifiedStub-installer.exe (PID: 1540)
    • Reads the date of Windows installation

      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 4624)
      • BitComet_2.08_setup.exe (PID: 3052)
      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 5124)
      • prod0.exe (PID: 4432)
      • BitComet.exe (PID: 696)
      • rsEDRSvc.exe (PID: 2328)
    • Reads the Windows owner or organization settings

      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 5124)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • BitComet_2.08_setup.exe (PID: 3052)
    • Process drops legitimate windows executable

      • BitComet_2.08_setup.exe (PID: 3052)
      • 2f0x0dds.exe (PID: 2008)
      • UnifiedStub-installer.exe (PID: 1540)
    • Creates/Modifies COM task schedule object

      • BitComet_2.08_setup.exe (PID: 3052)
    • Creates or modifies Windows services

      • BitCometService.exe (PID: 2476)
      • UnifiedStub-installer.exe (PID: 1540)
      • rundll32.exe (PID: 2720)
    • The process creates files with name similar to system file names

      • BitComet_2.08_setup.exe (PID: 3052)
      • UnifiedStub-installer.exe (PID: 1540)
    • Reads Microsoft Outlook installation path

      • BitComet_stats.exe (PID: 1388)
      • BitComet.exe (PID: 696)
    • Checks Windows Trust Settings

      • BitComet_stats.exe (PID: 1388)
      • BitComet.exe (PID: 696)
      • rsWSC.exe (PID: 6592)
      • rsEngineSvc.exe (PID: 3168)
      • rsEDRSvc.exe (PID: 7080)
      • rsWSC.exe (PID: 7128)
      • rsEDRSvc.exe (PID: 2328)
    • Reads Internet Explorer settings

      • BitComet_stats.exe (PID: 1388)
      • BitComet.exe (PID: 696)
    • The process executes via Task Scheduler

      • BitComet.exe (PID: 696)
    • Executes as Windows Service

      • BitCometService.exe (PID: 3828)
      • rsSyncSvc.exe (PID: 6544)
      • rsWSC.exe (PID: 7128)
      • rsClientSvc.exe (PID: 5844)
      • rsEngineSvc.exe (PID: 6992)
      • rsEDRSvc.exe (PID: 2328)
    • Changes Internet Explorer settings (feature browser emulation)

      • BitComet.exe (PID: 696)
    • Creates a software uninstall entry

      • UnifiedStub-installer.exe (PID: 1540)
    • Searches for installed software

      • UnifiedStub-installer.exe (PID: 1540)
    • Executes application which crashes

      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 5124)
    • Changes default file association

      • BitComet.exe (PID: 696)
    • Potential Corporate Privacy Violation

      • BitComet.exe (PID: 696)
    • The process drops C-runtime libraries

      • UnifiedStub-installer.exe (PID: 1540)
    • Connects to unusual port

      • BitComet.exe (PID: 696)
    • Creates files in the driver directory

      • UnifiedStub-installer.exe (PID: 1540)
    • Uses RUNDLL32.EXE to load library

      • UnifiedStub-installer.exe (PID: 1540)
    • Uses WEVTUTIL.EXE to install publishers and event logs from the manifest

      • UnifiedStub-installer.exe (PID: 1540)
    • Drops a system driver (possible attempt to evade defenses)

      • UnifiedStub-installer.exe (PID: 1540)
    • Drops 7-zip archiver for unpacking

      • UnifiedStub-installer.exe (PID: 1540)
    • Adds/modifies Windows certificates

      • rsWSC.exe (PID: 6592)
      • rsEngineSvc.exe (PID: 3168)
      • rsEDRSvc.exe (PID: 2328)
    • Reads the BIOS version

      • rsEDRSvc.exe (PID: 2328)
    • Process checks is Powershell's Script Block Logging on

      • rsEDRSvc.exe (PID: 2328)
    • Dropped object may contain URLs of mainers pools

      • rsEngineSvc.exe (PID: 6992)
  • INFO

    • Checks supported languages

      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe (PID: 1484)
      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 4624)
      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe (PID: 232)
      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 5124)
      • BitComet_2.08_setup.exe (PID: 3052)
      • BitCometService.exe (PID: 2476)
      • BitComet_stats.exe (PID: 1388)
      • prod0.exe (PID: 4432)
      • 2f0x0dds.exe (PID: 2008)
      • BitCometService.exe (PID: 3828)
      • UnifiedStub-installer.exe (PID: 1540)
      • BitComet.exe (PID: 4564)
      • BitComet.exe (PID: 696)
      • UPNP.exe (PID: 6388)
      • rsSyncSvc.exe (PID: 6544)
      • rsSyncSvc.exe (PID: 6468)
      • UPNP.exe (PID: 7096)
      • rsWSC.exe (PID: 6592)
      • rsWSC.exe (PID: 7128)
      • rsClientSvc.exe (PID: 6960)
      • rsClientSvc.exe (PID: 5844)
      • rsEngineSvc.exe (PID: 3168)
      • rsEngineSvc.exe (PID: 6992)
      • rsEDRSvc.exe (PID: 7080)
      • rsHelper.exe (PID: 2020)
      • rsEDRSvc.exe (PID: 2328)
    • Create files in a temporary directory

      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe (PID: 1484)
      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe (PID: 232)
      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 5124)
      • BitComet_2.08_setup.exe (PID: 3052)
      • 2f0x0dds.exe (PID: 2008)
      • prod0.exe (PID: 4432)
      • UnifiedStub-installer.exe (PID: 1540)
    • Reads the computer name

      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 4624)
      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 5124)
      • BitComet_2.08_setup.exe (PID: 3052)
      • BitCometService.exe (PID: 2476)
      • prod0.exe (PID: 4432)
      • BitComet_stats.exe (PID: 1388)
      • BitCometService.exe (PID: 3828)
      • UnifiedStub-installer.exe (PID: 1540)
      • BitComet.exe (PID: 696)
      • BitComet.exe (PID: 4564)
      • UPNP.exe (PID: 6388)
      • rsSyncSvc.exe (PID: 6544)
      • rsSyncSvc.exe (PID: 6468)
      • UPNP.exe (PID: 7096)
      • rsWSC.exe (PID: 6592)
      • rsWSC.exe (PID: 7128)
      • rsClientSvc.exe (PID: 6960)
      • rsClientSvc.exe (PID: 5844)
      • rsEngineSvc.exe (PID: 3168)
      • rsEngineSvc.exe (PID: 6992)
      • rsEDRSvc.exe (PID: 7080)
      • rsEDRSvc.exe (PID: 2328)
      • rsHelper.exe (PID: 2020)
    • Process checks computer location settings

      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 4624)
      • BitComet_2.08_setup.exe (PID: 3052)
      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 5124)
      • prod0.exe (PID: 4432)
      • BitComet.exe (PID: 696)
    • Reads the software policy settings

      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 5124)
      • BitComet_stats.exe (PID: 1388)
      • prod0.exe (PID: 4432)
      • UnifiedStub-installer.exe (PID: 1540)
      • WerFault.exe (PID: 6896)
      • WerFault.exe (PID: 6700)
      • BitComet.exe (PID: 696)
      • rsWSC.exe (PID: 6592)
      • rsEngineSvc.exe (PID: 6992)
      • rsEDRSvc.exe (PID: 7080)
      • rsEngineSvc.exe (PID: 3168)
      • rsEDRSvc.exe (PID: 2328)
      • rsWSC.exe (PID: 7128)
    • Reads the machine GUID from the registry

      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 5124)
      • BitComet_stats.exe (PID: 1388)
      • prod0.exe (PID: 4432)
      • UnifiedStub-installer.exe (PID: 1540)
      • BitComet.exe (PID: 696)
      • rsWSC.exe (PID: 6592)
      • rsWSC.exe (PID: 7128)
      • rsEngineSvc.exe (PID: 3168)
      • rsEngineSvc.exe (PID: 6992)
      • rsEDRSvc.exe (PID: 7080)
      • rsEDRSvc.exe (PID: 2328)
      • rsHelper.exe (PID: 2020)
    • Creates files in the program directory

      • BitComet_2.08_setup.exe (PID: 3052)
      • UnifiedStub-installer.exe (PID: 1540)
      • rsWSC.exe (PID: 6592)
      • rsEngineSvc.exe (PID: 3168)
      • rsEngineSvc.exe (PID: 6992)
      • rsEDRSvc.exe (PID: 7080)
      • rsEDRSvc.exe (PID: 2328)
    • Creates files or folders in the user directory

      • BitComet_2.08_setup.exe (PID: 3052)
      • BitComet_stats.exe (PID: 1388)
      • BitComet.exe (PID: 696)
      • WerFault.exe (PID: 6700)
      • WerFault.exe (PID: 6896)
      • rsWSC.exe (PID: 6592)
      • rsEngineSvc.exe (PID: 3168)
    • Checks proxy server information

      • 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp (PID: 5124)
      • BitComet_stats.exe (PID: 1388)
      • prod0.exe (PID: 4432)
      • BitComet.exe (PID: 696)
      • UnifiedStub-installer.exe (PID: 1540)
      • WerFault.exe (PID: 6700)
      • WerFault.exe (PID: 6896)
      • rsWSC.exe (PID: 6592)
      • rsEngineSvc.exe (PID: 3168)
    • Creates a software uninstall entry

      • BitComet_2.08_setup.exe (PID: 3052)
    • Process checks Internet Explorer phishing filters

      • BitComet_stats.exe (PID: 1388)
      • BitComet.exe (PID: 696)
    • Disables trace logs

      • prod0.exe (PID: 4432)
      • UnifiedStub-installer.exe (PID: 1540)
      • rsEngineSvc.exe (PID: 6992)
      • rsEDRSvc.exe (PID: 2328)
    • Reads Environment values

      • prod0.exe (PID: 4432)
      • UnifiedStub-installer.exe (PID: 1540)
      • rsEngineSvc.exe (PID: 6992)
      • rsEDRSvc.exe (PID: 2328)
    • Reads CPU info

      • BitComet.exe (PID: 696)
      • rsEDRSvc.exe (PID: 2328)
    • Reads the time zone

      • runonce.exe (PID: 6688)
      • rsEDRSvc.exe (PID: 2328)
    • Reads security settings of Internet Explorer

      • runonce.exe (PID: 6688)
    • Reads product name

      • rsEDRSvc.exe (PID: 2328)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (67.7)
.exe | Win32 EXE PECompact compressed (generic) (25.6)
.exe | Win32 Executable (generic) (2.7)
.exe | Win16/32 Executable Delphi generic (1.2)
.exe | Generic Win/DOS Executable (1.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:02:15 14:54:16+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 741888
InitializedDataSize: 131584
UninitializedDataSize: -
EntryPoint: 0xb5eec
OSVersion: 6.1
ImageVersion: 6
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 2.0.8.0
ProductVersionNumber: 2.0.8.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: BitComet Installer
FileVersion: 2.0.8.0
LegalCopyright: © BitComet
OriginalFileName:
ProductName: BitComet
ProductVersion: 2.0.8.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
178
Monitored processes
39
Malicious processes
13
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp no specs 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp bitcomet_2.08_setup.exe bitcometservice.exe bitcomet_stats.exe prod0.exe bitcomet.exe no specs 2f0x0dds.exe bitcomet.exe unifiedstub-installer.exe bitcometservice.exe upnp.exe no specs rssyncsvc.exe no specs conhost.exe no specs rssyncsvc.exe no specs werfault.exe werfault.exe upnp.exe rundll32.exe runonce.exe no specs grpconv.exe no specs wevtutil.exe no specs conhost.exe no specs fltmc.exe no specs conhost.exe no specs wevtutil.exe no specs conhost.exe no specs rswsc.exe rswsc.exe no specs rsclientsvc.exe no specs conhost.exe no specs rsclientsvc.exe no specs rsenginesvc.exe rsenginesvc.exe rsedrsvc.exe no specs rsedrsvc.exe rshelper.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
232"C:\Users\admin\AppData\Local\Temp\7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe" /SPAWNWND=$301E4 /NOTIFYWND=$701FA C:\Users\admin\AppData\Local\Temp\7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe
7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp
User:
admin
Company:
Integrity Level:
HIGH
Description:
BitComet Installer
Exit code:
3221226525
Version:
2.0.8.0
Modules
Images
c:\users\admin\appdata\local\temp\7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
696"C:\Program Files\BitComet\BitComet.exe"C:\Program Files\BitComet\BitComet.exe
svchost.exe
User:
admin
Company:
www.BitComet.com
Integrity Level:
MEDIUM
Description:
BitComet - a BitTorrent Client
Version:
2.8
Modules
Images
c:\program files\bitcomet\bitcomet.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1388"C:\Users\admin\AppData\Local\Temp\nsp4719.tmp\BitComet_stats.exe" https://www.bitcomet.com/client/install-stats/?l=en_us&file=BitComet_2.08_setup.exe&p=x64C:\Users\admin\AppData\Local\Temp\nsp4719.tmp\BitComet_stats.exe
BitComet_2.08_setup.exe
User:
admin
Integrity Level:
HIGH
Description:
stats Module
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\nsp4719.tmp\bitcomet_stats.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1484"C:\Users\admin\AppData\Local\Temp\7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe" C:\Users\admin\AppData\Local\Temp\7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
BitComet Installer
Exit code:
3221226525
Version:
2.0.8.0
Modules
Images
c:\users\admin\appdata\local\temp\7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
1540.\UnifiedStub-installer.exe /silentC:\Users\admin\AppData\Local\Temp\7zS8D70E44B\UnifiedStub-installer.exe
2f0x0dds.exe
User:
admin
Company:
Reason Software Company Inc.
Integrity Level:
HIGH
Description:
UnifiedStub
Version:
6.0.1
Modules
Images
c:\users\admin\appdata\local\temp\7zs8d70e44b\unifiedstub-installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2008"C:\Users\admin\AppData\Local\Temp\2f0x0dds.exe" /silentC:\Users\admin\AppData\Local\Temp\2f0x0dds.exe
prod0.exe
User:
admin
Company:
ReasonLabs
Integrity Level:
HIGH
Description:
ReasonLabs-setup-wizard.exe
Version:
6.0.1
Modules
Images
c:\users\admin\appdata\local\temp\2f0x0dds.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
2020"c:\program files\reasonlabs\epp\rsHelper.exe"C:\Program Files\ReasonLabs\EPP\rsHelper.exersEngineSvc.exe
User:
admin
Company:
Reason Software Company Inc.
Integrity Level:
MEDIUM
Description:
rsHelper
Version:
3.2.0.0
Modules
Images
c:\program files\reasonlabs\epp\rshelper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2328"C:\Program Files\ReasonLabs\EDR\rsEDRSvc.exe"C:\Program Files\ReasonLabs\EDR\rsEDRSvc.exe
services.exe
User:
SYSTEM
Company:
Reason Cybersecurity Ltd.
Integrity Level:
SYSTEM
Description:
Reason EDR Service
Version:
2.1.0
Modules
Images
c:\program files\reasonlabs\edr\rsedrsvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2476"C:\Program Files\BitComet\tools\BitCometService.exe" /regC:\Program Files\BitComet\tools\BitCometService.exe
BitComet_2.08_setup.exe
User:
admin
Company:
www.BitComet.com
Integrity Level:
HIGH
Description:
BitComet disk boost service
Exit code:
0
Version:
1.83
Modules
Images
c:\program files\bitcomet\tools\bitcometservice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2720"C:\WINDOWS\system32\rundll32.exe" setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngine.infC:\Windows\System32\rundll32.exe
UnifiedStub-installer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
Total events
65 871
Read events
65 521
Write events
286
Delete events
64

Modification events

(PID) Process:(5124) 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
04140000E2E9F93B25C5DA01
(PID) Process:(5124) 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
392D13AF3A843DD256CA18AE6E3B081EB060E55B8E553B617385AD8EC49DC07F
(PID) Process:(5124) 7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(3052) BitComet_2.08_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\BitCometAgent.DLL
Operation:writeName:AppID
Value:
{B99B5DF3-3AD2-463F-8F8C-86787623E1D5}
(PID) Process:(3052) BitComet_2.08_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C8FF2A06-638A-4913-8403-50294CFF6608}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(3052) BitComet_2.08_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C8FF2A06-638A-4913-8403-50294CFF6608}
Operation:writeName:AppID
Value:
{B99B5DF3-3AD2-463F-8F8C-86787623E1D5}
(PID) Process:(3052) BitComet_2.08_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E8A058D1-C830-437F-A029-10D777A8DD40}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(3052) BitComet_2.08_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E8A058D1-C830-437F-A029-10D777A8DD40}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(3052) BitComet_2.08_setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\BitComet
Operation:writeName:InstallSettingCaptureIEDownload
Value:
0
(PID) Process:(3052) BitComet_2.08_setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\BitComet\BitComet
Operation:writeName:CaptureIEDownload
Value:
0
Executable files
524
Suspicious files
213
Text files
60
Unknown types
45

Dropped files

PID
Process
Filename
Type
14847ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exeC:\Users\admin\AppData\Local\Temp\is-KBAJO.tmp\7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmpexecutable
MD5:4F0EF46DE64A97F2F8FCDF189068244D
SHA256:A462FAEAB6713E66C2C870B873FAD186E5B5351D853A0D5432A9EDD3311AC032
2327ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.exeC:\Users\admin\AppData\Local\Temp\is-SIN22.tmp\7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmpexecutable
MD5:4F0EF46DE64A97F2F8FCDF189068244D
SHA256:A462FAEAB6713E66C2C870B873FAD186E5B5351D853A0D5432A9EDD3311AC032
51247ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmpC:\Users\admin\AppData\Local\Temp\is-OP2FI.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
3052BitComet_2.08_setup.exeC:\Users\admin\AppData\Local\Temp\nsp4719.tmp\System.dllexecutable
MD5:75ED96254FBF894E42058062B4B4F0D1
SHA256:A632D74332B3F08F834C732A103DAFEB09A540823A2217CA7F49159755E8F1D7
51247ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmpC:\Users\admin\AppData\Local\Temp\is-OP2FI.tmp\prod0executable
MD5:5DC3CA6752D9782980C6408A00D8190E
SHA256:F1392EBFF0F3EE21B904674F7FCAC72714BA3803F9B8BCEBA2C32B368BD33B11
51247ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmpC:\Users\admin\AppData\Local\Temp\is-OP2FI.tmp\is-S4OOC.tmpexecutable
MD5:5DC3CA6752D9782980C6408A00D8190E
SHA256:F1392EBFF0F3EE21B904674F7FCAC72714BA3803F9B8BCEBA2C32B368BD33B11
51247ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmpC:\Users\admin\AppData\Local\Temp\is-OP2FI.tmp\is-UA610.tmpexecutable
MD5:4CEAA5FD4DD747379D447AFDCD5FB2AC
SHA256:47B7A8B217F54E610EA2DA1B2B36513F005C7CADBD65FF23CF40E5AA8A6D9F38
3052BitComet_2.08_setup.exeC:\Users\admin\AppData\Local\Temp\nsp4719.tmp\BitComet_stats.exeexecutable
MD5:EDB96675541D0275C42096B64D794D3B
SHA256:842DF63767CACB7AEDB75FB352C1505D518662E2E9DCA5A297515EBDAE093918
3052BitComet_2.08_setup.exeC:\Users\admin\AppData\Local\Temp\nsp4719.tmp\BcNsisHelperXP.dllexecutable
MD5:378AE59FFAECECAC8627A35B42C74147
SHA256:003EFD5E26C4E0338FB11B823D424F1C499C16391961C185F5F9A9FC71E56F82
3052BitComet_2.08_setup.exeC:\Program Files\BitComet\ReadMe.txttext
MD5:C1953606C5D7B5C1469F86F131F45167
SHA256:29CF2A2D4136762A256213ACBD1E4418E575CF15C6FBC9BECE81D11C0CA8E4A8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
46 991
DNS requests
73
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2444
svchost.exe
GET
200
2.23.154.57:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
2444
svchost.exe
GET
200
23.40.125.183:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
3040
OfficeClickToRun.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
unknown
5140
SIHClient.exe
GET
200
23.40.125.183:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
1544
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
4656
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D
unknown
unknown
5140
SIHClient.exe
GET
200
23.40.125.183:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
4856
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
unknown
1388
BitComet_stats.exe
GET
200
172.217.16.131:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
unknown
1388
BitComet_stats.exe
GET
200
172.217.16.131:80
http://c.pki.goog/r/r1.crl
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4032
svchost.exe
239.255.255.250:1900
whitelisted
2444
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3688
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2480
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5124
7ccef9af5267c22a56bdbaf2f9109a02611bba461e0b0321bed42b5911163272.tmp
99.86.1.228:443
d1453l02w3s2yt.cloudfront.net
AMAZON-02
US
unknown
2444
svchost.exe
2.23.154.57:80
crl.microsoft.com
Akamai International B.V.
AT
unknown
2444
svchost.exe
23.40.125.183:80
www.microsoft.com
Telia Company AB
SE
unknown
3040
OfficeClickToRun.exe
20.42.73.27:443
self.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3040
OfficeClickToRun.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
d1453l02w3s2yt.cloudfront.net
  • 99.86.1.228
  • 99.86.1.214
  • 99.86.1.44
  • 99.86.1.91
unknown
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.23.154.57
  • 104.103.72.96
  • 80.67.82.104
  • 80.67.82.89
whitelisted
www.microsoft.com
  • 23.40.125.183
  • 2.21.177.218
whitelisted
self.events.data.microsoft.com
  • 20.42.73.27
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.4
  • 20.190.159.2
  • 20.190.159.75
  • 20.190.159.23
  • 20.190.159.68
  • 20.190.159.73
  • 40.126.31.73
  • 40.126.31.69
whitelisted
r.bing.com
  • 95.101.23.43
  • 95.101.23.83
  • 95.101.23.81
whitelisted
go.microsoft.com
  • 23.40.126.57
whitelisted
shield.reasonsecurity.com
  • 18.172.112.22
  • 18.172.112.38
  • 18.172.112.11
  • 18.172.112.34
unknown

Threats

PID
Process
Class
Message
696
BitComet.exe
Potential Corporate Privacy Violation
ET P2P BitTorrent DHT ping request
696
BitComet.exe
Potential Corporate Privacy Violation
ET P2P BitTorrent DHT nodes reply
696
BitComet.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 5
696
BitComet.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 15
696
BitComet.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 5
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 16
696
BitComet.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 16
696
BitComet.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 42
696
BitComet.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 15
Process
Message
BitCometService.exe
BITCOMET_HELPER_SERVICE
BitCometService.exe
Service DACL updated successfully
BitCometService.exe
Service Register succeed.
BitCometService.exe
BITCOMET_HELPER_SERVICE
BitCometService.exe
ServiceProcess lunched.
BitComet.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
BitComet.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.