URL:

https://www.dropbox.com/scl/fi/54mw33ovrpsdctazu740z/LaudoBombeiro.EXE?rlkey=5p8q1xi7mmn0a5b9invb27ot1&st=brqhwkc6&dl=1__;!!MupN1mo!T4NPbpHKCgq1eYCczpqmCwdMOO8w_sO4oL7VKqzSg75gEiWkMcTTchSkasF13S6d1xxDaBuNSJprKEk9JBv2rwL0xyoTaQ$

Full analysis: https://app.any.run/tasks/912d2de9-0d58-405b-a99d-11f61a7e8f8c
Verdict: Malicious activity
Analysis date: April 17, 2025, 12:40:57
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-scr
Indicators:
MD5:

5F99D920C43AFAAE979399E183DDC71F

SHA1:

2051DEFD0D4D1273320E8C4FBA3AF933C30C30D3

SHA256:

E28F8CE89C320364CAE400095D3329FC27CB43EB1CBB490011B9875ECC47678C

SSDEEP:

6:2OLHkOXT0YcYPEMKED6tKExuLL3x2SqMY/iv9SplD:2ikoTPZPRDlEIvXeM9Sr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts NET.EXE for service management

      • agent.tmp (PID: 2108)
      • net.exe (PID: 5280)
      • net.exe (PID: 2332)
    • Changes the autorun value in the registry

      • vcredist_x86.exe (PID: 7556)
      • ScriptRunner.Installer.exe (PID: 2908)
      • MSP_Connect.exe (PID: 3800)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • LaudoBombeiro.EXE (PID: 4988)
      • agent.tmp (PID: 6760)
      • agent.exe (PID: 7288)
      • agent.exe (PID: 684)
      • winagent.exe (PID: 6208)
      • vcredist_x86.exe (PID: 8044)
      • LaudoBombeiro.EXE (PID: 6324)
      • agent.exe (PID: 3784)
      • agent.exe (PID: 7308)
      • agent.tmp (PID: 2108)
      • vcredist_x86.exe (PID: 7556)
      • ScriptRunnerInstaller-2.98.1.1.exe (PID: 7500)
      • ScriptRunner.Installer.exe (PID: 2908)
      • ScriptRunnerInstaller-2.98.1.1.exe (PID: 7368)
      • msp-agent-core.exe (PID: 776)
      • msp-agent-core-upgrade.exe (PID: 2332)
      • winagent.exe (PID: 7876)
      • MSP_Connect.exe (PID: 3800)
    • Reads security settings of Internet Explorer

      • LaudoBombeiro.EXE (PID: 4988)
      • agent.tmp (PID: 5376)
      • LaudoBombeiro.EXE (PID: 6324)
      • agent.tmp (PID: 6740)
      • vcredist_x86.exe (PID: 7556)
      • ScriptRunnerInstaller-2.98.1.1.exe (PID: 7500)
    • Process drops legitimate windows executable

      • agent.tmp (PID: 6760)
      • winagent.exe (PID: 6208)
      • vcredist_x86.exe (PID: 8044)
      • agent.tmp (PID: 2108)
      • vcredist_x86.exe (PID: 7556)
      • msiexec.exe (PID: 5812)
      • MSP_Connect.exe (PID: 3800)
    • Reads the Windows owner or organization settings

      • agent.tmp (PID: 6760)
      • agent.tmp (PID: 2108)
      • msiexec.exe (PID: 5812)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 2196)
    • Searches for installed software

      • winagent.exe (PID: 6208)
      • vcredist_x86.exe (PID: 8044)
      • vcredist_x86.exe (PID: 7556)
      • dllhost.exe (PID: 4376)
      • agent.tmp (PID: 2108)
      • ScriptRunnerInstaller-2.98.1.1.exe (PID: 7500)
      • ScriptRunner.Installer.exe (PID: 2908)
      • winagent.exe (PID: 7876)
      • assetscan.exe (PID: 5952)
      • winagent.exe (PID: 2240)
      • winagent.exe (PID: 2908)
      • msp-agent-core.exe (PID: 472)
    • Creates/Modifies COM task schedule object

      • winagent.exe (PID: 6208)
      • MSP_Connect.exe (PID: 3800)
    • The process checks if it is being run in the virtual environment

      • winagent.exe (PID: 6208)
      • winagent.exe (PID: 7876)
    • Application launched itself

      • vcredist_x86.exe (PID: 7556)
    • Executes as Windows Service

      • VSSVC.exe (PID: 904)
      • winagent.exe (PID: 7876)
      • msp-agent-core.exe (PID: 776)
      • msp-agent-core.exe (PID: 472)
    • There is functionality for taking screenshot (YARA)

      • winagent.exe (PID: 6208)
    • Creates a software uninstall entry

      • vcredist_x86.exe (PID: 7556)
      • ScriptRunner.Installer.exe (PID: 2908)
      • msp-agent-core.exe (PID: 472)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 5812)
      • MSP_Connect.exe (PID: 3800)
    • Starts itself from another location

      • ScriptRunnerInstaller-2.98.1.1.exe (PID: 7500)
    • Uses TASKKILL.EXE to kill process

      • msiexec.exe (PID: 7176)
    • Drops 7-zip archiver for unpacking

      • msiexec.exe (PID: 5812)
    • Executes application which crashes

      • winagent.exe (PID: 6208)
      • winagent.exe (PID: 2240)
    • Starts CMD.EXE for commands execution

      • msp-agent-core.exe (PID: 8080)
      • msp-agent-core.exe (PID: 776)
      • msp-agent-core.exe (PID: 4200)
      • msp-agent-core.exe (PID: 684)
      • msp-agent-core.exe (PID: 472)
    • The process creates files with name similar to system file names

      • MSP_Connect.exe (PID: 3800)
    • Creates or modifies Windows services

      • BASupSrvc.exe (PID: 6044)
  • INFO

    • Reads the software policy settings

      • slui.exe (PID: 7420)
      • winagent.exe (PID: 6208)
      • slui.exe (PID: 6456)
      • vcredist_x86.exe (PID: 7556)
      • msiexec.exe (PID: 5812)
      • winagent.exe (PID: 7876)
      • winagent.exe (PID: 2240)
      • winagent.exe (PID: 2908)
      • msp-agent-core.exe (PID: 776)
      • msp-agent-core.exe (PID: 472)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 6068)
      • chrome.exe (PID: 7580)
      • msiexec.exe (PID: 5812)
    • The sample compiled with english language support

      • chrome.exe (PID: 6068)
      • agent.tmp (PID: 6760)
      • winagent.exe (PID: 6208)
      • vcredist_x86.exe (PID: 8044)
      • agent.tmp (PID: 2108)
      • vcredist_x86.exe (PID: 7556)
      • msiexec.exe (PID: 5812)
      • ScriptRunnerInstaller-2.98.1.1.exe (PID: 7500)
      • msp-agent-core.exe (PID: 776)
      • msp-agent-core-upgrade.exe (PID: 2332)
      • MSP_Connect.exe (PID: 3800)
    • Application launched itself

      • chrome.exe (PID: 7580)
    • Reads the computer name

      • LaudoBombeiro.EXE (PID: 4988)
      • agent.tmp (PID: 6760)
      • agent.tmp (PID: 5376)
      • winagent.exe (PID: 6208)
      • vcredist_x86.exe (PID: 8044)
      • vcredist_x86.exe (PID: 7556)
      • LaudoBombeiro.EXE (PID: 6324)
      • agent.tmp (PID: 6740)
      • agent.tmp (PID: 2108)
      • msiexec.exe (PID: 5812)
      • ScriptRunnerInstaller-2.98.1.1.exe (PID: 7500)
      • ScriptRunner.Installer.exe (PID: 2908)
      • msiexec.exe (PID: 7176)
      • winagent.exe (PID: 7876)
      • assetscan.exe (PID: 5952)
      • winagent.exe (PID: 2240)
      • msp-agent-core.exe (PID: 8080)
      • msp-agent-core-upgrade.exe (PID: 2332)
      • msp-agent-core.exe (PID: 776)
      • msp-agent-core.exe (PID: 4200)
      • msp-agent-core.exe (PID: 472)
      • TCLauncherHelper.exe (PID: 7428)
      • BASupSrvc.exe (PID: 6044)
    • Checks supported languages

      • LaudoBombeiro.EXE (PID: 4988)
      • agent.exe (PID: 7288)
      • agent.tmp (PID: 6760)
      • agent.tmp (PID: 5376)
      • agent.exe (PID: 684)
      • winagent.exe (PID: 6208)
      • vcredist_x86.exe (PID: 7556)
      • unzip.exe (PID: 7260)
      • unzip.exe (PID: 7500)
      • vcredist_x86.exe (PID: 8044)
      • LaudoBombeiro.EXE (PID: 6324)
      • agent.exe (PID: 3784)
      • agent.tmp (PID: 6740)
      • agent.exe (PID: 7308)
      • agent.tmp (PID: 2108)
      • msiexec.exe (PID: 5812)
      • ScriptRunner.Installer.exe (PID: 2908)
      • ScriptRunnerInstaller-2.98.1.1.exe (PID: 7368)
      • ScriptRunnerInstaller-2.98.1.1.exe (PID: 7500)
      • msiexec.exe (PID: 7176)
      • winagent.exe (PID: 7876)
      • winagent.exe (PID: 2908)
      • assetscan.exe (PID: 5952)
      • winagent.exe (PID: 2240)
      • msp-agent-core.exe (PID: 776)
      • msp-agent-core-upgrade.exe (PID: 2332)
      • msp-agent-core-upgrade.exe (PID: 6268)
      • msp-agent-core.exe (PID: 684)
      • msp-agent-core.exe (PID: 472)
      • msp-agent-core-upgrade.exe (PID: 5280)
      • BASupSrvc.exe (PID: 6044)
      • TCLauncherHelper.exe (PID: 7428)
    • Create files in a temporary directory

      • LaudoBombeiro.EXE (PID: 4988)
      • agent.exe (PID: 7288)
      • agent.exe (PID: 684)
      • agent.tmp (PID: 6760)
      • vcredist_x86.exe (PID: 8044)
      • LaudoBombeiro.EXE (PID: 6324)
      • agent.exe (PID: 3784)
      • agent.exe (PID: 7308)
      • agent.tmp (PID: 2108)
    • Connects to unusual port

      • chrome.exe (PID: 7764)
    • Process checks computer location settings

      • LaudoBombeiro.EXE (PID: 4988)
      • agent.tmp (PID: 5376)
      • LaudoBombeiro.EXE (PID: 6324)
      • agent.tmp (PID: 6740)
      • ScriptRunnerInstaller-2.98.1.1.exe (PID: 7500)
    • Creates a software uninstall entry

      • agent.tmp (PID: 6760)
      • msiexec.exe (PID: 5812)
      • agent.tmp (PID: 2108)
    • Creates files in the program directory

      • agent.tmp (PID: 6760)
      • winagent.exe (PID: 6208)
      • unzip.exe (PID: 7260)
      • vcredist_x86.exe (PID: 8044)
      • agent.tmp (PID: 2108)
      • vcredist_x86.exe (PID: 7556)
      • ScriptRunner.Installer.exe (PID: 2908)
      • assetscan.exe (PID: 5952)
      • winagent.exe (PID: 7876)
      • unzip.exe (PID: 5008)
      • msp-agent-core.exe (PID: 776)
      • msp-agent-core-upgrade.exe (PID: 2332)
      • msp-agent-core.exe (PID: 472)
      • MSP_Connect.exe (PID: 3800)
      • TCLauncherHelper.exe (PID: 7428)
    • Reads product name

      • winagent.exe (PID: 6208)
      • winagent.exe (PID: 7876)
      • assetscan.exe (PID: 5952)
      • winagent.exe (PID: 2240)
      • winagent.exe (PID: 2908)
    • Reads Environment values

      • winagent.exe (PID: 6208)
      • winagent.exe (PID: 7876)
      • assetscan.exe (PID: 5952)
      • winagent.exe (PID: 2240)
      • winagent.exe (PID: 2908)
    • Reads the machine GUID from the registry

      • vcredist_x86.exe (PID: 7556)
      • msiexec.exe (PID: 5812)
      • ScriptRunnerInstaller-2.98.1.1.exe (PID: 7500)
      • ScriptRunner.Installer.exe (PID: 2908)
      • winagent.exe (PID: 7876)
      • msp-agent-core.exe (PID: 776)
      • msp-agent-core.exe (PID: 472)
      • BASupSrvc.exe (PID: 6044)
      • TCLauncherHelper.exe (PID: 7428)
    • Manages system restore points

      • SrTasks.exe (PID: 8108)
    • Checks proxy server information

      • slui.exe (PID: 6456)
      • vcredist_x86.exe (PID: 7556)
    • Creates files or folders in the user directory

      • vcredist_x86.exe (PID: 7556)
      • WerFault.exe (PID: 3016)
      • WerFault.exe (PID: 8056)
    • The sample compiled with chinese language support

      • msiexec.exe (PID: 5812)
    • The sample compiled with german language support

      • msiexec.exe (PID: 5812)
    • The sample compiled with french language support

      • msiexec.exe (PID: 5812)
    • The sample compiled with Italian language support

      • msiexec.exe (PID: 5812)
    • The sample compiled with spanish language support

      • msiexec.exe (PID: 5812)
    • The sample compiled with korean language support

      • msiexec.exe (PID: 5812)
    • The sample compiled with japanese language support

      • msiexec.exe (PID: 5812)
    • The sample compiled with russian language support

      • msiexec.exe (PID: 5812)
    • Manual execution by a user

      • Taskmgr.exe (PID: 780)
      • Taskmgr.exe (PID: 668)
    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 668)
    • Reads Windows Product ID

      • assetscan.exe (PID: 5952)
    • Checks operating system version

      • msp-agent-core.exe (PID: 776)
      • msp-agent-core.exe (PID: 8080)
      • msp-agent-core.exe (PID: 684)
      • msp-agent-core.exe (PID: 4200)
      • msp-agent-core.exe (PID: 472)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • msp-agent-core.exe (PID: 8080)
    • Process checks whether UAC notifications are on

      • TCLauncherHelper.exe (PID: 7428)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
247
Monitored processes
100
Malicious processes
17
Suspicious processes
3

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs sppextcomobj.exe no specs slui.exe chrome.exe no specs slui.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs laudobombeiro.exe agent.exe agent.tmp no specs agent.exe agent.tmp unzip.exe no specs conhost.exe no specs chrome.exe no specs unzip.exe no specs conhost.exe no specs winagent.exe chrome.exe no specs vcredist_x86.exe vcredist_x86.exe SPPSurrogate no specs vssvc.exe no specs chrome.exe no specs chrome.exe no specs laudobombeiro.exe agent.exe agent.tmp no specs agent.exe agent.tmp net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs chrome.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe scriptrunnerinstaller-2.98.1.1.exe scriptrunnerinstaller-2.98.1.1.exe scriptrunner.installer.exe msiexec.exe no specs taskkill.exe no specs conhost.exe no specs chrome.exe no specs winagent.exe werfault.exe no specs taskmgr.exe no specs taskmgr.exe assetscan.exe no specs tiworker.exe no specs msiexec.exe no specs unzip.exe no specs conhost.exe no specs unzip.exe no specs conhost.exe no specs msp-agent-core.exe no specs conhost.exe no specs winagent.exe winagent.exe werfault.exe no specs cmd.exe no specs msp-agent-core.exe cmd.exe no specs conhost.exe no specs msp-agent-core.exe no specs conhost.exe no specs cmd.exe no specs msp-agent-core.exe no specs conhost.exe no specs cmd.exe no specs msp-agent-core-upgrade.exe no specs conhost.exe no specs chrome.exe no specs msp-agent-core-upgrade.exe conhost.exe no specs msp-agent-core.exe cmd.exe no specs conhost.exe no specs msp_connect.exe msp-agent-core-upgrade.exe no specs conhost.exe no specs chrome.exe no specs basupsrvc.exe no specs tclauncherhelper.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
232\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemsp-agent-core-upgrade.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
472"C:\Program Files (x86)\Msp Agent\msp-agent-core.exe"C:\Program Files (x86)\Msp Agent\msp-agent-core.exe
services.exe
User:
SYSTEM
Company:
N-able Technologies, Ltd.
Integrity Level:
SYSTEM
Description:
N-able MSP Agent Core
Modules
Images
c:\program files (x86)\msp agent\msp-agent-core.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
516cmd verC:\Windows\SysWOW64\cmd.exemsp-agent-core.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
660C:\WINDOWS\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exe -EmbeddingC:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Modules Installer Worker
Version:
10.0.19041.3989 (WinBuild.160101.0800)
Modules
Images
c:\windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\tiworker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
668"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Manager
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\combase.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\rpcrt4.dll
680C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
684"C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\agent.exe" /SPAWNWND=$50242 /NOTIFYWND=$50238 /VERYSILENT /norestartC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\agent.exe
agent.tmp
User:
admin
Company:
Integrity Level:
HIGH
Description:
Advanced Monitoring Agent Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\7zipsfx.000\agent.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
684"C:\Program Files (x86)\MSP Agent\msp-agent-core.exe" --provisioning_stateC:\Program Files (x86)\Msp Agent\msp-agent-core.exewinagent.exe
User:
SYSTEM
Company:
N-able Technologies, Ltd.
Integrity Level:
SYSTEM
Description:
N-able MSP Agent Core
Exit code:
1
Modules
Images
c:\program files (x86)\msp agent\msp-agent-core.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
776"C:\Program Files (x86)\Msp Agent\msp-agent-core.exe"C:\Program Files (x86)\Msp Agent\msp-agent-core.exe
services.exe
User:
SYSTEM
Company:
N-able Technologies, Ltd.
Integrity Level:
SYSTEM
Description:
N-able MSP Agent Core
Exit code:
0
Modules
Images
c:\program files (x86)\msp agent\msp-agent-core.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
780"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Manager
Exit code:
3221226540
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
Total events
93 156
Read events
91 259
Write events
1 817
Delete events
80

Modification events

(PID) Process:(7580) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(7580) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(7580) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(7580) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(7580) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(7580) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C1F
Value:
1
(PID) Process:(3900) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
0100000000000000CF50DF3196AFDB01
(PID) Process:(7580) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C1I
Value:
1
(PID) Process:(7580) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C2I
Value:
1
(PID) Process:(7580) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C7I
Value:
1
Executable files
354
Suspicious files
618
Text files
194
Unknown types
2

Dropped files

PID
Process
Filename
Type
7580chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RF10c45b.TMP
MD5:
SHA256:
7580chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
7580chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old~RF10c46b.TMP
MD5:
SHA256:
7580chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old~RF10c46b.TMP
MD5:
SHA256:
7580chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF10c46b.TMP
MD5:
SHA256:
7580chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF10c46b.TMP
MD5:
SHA256:
7580chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
7580chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
7580chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
7580chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
38
TCP/UDP connections
111
DNS requests
96
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7176
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7176
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5772
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
5772
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
5772
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
5772
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
5772
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
7580
chrome.exe
239.255.255.250:1900
whitelisted
162.125.66.18:443
www.dropbox.com
DROPBOX
DE
whitelisted
66.102.1.84:443
accounts.google.com
GOOGLE
US
whitelisted
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.120
  • 23.216.77.42
  • 23.216.77.6
  • 23.216.77.36
  • 23.216.77.30
  • 23.216.77.25
  • 23.216.77.38
  • 23.216.77.20
  • 23.216.77.18
whitelisted
google.com
  • 216.58.212.142
whitelisted
www.dropbox.com
  • 162.125.66.18
whitelisted
accounts.google.com
  • 66.102.1.84
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
cfl.dropboxstatic.com
  • 104.16.100.29
  • 104.16.99.29
whitelisted
assets.dropbox.com
  • 52.222.236.51
  • 52.222.236.76
  • 52.222.236.37
  • 52.222.236.19
whitelisted
www.google.com
  • 142.250.185.132
  • 142.250.181.228
whitelisted
login.live.com
  • 20.190.160.22
  • 20.190.160.130
  • 20.190.160.128
  • 40.126.32.140
  • 20.190.160.66
  • 40.126.32.68
  • 40.126.32.76
  • 20.190.160.64
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Potential Corporate Privacy Violation
ET INFO Observed DNS Query for Suspicious TLD (.management)
2196
svchost.exe
Potential Corporate Privacy Violation
ET INFO Observed DNS Query for Suspicious TLD (.management)
2196
svchost.exe
Potential Corporate Privacy Violation
ET INFO Observed DNS Query for Suspicious TLD (.management)
2196
svchost.exe
Potential Corporate Privacy Violation
ET INFO Observed DNS Query for Suspicious TLD (.management)
No debug info