Analysis
-
max time kernel
38s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 21:56
Static task
static1
Behavioral task
behavioral1
Sample
ReBomb2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ReBomb2.exe
Resource
win10v2004-20241007-en
General
-
Target
ReBomb2.exe
-
Size
8.8MB
-
MD5
11f3d124b89d4c6a737f993442e15259
-
SHA1
290b45651633021d3afd4bdedf8f03c2c705cf11
-
SHA256
80d1631227d5b253b69f1004286c4562e765d54be593ac0b6ad0d34b35275f94
-
SHA512
43822db6a9dd226579c136e7049012714fb54ca4915fdf4b4ba92e2a72380b1b56de7a9a6cef79e9b62139e36244812955ca4bb2ff8991f03ef96f929d95b4f8
-
SSDEEP
196608:jnXFXAjanN0pJEFaSWADbBZpY8kqt0W9X41CoOw0bldnC9t:DFrypJEDpnpzkqt0kX41CtBdnC9t
Malware Config
Extracted
arrowrat
VenomHVNC
windows-services.linkpc.net:4448
waDQmvKdS.exe
Extracted
asyncrat
5.0.5
Venom Clients
windows-services.linkpc.net:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
System.exe
-
install_folder
%AppData%
Signatures
-
Arrowrat family
-
Asyncrat family
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\AppData\\Roaming\\sihost\\sihost" ClientH.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\AppData\\Roaming\\sihost\\sihost" ClientH.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\AppData\\Roaming\\sihost\\sihost" ClientH.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\AppData\\Roaming\\sihost\\sihost" ClientH.exe -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016cc8-12.dat family_asyncrat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 64 IoCs
pid Process 2184 ReBomb2.exe 2884 ClientH.exe 2760 venom.exe 2668 ReBomb2.exe 2568 ClientH.exe 2584 ReBomb2.exe 2664 ClientH.exe 2848 ReBomb2.exe 2984 venom.exe 2436 ClientH.exe 2780 venom.exe 2976 venom.exe 2952 ClientH.exe 484 ReBomb2.exe 2120 venom.exe 2528 ReBomb2.exe 680 ClientH.exe 1844 ReBomb2.exe 1148 venom.exe 1476 ClientH.exe 2220 ReBomb2.exe 2492 venom.exe 2240 ClientH.exe 1104 venom.exe 2208 ClientH.exe 656 ReBomb2.exe 448 venom.exe 760 ReBomb2.exe 928 ReBomb2.exe 692 venom.exe 1744 ClientH.exe 1724 ClientH.exe 296 ReBomb2.exe 2060 venom.exe 568 venom.exe 1756 ClientH.exe 1780 ClientH.exe 1708 ReBomb2.exe 2872 venom.exe 2320 ClientH.exe 2624 ReBomb2.exe 1572 venom.exe 2548 ClientH.exe 2772 ReBomb2.exe 2676 venom.exe 2560 ReBomb2.exe 2796 ReBomb2.exe 2708 venom.exe 284 ReBomb2.exe 1124 venom.exe 2296 ClientH.exe 2908 ClientH.exe 2184 ClientH.exe 2556 venom.exe 2640 ClientH.exe 2940 ReBomb2.exe 1784 venom.exe 3240 ReBomb2.exe 3296 ClientH.exe 3324 ClientH.exe 3288 ReBomb2.exe 3304 venom.exe 3332 venom.exe 3404 ReBomb2.exe -
Loads dropped DLL 64 IoCs
pid Process 3024 ReBomb2.exe 3024 ReBomb2.exe 3024 ReBomb2.exe 2184 ReBomb2.exe 2184 ReBomb2.exe 2184 ReBomb2.exe 2668 ReBomb2.exe 2668 ReBomb2.exe 2668 ReBomb2.exe 2584 ReBomb2.exe 2584 ReBomb2.exe 2584 ReBomb2.exe 2848 ReBomb2.exe 2848 ReBomb2.exe 2848 ReBomb2.exe 484 ReBomb2.exe 484 ReBomb2.exe 2528 ReBomb2.exe 2528 ReBomb2.exe 2528 ReBomb2.exe 484 ReBomb2.exe 1844 ReBomb2.exe 1844 ReBomb2.exe 1844 ReBomb2.exe 2220 ReBomb2.exe 2220 ReBomb2.exe 2220 ReBomb2.exe 656 ReBomb2.exe 656 ReBomb2.exe 760 ReBomb2.exe 760 ReBomb2.exe 760 ReBomb2.exe 656 ReBomb2.exe 928 ReBomb2.exe 928 ReBomb2.exe 928 ReBomb2.exe 296 ReBomb2.exe 296 ReBomb2.exe 296 ReBomb2.exe 1708 ReBomb2.exe 1708 ReBomb2.exe 1708 ReBomb2.exe 2624 ReBomb2.exe 2624 ReBomb2.exe 2624 ReBomb2.exe 2772 ReBomb2.exe 2772 ReBomb2.exe 2560 ReBomb2.exe 2560 ReBomb2.exe 2560 ReBomb2.exe 2772 ReBomb2.exe 2796 ReBomb2.exe 2796 ReBomb2.exe 2796 ReBomb2.exe 284 ReBomb2.exe 284 ReBomb2.exe 284 ReBomb2.exe 2940 ReBomb2.exe 3240 ReBomb2.exe 3240 ReBomb2.exe 3240 ReBomb2.exe 2940 ReBomb2.exe 2940 ReBomb2.exe 3288 ReBomb2.exe -
pid Process 12720 powershell.exe 6484 powershell.exe 780 Process not Found 4644 Process not Found 7696 powershell.exe 8096 powershell.exe 11488 powershell.exe 12376 powershell.exe 11440 powershell.exe 8268 powershell.exe 6304 Process not Found 2320 Process not Found 7380 powershell.exe 6796 powershell.exe 704 powershell.exe 9324 powershell.exe 12148 powershell.exe 5944 powershell.exe 15984 Process not Found 12576 powershell.exe 11080 powershell.exe 12456 powershell.exe 3244 powershell.exe 7580 powershell.exe 12384 powershell.exe 8292 powershell.exe 3736 powershell.exe 4380 powershell.exe 5204 powershell.exe 11672 powershell.exe 3544 Process not Found 9172 Process not Found 6168 Process not Found 6108 powershell.exe 13216 powershell.exe 6068 powershell.exe 14916 powershell.exe 9152 powershell.exe 11452 powershell.exe 12284 powershell.exe 15300 Process not Found 12388 Process not Found 4648 Process not Found 6988 powershell.exe 11656 powershell.exe 11760 powershell.exe 10748 powershell.exe 11632 powershell.exe 6264 powershell.exe 1400 powershell.exe 12316 Process not Found 2588 powershell.exe 9032 powershell.exe 12880 powershell.exe 13104 powershell.exe 7436 powershell.exe 11552 Process not Found 2956 powershell.exe 12448 powershell.exe 12828 powershell.exe 12488 powershell.exe 6892 powershell.exe 12584 powershell.exe 7568 powershell.exe -
Suspicious use of SetThreadContext 46 IoCs
description pid Process procid_target PID 2320 set thread context of 3256 2320 ClientH.exe 117 PID 2436 set thread context of 3264 2436 ClientH.exe 708 PID 3296 set thread context of 4060 3296 ClientH.exe 157 PID 2640 set thread context of 2636 2640 ClientH.exe 159 PID 2240 set thread context of 3248 2240 ClientH.exe 116 PID 1780 set thread context of 3456 1780 ClientH.exe 161 PID 680 set thread context of 4008 680 ClientH.exe 155 PID 1756 set thread context of 3976 1756 ClientH.exe 152 PID 2208 set thread context of 4836 2208 ClientH.exe 240 PID 3420 set thread context of 5208 3420 ClientH.exe 273 PID 2548 set thread context of 4608 2548 ClientH.exe 271 PID 2908 set thread context of 2052 2908 ClientH.exe 272 PID 1476 set thread context of 5008 1476 ClientH.exe 268 PID 1724 set thread context of 4988 1724 ClientH.exe 256 PID 3440 set thread context of 5556 3440 ClientH.exe 277 PID 3588 set thread context of 5656 3588 ClientH.exe 279 PID 4404 set thread context of 5988 4404 ClientH.exe 285 PID 3508 set thread context of 5628 3508 ClientH.exe 276 PID 3744 set thread context of 5900 3744 ClientH.exe 282 PID 3324 set thread context of 5948 3324 ClientH.exe 283 PID 4460 set thread context of 5684 4460 ClientH.exe 280 PID 4360 set thread context of 5736 4360 ClientH.exe 281 PID 3816 set thread context of 5936 3816 ClientH.exe 284 PID 3656 set thread context of 5308 3656 ClientH.exe 274 PID 4188 set thread context of 5588 4188 ClientH.exe 286 PID 4868 set thread context of 5820 4868 ClientH.exe 288 PID 2296 set thread context of 5024 2296 ClientH.exe 266 PID 4616 set thread context of 6100 4616 ClientH.exe 319 PID 4544 set thread context of 632 4544 ClientH.exe 315 PID 5072 set thread context of 3024 5072 ClientH.exe 314 PID 5232 set thread context of 6248 5232 ClientH.exe 332 PID 2500 set thread context of 1596 2500 ClientH.exe 330 PID 4716 set thread context of 2656 4716 ClientH.exe 302 PID 5664 set thread context of 6608 5664 ClientH.exe 351 PID 5756 set thread context of 6584 5756 ClientH.exe 350 PID 5416 set thread context of 3156 5416 ClientH.exe 310 PID 780 set thread context of 288 780 ClientH.exe 373 PID 3012 set thread context of 5864 3012 ClientH.exe 1399 PID 3836 set thread context of 1092 3836 ClientH.exe 398 PID 2864 set thread context of 2576 2864 ClientH.exe 378 PID 5272 set thread context of 1800 5272 ClientH.exe 512 PID 6292 set thread context of 4504 6292 ClientH.exe 563 PID 6000 set thread context of 7156 6000 ClientH.exe 443 PID 6504 set thread context of 4216 6504 ClientH.exe 1598 PID 6744 set thread context of 9272 6744 ClientH.exe 564 PID 6604 set thread context of 10472 6604 ClientH.exe 584 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ClientH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReBomb2.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 13764 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6304 schtasks.exe 4376 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2568 ClientH.exe 2884 ClientH.exe 2664 ClientH.exe 2952 ClientH.exe 2436 ClientH.exe 680 ClientH.exe 1476 ClientH.exe 2208 ClientH.exe 2240 ClientH.exe 1744 ClientH.exe 1780 ClientH.exe 1724 ClientH.exe 1756 ClientH.exe 2320 ClientH.exe 2548 ClientH.exe 2296 ClientH.exe 2640 ClientH.exe 2908 ClientH.exe 2588 powershell.exe 2956 powershell.exe 2184 ClientH.exe 2184 ClientH.exe 3296 ClientH.exe 3296 ClientH.exe 3508 ClientH.exe 3508 ClientH.exe 3440 ClientH.exe 3440 ClientH.exe 3420 ClientH.exe 3420 ClientH.exe 3744 ClientH.exe 3744 ClientH.exe 3324 ClientH.exe 3324 ClientH.exe 2952 ClientH.exe 2952 ClientH.exe 2952 ClientH.exe 2952 ClientH.exe 3816 ClientH.exe 3816 ClientH.exe 3588 ClientH.exe 3588 ClientH.exe 3656 ClientH.exe 3656 ClientH.exe 4188 ClientH.exe 4188 ClientH.exe 4404 ClientH.exe 4404 ClientH.exe 2664 ClientH.exe 2664 ClientH.exe 2664 ClientH.exe 2664 ClientH.exe 4360 ClientH.exe 4360 ClientH.exe 4460 ClientH.exe 4460 ClientH.exe 4716 ClientH.exe 4868 ClientH.exe 4868 ClientH.exe 4716 ClientH.exe 5072 ClientH.exe 5072 ClientH.exe 2864 ClientH.exe 2864 ClientH.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2568 ClientH.exe Token: SeDebugPrivilege 2884 ClientH.exe Token: SeDebugPrivilege 2664 ClientH.exe Token: SeDebugPrivilege 2952 ClientH.exe Token: SeDebugPrivilege 2436 ClientH.exe Token: SeDebugPrivilege 680 ClientH.exe Token: SeDebugPrivilege 1476 ClientH.exe Token: SeDebugPrivilege 2208 ClientH.exe Token: SeDebugPrivilege 2240 ClientH.exe Token: SeDebugPrivilege 1744 ClientH.exe Token: SeDebugPrivilege 1780 ClientH.exe Token: SeDebugPrivilege 1724 ClientH.exe Token: SeDebugPrivilege 1756 ClientH.exe Token: SeDebugPrivilege 2320 ClientH.exe Token: SeDebugPrivilege 2548 ClientH.exe Token: SeDebugPrivilege 2296 ClientH.exe Token: SeDebugPrivilege 2640 ClientH.exe Token: SeDebugPrivilege 2908 ClientH.exe Token: SeDebugPrivilege 2588 powershell.exe Token: SeDebugPrivilege 2956 powershell.exe Token: SeDebugPrivilege 2184 ClientH.exe Token: SeShutdownPrivilege 1368 explorer.exe Token: SeDebugPrivilege 3296 ClientH.exe Token: SeDebugPrivilege 3508 ClientH.exe Token: SeDebugPrivilege 3440 ClientH.exe Token: SeDebugPrivilege 3420 ClientH.exe Token: SeDebugPrivilege 3744 ClientH.exe Token: SeDebugPrivilege 3324 ClientH.exe Token: SeDebugPrivilege 3816 ClientH.exe Token: SeDebugPrivilege 3588 ClientH.exe Token: SeDebugPrivilege 3656 ClientH.exe Token: SeDebugPrivilege 4188 ClientH.exe Token: SeDebugPrivilege 4404 ClientH.exe Token: SeDebugPrivilege 4360 ClientH.exe Token: SeDebugPrivilege 4460 ClientH.exe Token: SeDebugPrivilege 4716 ClientH.exe Token: SeDebugPrivilege 4868 ClientH.exe Token: SeDebugPrivilege 5072 ClientH.exe Token: SeDebugPrivilege 2864 ClientH.exe Token: SeDebugPrivilege 2500 ClientH.exe Token: SeDebugPrivilege 4544 ClientH.exe Token: SeDebugPrivilege 4616 ClientH.exe Token: SeDebugPrivilege 3012 ClientH.exe Token: SeDebugPrivilege 3836 ClientH.exe Token: SeDebugPrivilege 780 ClientH.exe Token: SeDebugPrivilege 5232 ClientH.exe Token: SeDebugPrivilege 5332 ClientH.exe Token: SeDebugPrivilege 5416 ClientH.exe Token: SeDebugPrivilege 5572 ClientH.exe Token: SeDebugPrivilege 5664 ClientH.exe Token: SeShutdownPrivilege 1368 explorer.exe Token: SeShutdownPrivilege 1368 explorer.exe Token: SeShutdownPrivilege 1368 explorer.exe Token: SeDebugPrivilege 5756 ClientH.exe Token: SeShutdownPrivilege 1368 explorer.exe Token: SeShutdownPrivilege 1368 explorer.exe Token: SeShutdownPrivilege 1368 explorer.exe Token: SeDebugPrivilege 6000 ClientH.exe Token: SeShutdownPrivilege 1368 explorer.exe Token: SeDebugPrivilege 5272 ClientH.exe Token: SeDebugPrivilege 6292 ClientH.exe Token: SeDebugPrivilege 6384 ClientH.exe Token: SeDebugPrivilege 6504 ClientH.exe Token: SeDebugPrivilege 6240 powershell.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe 1368 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2184 3024 ReBomb2.exe 87 PID 3024 wrote to memory of 2184 3024 ReBomb2.exe 87 PID 3024 wrote to memory of 2184 3024 ReBomb2.exe 87 PID 3024 wrote to memory of 2184 3024 ReBomb2.exe 87 PID 3024 wrote to memory of 2884 3024 ReBomb2.exe 32 PID 3024 wrote to memory of 2884 3024 ReBomb2.exe 32 PID 3024 wrote to memory of 2884 3024 ReBomb2.exe 32 PID 3024 wrote to memory of 2884 3024 ReBomb2.exe 32 PID 3024 wrote to memory of 2760 3024 ReBomb2.exe 33 PID 3024 wrote to memory of 2760 3024 ReBomb2.exe 33 PID 3024 wrote to memory of 2760 3024 ReBomb2.exe 33 PID 3024 wrote to memory of 2760 3024 ReBomb2.exe 33 PID 3024 wrote to memory of 2688 3024 ReBomb2.exe 34 PID 3024 wrote to memory of 2688 3024 ReBomb2.exe 34 PID 3024 wrote to memory of 2688 3024 ReBomb2.exe 34 PID 3024 wrote to memory of 2688 3024 ReBomb2.exe 34 PID 2184 wrote to memory of 2668 2184 ReBomb2.exe 35 PID 2184 wrote to memory of 2668 2184 ReBomb2.exe 35 PID 2184 wrote to memory of 2668 2184 ReBomb2.exe 35 PID 2184 wrote to memory of 2668 2184 ReBomb2.exe 35 PID 2184 wrote to memory of 2568 2184 ReBomb2.exe 36 PID 2184 wrote to memory of 2568 2184 ReBomb2.exe 36 PID 2184 wrote to memory of 2568 2184 ReBomb2.exe 36 PID 2184 wrote to memory of 2568 2184 ReBomb2.exe 36 PID 2688 wrote to memory of 2588 2688 WScript.exe 37 PID 2688 wrote to memory of 2588 2688 WScript.exe 37 PID 2688 wrote to memory of 2588 2688 WScript.exe 37 PID 2688 wrote to memory of 2588 2688 WScript.exe 37 PID 2184 wrote to memory of 2780 2184 ReBomb2.exe 755 PID 2184 wrote to memory of 2780 2184 ReBomb2.exe 755 PID 2184 wrote to memory of 2780 2184 ReBomb2.exe 755 PID 2184 wrote to memory of 2780 2184 ReBomb2.exe 755 PID 2668 wrote to memory of 2584 2668 ReBomb2.exe 39 PID 2668 wrote to memory of 2584 2668 ReBomb2.exe 39 PID 2668 wrote to memory of 2584 2668 ReBomb2.exe 39 PID 2668 wrote to memory of 2584 2668 ReBomb2.exe 39 PID 2668 wrote to memory of 2664 2668 ReBomb2.exe 41 PID 2668 wrote to memory of 2664 2668 ReBomb2.exe 41 PID 2668 wrote to memory of 2664 2668 ReBomb2.exe 41 PID 2668 wrote to memory of 2664 2668 ReBomb2.exe 41 PID 2668 wrote to memory of 2976 2668 ReBomb2.exe 616 PID 2668 wrote to memory of 2976 2668 ReBomb2.exe 616 PID 2668 wrote to memory of 2976 2668 ReBomb2.exe 616 PID 2668 wrote to memory of 2976 2668 ReBomb2.exe 616 PID 2584 wrote to memory of 2848 2584 ReBomb2.exe 677 PID 2584 wrote to memory of 2848 2584 ReBomb2.exe 677 PID 2584 wrote to memory of 2848 2584 ReBomb2.exe 677 PID 2584 wrote to memory of 2848 2584 ReBomb2.exe 677 PID 2584 wrote to memory of 2952 2584 ReBomb2.exe 44 PID 2584 wrote to memory of 2952 2584 ReBomb2.exe 44 PID 2584 wrote to memory of 2952 2584 ReBomb2.exe 44 PID 2584 wrote to memory of 2952 2584 ReBomb2.exe 44 PID 2584 wrote to memory of 2984 2584 ReBomb2.exe 45 PID 2584 wrote to memory of 2984 2584 ReBomb2.exe 45 PID 2584 wrote to memory of 2984 2584 ReBomb2.exe 45 PID 2584 wrote to memory of 2984 2584 ReBomb2.exe 45 PID 2848 wrote to memory of 484 2848 ReBomb2.exe 46 PID 2848 wrote to memory of 484 2848 ReBomb2.exe 46 PID 2848 wrote to memory of 484 2848 ReBomb2.exe 46 PID 2848 wrote to memory of 484 2848 ReBomb2.exe 46 PID 2848 wrote to memory of 2436 2848 ReBomb2.exe 461 PID 2848 wrote to memory of 2436 2848 ReBomb2.exe 461 PID 2848 wrote to memory of 2436 2848 ReBomb2.exe 461 PID 2848 wrote to memory of 2436 2848 ReBomb2.exe 461 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:484 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:656 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:760 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:928 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:296 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:284 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"24⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"25⤵
- System Location Discovery: System Language Discovery
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"26⤵
- System Location Discovery: System Language Discovery
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"27⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"28⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"29⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"30⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"31⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"32⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"33⤵
- System Location Discovery: System Language Discovery
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"34⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"35⤵
- System Location Discovery: System Language Discovery
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"36⤵
- System Location Discovery: System Language Discovery
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"37⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"38⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"39⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"40⤵
- System Location Discovery: System Language Discovery
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"41⤵
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"42⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"43⤵
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"44⤵
- System Location Discovery: System Language Discovery
PID:5224 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"45⤵
- System Location Discovery: System Language Discovery
PID:5324 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"46⤵PID:5380
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"47⤵PID:5564
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"48⤵PID:5648
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"49⤵
- System Location Discovery: System Language Discovery
PID:5748 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"50⤵PID:5964
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"51⤵
- System Location Discovery: System Language Discovery
PID:5196 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"52⤵PID:6284
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"53⤵PID:6376
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"54⤵PID:6496
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"55⤵PID:6736
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"56⤵PID:6892
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"57⤵PID:6996
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"58⤵
- System Location Discovery: System Language Discovery
PID:7100 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"59⤵PID:6308
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"60⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"61⤵PID:6764
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"62⤵PID:6960
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"63⤵PID:7232
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"64⤵PID:7396
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"65⤵PID:7496
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"66⤵PID:7660
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"67⤵PID:7884
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"68⤵PID:7984
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"69⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"70⤵PID:7792
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"71⤵
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"72⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"73⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"74⤵
- System Location Discovery: System Language Discovery
PID:7816 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"75⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"76⤵PID:8212
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"77⤵PID:8476
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"78⤵PID:8596
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"79⤵PID:8696
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"80⤵PID:8868
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"81⤵
- System Location Discovery: System Language Discovery
PID:9036 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"82⤵PID:9180
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"83⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"84⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"85⤵PID:8768
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"86⤵
- System Location Discovery: System Language Discovery
PID:9172 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"87⤵PID:8820
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"88⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"89⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"90⤵PID:9440
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"91⤵PID:9688
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"92⤵PID:9804
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"93⤵PID:9992
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"94⤵
- System Location Discovery: System Language Discovery
PID:10064 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"95⤵
- System Location Discovery: System Language Discovery
PID:5580 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"96⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"97⤵PID:6244
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"98⤵
- System Location Discovery: System Language Discovery
PID:6392 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"99⤵
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"100⤵PID:6412
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"101⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"102⤵
- System Location Discovery: System Language Discovery
PID:10344 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"103⤵PID:10520
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"104⤵PID:10688
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"105⤵PID:10924
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"106⤵
- System Location Discovery: System Language Discovery
PID:11016 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"107⤵
- System Location Discovery: System Language Discovery
PID:11152 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"108⤵PID:10384
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"109⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"110⤵
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"111⤵PID:6232
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"112⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"113⤵PID:10992
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"114⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"115⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"116⤵PID:10068
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"117⤵PID:13812
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"118⤵PID:12464
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"119⤵PID:10432
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"120⤵PID:11616
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"121⤵PID:11868
-
C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"C:\Users\Admin\AppData\Local\Temp\ReBomb2.exe"122⤵PID:11776
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-