File name:

bomb.exe

Full analysis: https://app.any.run/tasks/f84aa50f-8d83-4b0c-aa85-3f583ca20fac
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: May 17, 2025, 22:23:05
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
hausbomber
loader
auto
proxyware
ghostsocks
github
dcrat
rat
coinminer
miner
remote
darkcrystal
lumma
stealer
payload
ta558
apt
stegocampaign
xworm
phishing
agenttesla
ftp
exfiltration
generic
phantomstealer
botnet
phorpiex
snake
keylogger
evasion
havoc
telegram
clickfix
possible-phishing
reverseloader
meterpreter
backdoor
golang
upx
amadey
screenconnect
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

0E2AD53C884E25F969B3A575F4BB90BB

SHA1:

81E774FE109DDC9185AD3FB68995A069CE9045E0

SHA256:

990D1FF1AB883A9BACBBB6ABCF975139D9AB359B74FFBA16F1FA7A66A30E935D

SSDEEP:

192:OJa0tZMoQszhl4AKd+QHzdPbwPz1OLU87glpp/bI6J4YlTtoIw:OLJQjd+qzZ0OLU870NJDoI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • HAUSBOMBER has been detected (YARA)

      • bomb.exe (PID: 6028)
    • Known privilege escalation attack

      • dllhost.exe (PID: 7448)
    • GHOSTSOCKS has been found (auto)

      • bomb.exe (PID: 6028)
    • Create files in the Startup directory

      • http51.38.140.180cbotcbot.exe.exe (PID: 7856)
      • http51.38.140.180cbotcbot_debug.exe.exe (PID: 7880)
      • http51.38.140.180cbotraw_cbot.exe.exe (PID: 8024)
      • http51.38.140.180cbotraw_cbot_debug.exe.exe (PID: 7944)
    • Changes the autorun value in the registry

      • http176.98.185.87Quodlibet.exe.exe (PID: 7668)
    • Executing a file with an untrusted certificate

      • http75.127.7.164Supawn.exe.exe (PID: 7564)
      • http75.127.7.164Nationalbankdirektrernes.exe.exe (PID: 812)
      • http75.127.7.164Nationalbankdirektrernes.exe.exe (PID: 7504)
      • http75.127.7.164Supawn.exe.exe (PID: 11868)
      • httpsgithub.comlegendary99999knjklbnkn-releasesdownloaddfbvsdfbsgfdbinferno.exe.exe (PID: 11880)
      • httpsgithub.comlegendary99999lsdmfvkjsmndvareleasesdownloadfdvasdfvadvfaCompoundsTrim.exe.exe (PID: 12156)
      • httpsgithub.comlegendary99999vdfsvdsfvsdfvreleasesdownloadfabdvadfvad123123213.exe.exe (PID: 12448)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 1196)
    • DCRAT has been found (auto)

      • bomb.exe (PID: 6028)
    • DARKCRYSTAL has been detected (SURICATA)

      • http51.38.140.180cbotcbot.exe.exe (PID: 5960)
    • Connects to the CnC server

      • http51.38.140.180cbotcbot.exe.exe (PID: 5960)
      • svchost.exe (PID: 2196)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2196)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • bomb.exe (PID: 6028)
    • Process requests binary or script from the Internet

      • bomb.exe (PID: 6028)
      • bomb.exe (PID: 6032)
      • bomb.exe (PID: 4208)
      • bomb.exe (PID: 7296)
      • bomb.exe (PID: 6048)
      • bomb.exe (PID: 6228)
      • bomb.exe (PID: 4452)
      • bomb.exe (PID: 2416)
      • bomb.exe (PID: 2340)
      • bomb.exe (PID: 2664)
      • bomb.exe (PID: 1512)
      • bomb.exe (PID: 2136)
      • bomb.exe (PID: 7936)
      • bomb.exe (PID: 7416)
      • bomb.exe (PID: 5124)
      • bomb.exe (PID: 4152)
      • bomb.exe (PID: 6944)
    • Potential Corporate Privacy Violation

      • bomb.exe (PID: 6028)
      • bomb.exe (PID: 6032)
      • bomb.exe (PID: 4208)
      • bomb.exe (PID: 1512)
      • bomb.exe (PID: 7296)
      • bomb.exe (PID: 2772)
      • bomb.exe (PID: 6048)
      • bomb.exe (PID: 6228)
      • bomb.exe (PID: 7416)
      • bomb.exe (PID: 2416)
      • bomb.exe (PID: 4452)
      • bomb.exe (PID: 2340)
      • bomb.exe (PID: 8052)
      • bomb.exe (PID: 2136)
      • bomb.exe (PID: 7936)
      • bomb.exe (PID: 6944)
      • bomb.exe (PID: 6192)
      • bomb.exe (PID: 5124)
      • bomb.exe (PID: 3180)
      • bomb.exe (PID: 4152)
      • bomb.exe (PID: 5968)
      • bomb.exe (PID: 7576)
      • bomb.exe (PID: 7996)
      • bomb.exe (PID: 5164)
      • bomb.exe (PID: 6268)
      • bomb.exe (PID: 4688)
      • bomb.exe (PID: 7196)
      • bomb.exe (PID: 6988)
      • bomb.exe (PID: 7256)
      • bomb.exe (PID: 4408)
      • bomb.exe (PID: 7836)
      • bomb.exe (PID: 8012)
      • bomb.exe (PID: 8200)
      • bomb.exe (PID: 8080)
      • bomb.exe (PID: 8312)
      • bomb.exe (PID: 8208)
      • bomb.exe (PID: 8320)
      • bomb.exe (PID: 8460)
      • bomb.exe (PID: 8232)
      • bomb.exe (PID: 8448)
      • bomb.exe (PID: 8416)
      • bomb.exe (PID: 8592)
      • bomb.exe (PID: 8716)
      • bomb.exe (PID: 8564)
      • bomb.exe (PID: 8676)
      • bomb.exe (PID: 8512)
      • bomb.exe (PID: 8304)
      • bomb.exe (PID: 8352)
      • bomb.exe (PID: 8732)
      • bomb.exe (PID: 8628)
      • bomb.exe (PID: 8424)
      • bomb.exe (PID: 8536)
      • bomb.exe (PID: 8804)
      • bomb.exe (PID: 8760)
      • bomb.exe (PID: 8816)
      • bomb.exe (PID: 8836)
      • bomb.exe (PID: 8952)
      • bomb.exe (PID: 8944)
      • bomb.exe (PID: 8652)
      • bomb.exe (PID: 8880)
      • bomb.exe (PID: 2664)
      • bomb.exe (PID: 7972)
    • Connects to the server without a host name

      • bomb.exe (PID: 6028)
      • bomb.exe (PID: 6032)
      • bomb.exe (PID: 4208)
      • bomb.exe (PID: 7296)
      • bomb.exe (PID: 6048)
      • bomb.exe (PID: 6228)
      • bomb.exe (PID: 4452)
      • bomb.exe (PID: 2340)
      • bomb.exe (PID: 2416)
      • bomb.exe (PID: 2664)
      • bomb.exe (PID: 1512)
      • bomb.exe (PID: 2136)
      • bomb.exe (PID: 7936)
      • bomb.exe (PID: 7416)
      • bomb.exe (PID: 5124)
      • bomb.exe (PID: 4152)
      • bomb.exe (PID: 6944)
    • Adds/modifies Windows certificates

      • httpssc-03.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 2100)
    • Executable content was dropped or overwritten

      • bomb.exe (PID: 6028)
      • http185.156.72.2files6003232782oxDU0MW.exe.exe (PID: 7236)
      • http51.38.140.180cbotcbot.exe.exe (PID: 7856)
      • http51.38.140.180cbotcbot_debug.exe.exe (PID: 7880)
      • http51.38.140.180cbotraw_cbot.exe.exe (PID: 8024)
      • http51.38.140.180cbotraw_cbot_debug.exe.exe (PID: 7944)
      • http176.98.185.87Quodlibet.exe.exe (PID: 7668)
      • http75.127.7.164Supawn.exe.exe (PID: 7564)
      • http75.127.7.164Nationalbankdirektrernes.exe.exe (PID: 812)
      • bridgesurrogatefontsvc.exe (PID: 7196)
      • bridgesurrogatefontsvc.exe (PID: 8008)
      • httpsgithub.compopa339nef5rawrefsheadsmainSlasher.exe.exe (PID: 2852)
      • http51.38.140.180cbotcbot.exe.exe (PID: 5960)
    • Reads security settings of Internet Explorer

      • dfsvc.exe (PID: 1812)
      • bomb.exe (PID: 6028)
      • httpsgithub.compopa339nef5rawrefsheadsmainSlasher.exe.exe (PID: 2852)
    • Connects to unusual port

      • bomb.exe (PID: 6028)
      • http51.38.140.180cbotraw_cbot_debug.exe.exe (PID: 7944)
      • http51.38.140.180cbotcbot.exe.exe (PID: 7856)
      • http51.38.140.180cbotraw_cbot.exe.exe (PID: 8024)
      • http51.38.140.180cbotcbot_debug.exe.exe (PID: 7880)
      • http176.98.185.87Quodlibet.exe.exe (PID: 7668)
      • bomb.exe (PID: 6048)
      • bomb.exe (PID: 6228)
      • bomb.exe (PID: 2772)
    • Reads the BIOS version

      • http185.156.72.2files6003232782oxDU0MW.exe.exe (PID: 7236)
    • Executes application which crashes

      • http146.103.7.34150TiWorker.exe.exe (PID: 1244)
      • WinTemp-v4.exe (PID: 7572)
      • http208.89.61.141560TiWorker.exe.exe (PID: 8092)
      • http213.209.150.18alphamm.exe.exe (PID: 4736)
      • http94.26.90.204kjoxca.exe.exe (PID: 8104)
    • Reads Internet Explorer settings

      • dfsvc.exe (PID: 1812)
    • The process checks if it is being run in the virtual environment

      • http185.156.72.2files6723359323FxefytI.exe.exe (PID: 5072)
    • Starts a Microsoft application from unusual location

      • http51.38.140.180cbotcbot.exe.exe (PID: 7856)
      • http51.38.140.180cbotcbot_debug.exe.exe (PID: 7880)
      • http51.38.140.180cbotraw_cbot_debug.exe.exe (PID: 7944)
      • http51.38.140.180cbotraw_cbot.exe.exe (PID: 8024)
      • httpsgithub.comlegendary99999knjklbnkn-releasesdownloaddfbvsdfbsgfdbinferno.exe.exe (PID: 11880)
      • httpsgithub.comlegendary99999vdfsvdsfvsdfvreleasesdownloadfabdvadfvad123123213.exe.exe (PID: 12448)
    • Process drops legitimate windows executable

      • http51.38.140.180cbotcbot.exe.exe (PID: 7856)
      • http51.38.140.180cbotcbot_debug.exe.exe (PID: 7880)
      • http51.38.140.180cbotraw_cbot.exe.exe (PID: 8024)
      • http51.38.140.180cbotraw_cbot_debug.exe.exe (PID: 7944)
      • bomb.exe (PID: 6028)
      • bomb.exe (PID: 1512)
      • bomb.exe (PID: 7416)
      • bomb.exe (PID: 6228)
      • bomb.exe (PID: 6032)
      • bomb.exe (PID: 4208)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • http75.127.7.164Supawn.exe.exe (PID: 7564)
      • http75.127.7.164Nationalbankdirektrernes.exe.exe (PID: 812)
    • The process creates files with name similar to system file names

      • http75.127.7.164Nationalbankdirektrernes.exe.exe (PID: 812)
      • http75.127.7.164Supawn.exe.exe (PID: 7564)
    • Starts CMD.EXE for commands execution

      • bridgesurrogatefontsvc.exe (PID: 7196)
      • wscript.exe (PID: 1196)
      • bridgesurrogatefontsvc.exe (PID: 8008)
      • httpsgithub.comlegendary99999lsdmfvkjsmndvareleasesdownloadfdvasdfvadvfaCompoundsTrim.exe.exe (PID: 12156)
    • Executing commands from a ".bat" file

      • wscript.exe (PID: 1196)
      • bridgesurrogatefontsvc.exe (PID: 8008)
      • httpsgithub.comlegendary99999lsdmfvkjsmndvareleasesdownloadfdvasdfvadvfaCompoundsTrim.exe.exe (PID: 12156)
    • Probably delay the execution using 'w32tm.exe'

      • cmd.exe (PID: 4008)
    • Starts application with an unusual extension

      • cmd.exe (PID: 4008)
    • Application launched itself

      • http75.127.7.164Nationalbankdirektrernes.exe.exe (PID: 812)
      • http75.127.7.164Supawn.exe.exe (PID: 7564)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2196)
    • Checks for external IP

      • svchost.exe (PID: 2196)
  • INFO

    • Disables trace logs

      • bomb.exe (PID: 6028)
      • dfsvc.exe (PID: 1812)
      • http75.127.7.164emmmmmmslay.exe.exe (PID: 7476)
    • Reads the machine GUID from the registry

      • bomb.exe (PID: 6028)
      • httpssisconnect-01.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 4892)
      • httpssc-02.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 1628)
      • httpswizz.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 6676)
      • dfsvc.exe (PID: 1812)
      • http185.156.72.2files6723359323FxefytI.exe.exe (PID: 5072)
      • httpssc-01.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 6592)
      • httpssc-05.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 6972)
      • http185.156.72.2files6003232782oxDU0MW.exe.exe (PID: 7236)
      • httpssc-03.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 2100)
      • http51.38.140.180cbotcbot_debug.exe.exe (PID: 7880)
      • http51.38.140.180cbotraw_cbot.exe.exe (PID: 8024)
      • http51.38.140.180cbotraw_cbot_debug.exe.exe (PID: 7944)
      • http75.127.7.164emmmmmmslay.exe.exe (PID: 7476)
      • http51.38.140.180cbotcbot.exe.exe (PID: 7856)
    • Reads the computer name

      • bomb.exe (PID: 6028)
      • dfsvc.exe (PID: 1812)
      • http185.156.72.2files6723359323FxefytI.exe.exe (PID: 5072)
      • httpssc-02.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 1628)
      • httpssisconnect-01.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 4892)
      • httpswizz.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 6676)
      • httpssc-01.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 6592)
      • httpssc-05.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 6972)
      • http185.156.72.2files6003232782oxDU0MW.exe.exe (PID: 7236)
      • httpssc-03.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 2100)
      • http75.127.7.164Supawn.exe.exe (PID: 7564)
      • http75.127.7.164Nationalbankdirektrernes.exe.exe (PID: 812)
      • http75.127.7.164emmmmmmslay.exe.exe (PID: 7476)
      • httpsgithub.compiunildunkos8nomrawrefsheadsmainsgsdg.exe.exe (PID: 7592)
      • httpsgithub.compopa339nef5rawrefsheadsmainSlasher.exe.exe (PID: 2852)
    • Checks proxy server information

      • bomb.exe (PID: 6028)
      • dfsvc.exe (PID: 1812)
      • http75.127.7.164emmmmmmslay.exe.exe (PID: 7476)
    • Checks supported languages

      • bomb.exe (PID: 6028)
      • httpssc-03.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 2100)
      • dfsvc.exe (PID: 1812)
      • httpssisconnect-01.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 4892)
      • httpssc-02.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 1628)
      • httpswizz.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 6676)
      • httpssc-01.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 6592)
      • httpssc-05.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe (PID: 6972)
      • http185.156.72.2files6003232782oxDU0MW.exe.exe (PID: 7236)
      • http176.98.185.87Quodlibet.exe.exe (PID: 7668)
      • http146.103.7.34150TiWorker.exe.exe (PID: 1244)
      • http176.98.185.87widsmob_denoise_win.exe.exe (PID: 7808)
      • http51.38.140.180cbotcbot.exe.exe (PID: 7856)
      • http185.156.72.2files6723359323FxefytI.exe.exe (PID: 5072)
      • http51.38.140.180cbotcbot_debug.exe.exe (PID: 7880)
      • http51.38.140.180cbotraw_cbot.exe.exe (PID: 8024)
      • http51.38.140.180cbotraw_cbot_debug.exe.exe (PID: 7944)
      • http208.89.61.141560TiWorker.exe.exe (PID: 8092)
      • http75.127.7.164Supawn.exe.exe (PID: 7564)
      • http213.209.150.18alphamm.exe.exe (PID: 4736)
      • http75.127.7.164emmmmmmslay.exe.exe (PID: 7476)
      • http75.127.7.164Nationalbankdirektrernes.exe.exe (PID: 812)
      • httpsgithub.compiunildunkos8nomrawrefsheadsmainsgsdg.exe.exe (PID: 7592)
      • httpsgithub.compopa339nef5rawrefsheadsmainSlasher.exe.exe (PID: 2852)
      • http94.26.90.204kjoxca.exe.exe (PID: 8104)
    • Reads Environment values

      • bomb.exe (PID: 6028)
      • dfsvc.exe (PID: 1812)
    • Reads the software policy settings

      • bomb.exe (PID: 6028)
      • dfsvc.exe (PID: 1812)
      • http75.127.7.164emmmmmmslay.exe.exe (PID: 7476)
    • The sample compiled with english language support

      • bomb.exe (PID: 6028)
      • http51.38.140.180cbotcbot.exe.exe (PID: 7856)
      • http51.38.140.180cbotcbot_debug.exe.exe (PID: 7880)
      • http51.38.140.180cbotraw_cbot.exe.exe (PID: 8024)
      • http51.38.140.180cbotraw_cbot_debug.exe.exe (PID: 7944)
      • http176.98.185.87Quodlibet.exe.exe (PID: 7668)
      • bomb.exe (PID: 6032)
      • bomb.exe (PID: 1512)
      • bomb.exe (PID: 7416)
      • bomb.exe (PID: 6228)
      • bomb.exe (PID: 4208)
      • bomb.exe (PID: 4152)
      • bomb.exe (PID: 6048)
    • Create files in a temporary directory

      • http146.103.7.34150TiWorker.exe.exe (PID: 1244)
      • dfsvc.exe (PID: 1812)
      • http185.156.72.2files6003232782oxDU0MW.exe.exe (PID: 7236)
      • http208.89.61.141560TiWorker.exe.exe (PID: 8092)
      • http176.98.185.87Quodlibet.exe.exe (PID: 7668)
      • http213.209.150.18alphamm.exe.exe (PID: 4736)
      • http75.127.7.164Supawn.exe.exe (PID: 7564)
      • http94.26.90.204kjoxca.exe.exe (PID: 8104)
      • http75.127.7.164Nationalbankdirektrernes.exe.exe (PID: 812)
    • Creates files or folders in the user directory

      • dfsvc.exe (PID: 1812)
      • WerFault.exe (PID: 7196)
      • http51.38.140.180cbotcbot.exe.exe (PID: 7856)
      • http51.38.140.180cbotcbot_debug.exe.exe (PID: 7880)
      • http51.38.140.180cbotraw_cbot.exe.exe (PID: 8024)
      • http51.38.140.180cbotraw_cbot_debug.exe.exe (PID: 7944)
      • http176.98.185.87Quodlibet.exe.exe (PID: 7668)
      • WerFault.exe (PID: 8176)
      • WerFault.exe (PID: 7612)
      • WerFault.exe (PID: 968)
      • WerFault.exe (PID: 7352)
    • Process checks computer location settings

      • bomb.exe (PID: 6028)
      • httpsgithub.compopa339nef5rawrefsheadsmainSlasher.exe.exe (PID: 2852)
    • Process checks whether UAC notifications are on

      • dfsvc.exe (PID: 1812)
    • Checks transactions between databases Windows and Oracle

      • http185.156.72.2files6003232782oxDU0MW.exe.exe (PID: 7236)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 7448)
    • Reads mouse settings

      • http146.103.7.34150TiWorker.exe.exe (PID: 1244)
      • http208.89.61.141560TiWorker.exe.exe (PID: 8092)
      • http213.209.150.18alphamm.exe.exe (PID: 4736)
      • http94.26.90.204kjoxca.exe.exe (PID: 8104)
    • Drops encrypted VBS script (Microsoft Script Encoder)

      • httpsgithub.compopa339nef5rawrefsheadsmainSlasher.exe.exe (PID: 2852)
    • Changes the display of characters in the console

      • cmd.exe (PID: 4008)
    • Manual execution by a user

      • bomb.exe (PID: 1512)
      • bomb.exe (PID: 7296)
      • bomb.exe (PID: 2772)
      • bomb.exe (PID: 4208)
      • bomb.exe (PID: 6048)
      • bomb.exe (PID: 6032)
      • bomb.exe (PID: 2416)
      • bomb.exe (PID: 6228)
      • bomb.exe (PID: 7416)
      • bomb.exe (PID: 2136)
      • bomb.exe (PID: 2340)
      • bomb.exe (PID: 4452)
      • bomb.exe (PID: 8052)
      • bomb.exe (PID: 2664)
      • bomb.exe (PID: 5968)
      • bomb.exe (PID: 4152)
      • bomb.exe (PID: 5124)
      • bomb.exe (PID: 7936)
      • bomb.exe (PID: 6944)
      • bomb.exe (PID: 3180)
      • bomb.exe (PID: 7996)
      • bomb.exe (PID: 6192)
      • bomb.exe (PID: 7196)
      • bomb.exe (PID: 7576)
      • bomb.exe (PID: 7972)
      • bomb.exe (PID: 5164)
      • bomb.exe (PID: 6268)
      • bomb.exe (PID: 6988)
      • bomb.exe (PID: 4408)
      • bomb.exe (PID: 7256)
      • bomb.exe (PID: 4688)
      • bomb.exe (PID: 8012)
      • bomb.exe (PID: 7836)
      • bomb.exe (PID: 8080)
      • bomb.exe (PID: 8200)
      • bomb.exe (PID: 8232)
      • bomb.exe (PID: 8352)
      • bomb.exe (PID: 8208)
      • bomb.exe (PID: 8304)
      • bomb.exe (PID: 8312)
      • bomb.exe (PID: 8416)
      • bomb.exe (PID: 8424)
      • bomb.exe (PID: 8320)
      • bomb.exe (PID: 8460)
      • bomb.exe (PID: 8512)
      • bomb.exe (PID: 8816)
      • bomb.exe (PID: 8836)
      • bomb.exe (PID: 8676)
      • bomb.exe (PID: 8760)
      • bomb.exe (PID: 8880)
      • bomb.exe (PID: 8804)
      • bomb.exe (PID: 8944)
      • bomb.exe (PID: 8916)
      • bomb.exe (PID: 8952)
      • bomb.exe (PID: 9028)
      • bomb.exe (PID: 8996)
      • bomb.exe (PID: 8592)
      • bomb.exe (PID: 8628)
      • bomb.exe (PID: 8536)
      • bomb.exe (PID: 8652)
      • bomb.exe (PID: 8716)
      • bomb.exe (PID: 8732)
      • bomb.exe (PID: 8564)
      • bomb.exe (PID: 9040)
      • bomb.exe (PID: 9076)
      • bomb.exe (PID: 9136)
      • bomb.exe (PID: 9200)
      • bomb.exe (PID: 9144)
      • bomb.exe (PID: 7956)
      • bomb.exe (PID: 9292)
      • bomb.exe (PID: 9208)
      • bomb.exe (PID: 9300)
      • bomb.exe (PID: 7964)
      • bomb.exe (PID: 9384)
      • bomb.exe (PID: 9364)
      • bomb.exe (PID: 9480)
      • bomb.exe (PID: 9400)
      • bomb.exe (PID: 9496)
      • bomb.exe (PID: 9552)
      • bomb.exe (PID: 9540)
      • bomb.exe (PID: 9572)
      • bomb.exe (PID: 9652)
      • bomb.exe (PID: 9664)
      • bomb.exe (PID: 9584)
      • bomb.exe (PID: 9692)
      • bomb.exe (PID: 9676)
      • bomb.exe (PID: 9764)
      • bomb.exe (PID: 9776)
      • bomb.exe (PID: 9784)
      • bomb.exe (PID: 9840)
      • bomb.exe (PID: 9864)
      • bomb.exe (PID: 9880)
      • bomb.exe (PID: 9908)
      • bomb.exe (PID: 9960)
      • bomb.exe (PID: 10028)
      • bomb.exe (PID: 9968)
      • bomb.exe (PID: 9980)
      • bomb.exe (PID: 10100)
      • bomb.exe (PID: 10128)
      • bomb.exe (PID: 10068)
      • bomb.exe (PID: 10192)
      • bomb.exe (PID: 10164)
      • bomb.exe (PID: 4008)
      • bomb.exe (PID: 10260)
      • bomb.exe (PID: 10216)
      • bomb.exe (PID: 7676)
      • bomb.exe (PID: 10268)
      • bomb.exe (PID: 10316)
      • bomb.exe (PID: 10348)
      • bomb.exe (PID: 10364)
      • bomb.exe (PID: 10400)
      • bomb.exe (PID: 10428)
      • bomb.exe (PID: 10440)
      • bomb.exe (PID: 10488)
      • bomb.exe (PID: 10532)
      • bomb.exe (PID: 8448)
      • bomb.exe (PID: 9316)
      • bomb.exe (PID: 10568)
      • bomb.exe (PID: 10592)
      • bomb.exe (PID: 10600)
      • bomb.exe (PID: 10612)
      • bomb.exe (PID: 10700)
      • bomb.exe (PID: 10712)
      • bomb.exe (PID: 10788)
      • bomb.exe (PID: 10724)
      • bomb.exe (PID: 10840)
      • bomb.exe (PID: 10820)
      • bomb.exe (PID: 10860)
      • bomb.exe (PID: 10888)
      • bomb.exe (PID: 10980)
      • bomb.exe (PID: 10920)
      • bomb.exe (PID: 11008)
      • bomb.exe (PID: 11016)
      • bomb.exe (PID: 11072)
      • bomb.exe (PID: 11060)
      • bomb.exe (PID: 11144)
      • bomb.exe (PID: 11116)
      • bomb.exe (PID: 11176)
      • bomb.exe (PID: 7884)
      • bomb.exe (PID: 11204)
      • bomb.exe (PID: 684)
      • bomb.exe (PID: 11228)
      • bomb.exe (PID: 7816)
      • bomb.exe (PID: 11260)
      • bomb.exe (PID: 8228)
      • bomb.exe (PID: 8412)
      • bomb.exe (PID: 11284)
      • bomb.exe (PID: 11276)
      • bomb.exe (PID: 11356)
      • bomb.exe (PID: 11368)
      • bomb.exe (PID: 11384)
      • bomb.exe (PID: 11408)
      • bomb.exe (PID: 11452)
      • bomb.exe (PID: 11492)
      • bomb.exe (PID: 11528)
      • bomb.exe (PID: 11556)
      • bomb.exe (PID: 11584)
      • bomb.exe (PID: 11724)
      • bomb.exe (PID: 11668)
      • bomb.exe (PID: 11608)
      • bomb.exe (PID: 11656)
      • bomb.exe (PID: 11732)
      • bomb.exe (PID: 11780)
      • bomb.exe (PID: 11816)
      • bomb.exe (PID: 12096)
      • bomb.exe (PID: 12048)
      • bomb.exe (PID: 12140)
      • bomb.exe (PID: 12060)
      • bomb.exe (PID: 12116)
      • bomb.exe (PID: 12188)
      • bomb.exe (PID: 12656)
      • bomb.exe (PID: 12852)
      • bomb.exe (PID: 10520)
      • bomb.exe (PID: 14040)
      • bomb.exe (PID: 15640)
      • bomb.exe (PID: 15748)
      • bomb.exe (PID: 15784)
      • bomb.exe (PID: 15776)
      • bomb.exe (PID: 15816)
      • bomb.exe (PID: 15848)
      • bomb.exe (PID: 16240)
      • bomb.exe (PID: 16292)
      • bomb.exe (PID: 16308)
      • bomb.exe (PID: 16424)
    • Detects GO elliptic curve encryption (YARA)

      • http176.98.185.87Quodlibet.exe.exe (PID: 7668)
    • Application based on Golang

      • http176.98.185.87Quodlibet.exe.exe (PID: 7668)
    • UPX packer has been detected

      • http51.38.140.180cbotcbot.exe.exe (PID: 7856)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2057:01:07 19:44:57+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 9216
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x43be
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: -
FileVersion: 1.0.0.0
InternalName: bomb.exe
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: bomb.exe
ProductName: -
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
394
Monitored processes
257
Malicious processes
21
Suspicious processes
17

Behavior graph

Click at the process to see the details
start #HAUSBOMBER bomb.exe sppextcomobj.exe no specs slui.exe http146.103.7.34150tiworker.exe.exe httpssc-03.infinitycloud.orgbinsupport.client.exei=&e=support&y=guest&r=.exe no specs http185.156.72.2files6723359323fxefyti.exe.exe no specs dfsvc.exe httpssisconnect-01.infinitycloud.orgbinsupport.client.exei=&e=support&y=guest&r=.exe no specs httpssc-02.infinitycloud.orgbinsupport.client.exei=&e=support&y=guest&r=.exe no specs httpswizz.infinitycloud.orgbinsupport.client.exei=&e=support&y=guest&r=.exe no specs svchost.exe no specs httpssc-01.infinitycloud.orgbinsupport.client.exei=&e=support&y=guest&r=.exe no specs httpssc-05.infinitycloud.orgbinsupport.client.exei=&e=support&y=guest&r=.exe no specs werfault.exe no specs http185.156.72.2files6003232782oxdu0mw.exe.exe CMSTPLUA wintemp-v4.exe werfault.exe no specs http176.98.185.87quodlibet.exe.exe http176.98.185.87widsmob_denoise_win.exe.exe no specs http51.38.140.180cbotcbot.exe.exe http51.38.140.180cbotcbot_debug.exe.exe conhost.exe no specs http51.38.140.180cbotraw_cbot_debug.exe.exe conhost.exe no specs http51.38.140.180cbotraw_cbot.exe.exe http208.89.61.141560tiworker.exe.exe svchost.exe no specs werfault.exe no specs http75.127.7.164supawn.exe.exe http75.127.7.164nationalbankdirektrernes.exe.exe http213.209.150.18alphamm.exe.exe svchost.exe no specs http75.127.7.164emmmmmmslay.exe.exe werfault.exe no specs http94.26.90.204kjoxca.exe.exe svchost.exe no specs werfault.exe no specs httpsgithub.compopa339nef5rawrefsheadsmainslasher.exe.exe wscript.exe no specs httpsgithub.compiunildunkos8nomrawrefsheadsmainsgsdg.exe.exe no specs cmd.exe no specs conhost.exe no specs bridgesurrogatefontsvc.exe cmd.exe conhost.exe no specs bridgesurrogatefontsvc.exe cmd.exe no specs conhost.exe no specs chcp.com no specs w32tm.exe no specs bitlockertogo.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe http75.127.7.164nationalbankdirektrernes.exe.exe no specs bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe #DARKCRYSTAL http51.38.140.180cbotcbot.exe.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe bomb.exe no specs bomb.exe bomb.exe bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs httpsgithub.comzeroxx723redfire-externalreleasesdownloadxxredfire.external.exe.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs httpsgithub.comzeroxx723redfire-externalreleasesdownloadxxredfire.external.exe.exe http75.127.7.164supawn.exe.exe no specs httpsgithub.comlegendary99999knjklbnkn-releasesdownloaddfbvsdfbsgfdbinferno.exe.exe no specs httpsgithub.comzeroxx7231111111111111111111releasesdownloadxredfireexternal.exe.exe no specs httpsgithub.comzeroxx7231111111111111111111releasesdownloadxredfireexternal.exe.exe slui.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs httpsgithub.comlegendary99999lsdmfvkjsmndvareleasesdownloadfdvasdfvadvfacompoundstrim.exe.exe no specs bomb.exe no specs msbuild.exe no specs msbuild.exe no specs httpsgithub.comlegendary99999dsvadfvadfvreleasesdownloaddsavasfdvadfvsupport.clientsetup.exe.exe no specs httpsgithub.comlegendary99999vdfsvdsfvsdfvreleasesdownloadfabdvadfvad123123213.exe.exe no specs bomb.exe no specs bomb.exe no specs cmd.exe no specs conhost.exe no specs httpsgithub.comlegendary99999dsvadfvadfvreleasesdownloaddsavasfdvadfvsupport.clientsetup.exe.exe bomb.exe no specs msbuild.exe no specs http185.156.72.2files6723359323fxefyti.exe.exe no specs http185.156.72.2files6723359323fxefyti.exe.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs bomb.exe no specs #LUMMA svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
684C:\WINDOWS\system32\cmd.exe /c ""C:\ChainProviderRefbrokermonitor\2yuLpzrRfY1fgKsLGMv7TtRDuZTFq.bat" "C:\Windows\SysWOW64\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
684"C:\Users\admin\Desktop\bomb.exe" C:\Users\admin\Desktop\bomb.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\bomb.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
812"C:\Users\admin\Desktop\http75.127.7.164Nationalbankdirektrernes.exe.exe" C:\Users\admin\Desktop\http75.127.7.164Nationalbankdirektrernes.exe.exe
bomb.exe
User:
admin
Company:
R.R. Donnelley & Sons Company
Integrity Level:
MEDIUM
Description:
ACT Manufacturing Inc.
Exit code:
0
Version:
3.0.0.0
Modules
Images
c:\users\admin\desktop\http75.127.7.164nationalbankdirektrernes.exe.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
968C:\WINDOWS\SysWOW64\WerFault.exe -u -p 4736 -s 692C:\Windows\SysWOW64\WerFault.exehttp213.209.150.18alphamm.exe.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
968"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
http176.98.185.87widsmob_denoise_win.exe.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
BitLocker To Go Reader
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\bitlockerdiscoveryvolumecontents\bitlockertogo.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1012"C:\Users\admin\Desktop\http146.103.7.34150TiWorker.exe.exe" C:\Windows\SysWOW64\svchost.exehttp146.103.7.34150TiWorker.exe.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
1196"C:\WINDOWS\System32\WScript.exe" "C:\ChainProviderRefbrokermonitor\GJRM7aIDnBk9.vbe" C:\Windows\SysWOW64\wscript.exehttpsgithub.compopa339nef5rawrefsheadsmainSlasher.exe.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\syswow64\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1244"C:\Users\admin\Desktop\http146.103.7.34150TiWorker.exe.exe" C:\Users\admin\Desktop\http146.103.7.34150TiWorker.exe.exe
bomb.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\desktop\http146.103.7.34150tiworker.exe.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
1512"C:\Users\admin\Desktop\bomb.exe" C:\Users\admin\Desktop\bomb.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\bomb.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1628"C:\Users\admin\Desktop\httpssc-02.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exe" C:\Users\admin\Desktop\httpssc-02.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exebomb.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\httpssc-02.infinitycloud.orgbinsupport.client.exei=&e=support&y=guest&r=.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\crypt32.dll
Total events
117 856
Read events
116 842
Write events
1 005
Delete events
9

Modification events

(PID) Process:(6028) bomb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6028) bomb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6028) bomb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6028) bomb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6028) bomb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6028) bomb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6028) bomb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6028) bomb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6028) bomb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6028) bomb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
63
Suspicious files
53
Text files
42
Unknown types
1

Dropped files

PID
Process
Filename
Type
1244http146.103.7.34150TiWorker.exe.exeC:\Users\admin\AppData\Local\Temp\autEF63.tmpbinary
MD5:24466CEAA754885D3AE569EF821E7103
SHA256:B24A39DB91A037063D1EA2D79E3170C7A5290AB14C2221C1C7B34F6682854589
6028bomb.exeC:\Users\admin\Desktop\httpssc-02.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exeexecutable
MD5:DD511061889CBC15E57D4A00136A4570
SHA256:2CB822C2D9D5D20BA8D9D65FF88E91BC0E85E43C5244199919AC3A441719C5B4
1812dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\05Z8N7MP.2QH\KOVTQRCT.2Z5.applicationxml
MD5:26817F400D192B9F4303FC5C4383C03E
SHA256:69E36FE8A71534FC3A278BB2E2964D2126FEE8014CB2FA73874A72492CD4BE06
6028bomb.exeC:\Users\admin\Desktop\httpssc-01.infinitycloud.orgbinsupport.client.exei=&e=Support&y=Guest&r=.exeexecutable
MD5:98BFB30EE5B6800FEE742698B320578D
SHA256:8062CD1046A5DAFCCC721DD840B417CEDC596BB17C4A5A1A4DCE7A927F24B9F9
1812dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\E4TGXE98.NTG\32A9NKDQ.9KG.applicationxml
MD5:626853C6AE9B7FB49A1EE476728A4EB4
SHA256:09D69DFA0730D7E940D56E192641D5C0051DDF3CFE5AB845D75D7AD445EFE2F8
1244http146.103.7.34150TiWorker.exe.exeC:\Users\admin\AppData\Local\Temp\demonetisingbinary
MD5:24466CEAA754885D3AE569EF821E7103
SHA256:B24A39DB91A037063D1EA2D79E3170C7A5290AB14C2221C1C7B34F6682854589
1812dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\KNYEYH9G.0QC\PPPG5V1H.H16\ScreenConnect.WindowsClient.exe.manifestxml
MD5:DD720A47F8DA4A5987D9A889A260CF96
SHA256:5FA1AC4EB2A1AA6CE44DCD9D45B617809FBE8CB490B46EC32FE4C0ADCB50DEA3
1812dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\7K8W97QM.BLM\W4KK3DTG.P48.applicationxml
MD5:3B408C34941E1A440C041B537DC672BC
SHA256:AE8FA5AE3F0B462F6391B64F521930B71108F16BCD3583DAEE555BF0D002D42A
6028bomb.exeC:\Users\admin\Desktop\http146.103.7.34150TiWorker.exe.exeexecutable
MD5:AD60FC98CFA36FD229FD46AABC71B260
SHA256:C17E8C6B860A83B92AD9426113FED857076924F0DE5D7ED0E6ECACD032DF67A8
1812dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\A2BQTGTK.1R0\KX8CNA38.QKW.applicationxml
MD5:3B408C34941E1A440C041B537DC672BC
SHA256:AE8FA5AE3F0B462F6391B64F521930B71108F16BCD3583DAEE555BF0D002D42A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
949
TCP/UDP connections
9 560
DNS requests
719
Threats
8 192

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
95.101.34.33:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6028
bomb.exe
GET
200
185.156.72.2:80
http://185.156.72.2/files/6723359323/FxefytI.exe
unknown
unknown
6028
bomb.exe
GET
200
146.103.7.34:80
http://146.103.7.34/150/TiWorker.exe
unknown
unknown
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6028
bomb.exe
GET
200
176.98.185.87:80
http://176.98.185.87/Quodlibet.exe
unknown
unknown
6028
bomb.exe
GET
404
185.156.72.2:80
http://185.156.72.2/files/5795480469/A2vn0Mb.exe
unknown
unknown
6028
bomb.exe
GET
200
176.98.185.87:80
http://176.98.185.87/widsmob_denoise_win.exe
unknown
unknown
6028
bomb.exe
GET
200
185.156.72.2:80
http://185.156.72.2/files/6003232782/oxDU0MW.exe
unknown
unknown
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6028
bomb.exe
GET
200
51.38.140.180:80
http://51.38.140.180/cbot/raw_cbot_debug.exe
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
95.101.34.33:80
crl.microsoft.com
Akamai International B.V.
IT
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.134:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 95.101.34.33
  • 95.101.34.27
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.35.229.160
whitelisted
google.com
  • 142.250.185.142
whitelisted
client.wns.windows.com
  • 172.211.123.249
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.32.134
  • 20.190.160.65
  • 40.126.32.133
  • 20.190.160.131
  • 40.126.32.140
  • 40.126.32.72
  • 20.190.160.64
  • 40.126.32.74
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 2.23.77.188
whitelisted
maper.info
  • 188.114.96.3
  • 188.114.97.3
malicious
urlhaus.abuse.ch
  • 151.101.2.49
  • 151.101.66.49
  • 151.101.130.49
  • 151.101.194.49
whitelisted
gettsveriff.com
  • 185.72.145.109
unknown

Threats

PID
Process
Class
Message
6028
bomb.exe
Potential Corporate Privacy Violation
ET INFO IP Logger Redirect Domain in SNI
6028
bomb.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
6028
bomb.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
6028
bomb.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
6028
bomb.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
6028
bomb.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
6028
bomb.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
6028
bomb.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
6028
bomb.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
6028
bomb.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
No debug info