File name:

4363463463464363463463463.exe.bin

Full analysis: https://app.any.run/tasks/02611424-2971-47e0-802b-22b3f280b0e7
Verdict: Malicious activity
Threats:

Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.

Analysis date: July 14, 2025, 19:07:17
OS: Windows 10 Professional (build: 19044, 32 bit)
Tags:
loader
github
hausbomber
auto
asyncrat
evasion
auto-startup
ims-api
generic
xworm
crypto-regex
metasploit
backdoor
auto-sch
auto-reg
remcos
rat
remote
gh0st
snake
keylogger
telegram
stealer
quasarrat
nitol
botnet
pastebin
quasar
nspack
rdp
amadey
uac
havoc
tool
meterpreter
njrat
ammy
lumma
rustystealer
autoit
rmm-tool
netsupport
python
dbatloader
modiloader
rdpwrap
babadeda
arch-scr
arch-exec
inno
installer
delphi
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

2A94F3960C58C6E70826495F76D00B85

SHA1:

E2A1A5641295F5EBF01A37AC1C170AC0814BB71A

SHA256:

2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE

SSDEEP:

192:2we8sGKE6MqyG7c20L7BIW12n/ePSmzkTInu8stYcFwVc03KY:9e8sGKfMqyGg20PKn/cRaInuptYcFwVY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ASYNCRAT has been found (auto)

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • imagelogger.exe (PID: 1164)
    • HAUSBOMBER has been detected (YARA)

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
    • Create files in the Startup directory

      • imagelogger.exe (PID: 1164)
      • IDriverT.exe (PID: 6744)
      • dllhost.exe (PID: 3768)
      • snd16061.exe (PID: 8032)
      • cmd.exe (PID: 4508)
      • IMG001.exe (PID: 7328)
      • dllhost.exe (PID: 3080)
      • dllhost.exe (PID: 5804)
    • XWORM has been detected (YARA)

      • imagelogger.exe (PID: 1164)
      • XClient.exe (PID: 6112)
    • QUASARRAT has been found (auto)

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • Client-built.exe (PID: 4796)
      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • Sentil.exe (PID: 548)
      • example_win32_dx11.exe (PID: 5484)
      • System.exe (PID: 5868)
      • svhost.exe (PID: 6288)
    • GENERIC has been found (auto)

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • WEBDOWN.EXE (PID: 5504)
      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • Ganja128.exe (PID: 5900)
      • byogbftl.exe (PID: 7004)
    • METASPLOIT has been found (auto)

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
    • METASPLOIT has been detected (SURICATA)

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
    • Changes the autorun value in the registry

      • Client-built.exe (PID: 4796)
      • RustDesk.exe (PID: 2740)
      • Application Frame Host.exe (PID: 5916)
      • NOTallowedtocrypt.exe (PID: 1728)
      • 76y5trfed675ytg.exe (PID: 4884)
      • 76y5trfed675ytg.exe (PID: 2108)
      • svchost.exe (PID: 5020)
      • svchost.exe (PID: 5496)
      • XClient.exe (PID: 6112)
      • remcos_a.exe (PID: 7108)
      • remcos.exe (PID: 7452)
      • vcredist2005_x86.exe (PID: 4560)
      • VCREDI~3.EXE (PID: 6240)
      • dllhost.exe (PID: 3768)
      • suker.exe (PID: 8060)
      • LNCACSPSetup(1.0.9.5).exe (PID: 2092)
      • NetSignCNG-v3.0.3.0.tmp (PID: 7372)
      • Adobe.exe (PID: 7184)
      • Adobe.exe (PID: 6760)
      • Adobe.exe (PID: 7776)
      • AdobeART.exe (PID: 3408)
      • AdobeART.exe (PID: 7180)
      • svhost.exe (PID: 6508)
      • svhost.exe (PID: 7460)
      • Adobe.exe (PID: 6532)
      • byogbftl.exe (PID: 7004)
      • Adobe.exe (PID: 5612)
      • Adobe.exe (PID: 1392)
      • Adobe.exe (PID: 3772)
      • svchsot.exe (PID: 2384)
      • 76y5trfed675ytg.exe (PID: 5844)
      • Adobe.exe (PID: 6156)
      • Adobe.exe (PID: 6220)
      • svchost.exe (PID: 5876)
      • 76y5trfed675ytg.exe (PID: 6628)
      • byogbftl.exe (PID: 6396)
      • Adobe.exe (PID: 7476)
      • AdobeART.exe (PID: 7360)
      • svchost.exe (PID: 6664)
      • Google Chrome.exe (PID: 6764)
      • Adobe.exe (PID: 7064)
      • svchsot.exe (PID: 2560)
      • 76y5trfed675ytg.exe (PID: 5748)
      • Adobe.exe (PID: 1432)
      • dllhost.exe (PID: 5804)
      • 76y5trfed675ytg.exe (PID: 5604)
      • svchost.exe (PID: 5792)
      • Application Frame Host.exe (PID: 3044)
      • byogbftl.exe (PID: 5892)
      • AdobeART.exe (PID: 5632)
      • Adobe.exe (PID: 6460)
      • svchost.exe (PID: 5280)
      • AdobeART.exe (PID: 7436)
      • AdobeART.exe (PID: 8068)
    • Uses Task Scheduler to autorun other applications

      • Application Frame Host.exe (PID: 5916)
      • JUSCHED.EXE (PID: 7352)
      • jusched.exe (PID: 8148)
      • Sentil.exe (PID: 548)
      • Client1.exe (PID: 6416)
      • Shopzilla.pif (PID: 7844)
      • svhost.exe (PID: 6288)
      • svhost.exe (PID: 4636)
      • svhost.exe (PID: 3600)
      • jusched.exe (PID: 3568)
      • Client1.exe (PID: 3644)
      • Application Frame Host.exe (PID: 6488)
      • svhost.exe (PID: 7512)
      • Client1.exe (PID: 3628)
      • Application Frame Host.exe (PID: 3044)
      • svhost.exe (PID: 6492)
    • NITOL has been found (auto)

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • RustDesk.exe (PID: 2740)
    • REMCOS mutex has been found

      • NOTallowedtocrypt.exe (PID: 1728)
      • 76y5trfed675ytg.exe (PID: 4884)
      • svchost.exe (PID: 5020)
      • svchost.exe (PID: 828)
      • 76y5trfed675ytg.exe (PID: 640)
      • 76y5trfed675ytg.exe (PID: 2108)
      • svchost.exe (PID: 5496)
      • rea.exe (PID: 1464)
      • iexplore.exe (PID: 3496)
      • remcos_a.exe (PID: 7108)
      • remcos.exe (PID: 7452)
      • remcos.exe (PID: 7512)
      • svchost.exe (PID: 7740)
      • iexplore.exe (PID: 7488)
      • remcos.exe (PID: 6036)
      • svchost.exe (PID: 3884)
      • iexplore.exe (PID: 3632)
      • 76y5trfed675ytg.exe (PID: 3076)
      • svchost.exe (PID: 5876)
      • 76y5trfed675ytg.exe (PID: 5844)
      • remcos.exe (PID: 4884)
      • 76y5trfed675ytg.exe (PID: 6628)
      • svchost.exe (PID: 6664)
      • remcos.exe (PID: 7076)
      • svchost.exe (PID: 2568)
      • iexplore.exe (PID: 5364)
      • remcos.exe (PID: 2708)
      • 76y5trfed675ytg.exe (PID: 3660)
      • 76y5trfed675ytg.exe (PID: 5748)
      • svchost.exe (PID: 5792)
      • remcos.exe (PID: 4088)
      • 76y5trfed675ytg.exe (PID: 5604)
      • svchost.exe (PID: 5280)
      • remcos.exe (PID: 6116)
    • UAC/LUA settings modification

      • reg.exe (PID: 1236)
      • reg.exe (PID: 2028)
      • reg.exe (PID: 1372)
      • reg.exe (PID: 5524)
      • reg.exe (PID: 5948)
      • reg.exe (PID: 7184)
      • reg.exe (PID: 7820)
      • reg.exe (PID: 7856)
      • reg.exe (PID: 2044)
      • reg.exe (PID: 5204)
      • reg.exe (PID: 5868)
      • reg.exe (PID: 5908)
      • reg.exe (PID: 6776)
      • reg.exe (PID: 5296)
      • reg.exe (PID: 4148)
      • reg.exe (PID: 5108)
      • reg.exe (PID: 6108)
      • reg.exe (PID: 6044)
      • reg.exe (PID: 6040)
    • Connects to the CnC server

      • RustDesk.exe (PID: 2740)
      • suker.exe (PID: 8060)
      • client32.exe (PID: 7300)
      • svchost.exe (PID: 1564)
      • svchsot.exe (PID: 2384)
      • suker.exe (PID: 7648)
      • client32.exe (PID: 6096)
      • svchsot.exe (PID: 2560)
      • client32.exe (PID: 7392)
      • suker.exe (PID: 6600)
    • GH0ST has been detected (SURICATA)

      • RustDesk.exe (PID: 2740)
      • svchsot.exe (PID: 2384)
      • svchsot.exe (PID: 2560)
    • QUASAR has been detected (YARA)

      • Application Frame Host.exe (PID: 5916)
    • METASPLOIT has been detected (YARA)

      • award.pdf.exe (PID: 3056)
    • Known privilege escalation attack

      • dllhost.exe (PID: 1480)
    • Changes Windows Defender settings

      • XClient.exe (PID: 6112)
      • cmd.exe (PID: 6204)
      • cmd.exe (PID: 2864)
      • dllhost.exe (PID: 3768)
      • cmd.exe (PID: 2348)
      • dllhost.exe (PID: 3080)
      • Google Chrome.exe (PID: 6764)
      • cmd.exe (PID: 3408)
      • dllhost.exe (PID: 5804)
      • Google Chrome.exe (PID: 5160)
    • Changes powershell execution policy (Bypass)

      • XClient.exe (PID: 6112)
      • random.exe (PID: 7604)
      • dllhost.exe (PID: 3768)
      • random1.exe (PID: 4788)
      • random1.exe (PID: 7112)
      • cmd.exe (PID: 2888)
      • cmd.exe (PID: 8092)
      • dllhost.exe (PID: 3080)
      • random1.exe (PID: 7216)
      • Google Chrome.exe (PID: 6764)
      • cmd.exe (PID: 6292)
      • dllhost.exe (PID: 5804)
      • random1.exe (PID: 6192)
      • Google Chrome.exe (PID: 5160)
      • cmd.exe (PID: 7304)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 1088)
      • powershell.exe (PID: 5532)
      • powershell.exe (PID: 3084)
      • powershell.exe (PID: 6168)
      • powershell.exe (PID: 7936)
      • powershell.exe (PID: 7508)
      • powershell.exe (PID: 7848)
      • powershell.exe (PID: 6304)
      • powershell.exe (PID: 7764)
      • powershell.exe (PID: 1604)
      • powershell.exe (PID: 2236)
      • powershell.exe (PID: 5584)
      • powershell.exe (PID: 5868)
      • powershell.exe (PID: 5684)
      • powershell.exe (PID: 5800)
      • powershell.exe (PID: 5840)
      • powershell.exe (PID: 6296)
      • powershell.exe (PID: 7408)
      • powershell.exe (PID: 8060)
      • powershell.exe (PID: 6372)
      • powershell.exe (PID: 7104)
      • powershell.exe (PID: 6516)
      • powershell.exe (PID: 7440)
      • powershell.exe (PID: 6000)
      • powershell.exe (PID: 1428)
      • powershell.exe (PID: 4368)
      • powershell.exe (PID: 6120)
      • powershell.exe (PID: 6396)
      • powershell.exe (PID: 7040)
      • powershell.exe (PID: 7384)
      • powershell.exe (PID: 8140)
      • powershell.exe (PID: 7288)
      • powershell.exe (PID: 7144)
    • SNAKEKEYLOGGER has been detected (SURICATA)

      • RegSvcs.exe (PID: 1372)
      • RegSvcs.exe (PID: 7552)
    • Adds path to the Windows Defender exclusion list

      • XClient.exe (PID: 6112)
      • cmd.exe (PID: 6204)
      • svchost.exe (PID: 6344)
      • UpdateManager.exe (PID: 5708)
      • cmd.exe (PID: 2864)
      • dllhost.exe (PID: 3768)
      • UpdateManager.exe (PID: 3668)
      • cmd.exe (PID: 2348)
      • dllhost.exe (PID: 3080)
      • Google Chrome.exe (PID: 6764)
      • UpdateManager.exe (PID: 3652)
      • cmd.exe (PID: 3408)
      • dllhost.exe (PID: 5804)
      • Google Chrome.exe (PID: 5160)
    • Adds process to the Windows Defender exclusion list

      • XClient.exe (PID: 6112)
      • dllhost.exe (PID: 3768)
      • dllhost.exe (PID: 3080)
      • Google Chrome.exe (PID: 6764)
      • dllhost.exe (PID: 5804)
      • Google Chrome.exe (PID: 5160)
    • Actions looks like stealing of personal data

      • RegSvcs.exe (PID: 1372)
      • RegSvcs.exe (PID: 7552)
    • REMCOS has been detected

      • rea.exe (PID: 1464)
      • iexplore.exe (PID: 3496)
      • iexplore.exe (PID: 3496)
      • remcos_a.exe (PID: 7108)
      • remcos.exe (PID: 7452)
      • iexplore.exe (PID: 7488)
      • remcos.exe (PID: 6036)
      • iexplore.exe (PID: 3632)
      • remcos.exe (PID: 2708)
      • iexplore.exe (PID: 5364)
    • Steals credentials from Web Browsers

      • RegSvcs.exe (PID: 1372)
      • RegSvcs.exe (PID: 7552)
    • REMCOS has been detected (YARA)

      • svchost.exe (PID: 5020)
      • svchost.exe (PID: 828)
      • svchost.exe (PID: 5496)
    • SNAKE has been detected (YARA)

      • RegSvcs.exe (PID: 1372)
    • Uses Task Scheduler to run other applications

      • XClient.exe (PID: 6112)
      • cmd.exe (PID: 7732)
      • dllhost.exe (PID: 3768)
      • cmd.exe (PID: 4296)
      • cmd.exe (PID: 2816)
      • cmd.exe (PID: 7464)
      • cmd.exe (PID: 6812)
      • cmd.exe (PID: 7216)
      • cmd.exe (PID: 7088)
      • dllhost.exe (PID: 3080)
      • cmd.exe (PID: 7276)
      • cmd.exe (PID: 6276)
      • Google Chrome.exe (PID: 6764)
      • dllhost.exe (PID: 5804)
      • cmd.exe (PID: 6236)
      • cmd.exe (PID: 7148)
      • Google Chrome.exe (PID: 5160)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 7228)
      • cscript.exe (PID: 7460)
    • Starts CMD.EXE for commands execution

      • iexplore.exe (PID: 7488)
      • iexplore.exe (PID: 3632)
      • iexplore.exe (PID: 5364)
    • AMADEY has been found (auto)

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
    • Deletes a file (SCRIPT)

      • wscript.exe (PID: 7228)
    • AMADEY mutex has been found

      • bek6xij8fOh9.duma (PID: 7848)
      • suker.exe (PID: 8060)
      • GYP8zJuTJUDA.salo (PID: 2068)
      • qvGWHyX8uJRB.salo (PID: 7420)
      • suker.exe (PID: 1884)
      • suker.exe (PID: 6712)
      • Wn0dqI3w.exe (PID: 6168)
      • Wn0dqI3w.exe (PID: 6380)
      • eOetdpblApFe.salo (PID: 7356)
      • suker.exe (PID: 7648)
      • Wn0dqI3w.exe (PID: 6240)
      • N3UzlGTdxyV4.salo (PID: 6336)
      • suker.exe (PID: 6600)
      • Wn0dqI3w.exe (PID: 7124)
    • Registers / Runs the DLL via REGSVR32.EXE

      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7072)
      • NetSignCNG-v3.0.3.0.tmp (PID: 7372)
    • Executing a file with an untrusted certificate

      • VCREDI~3.EXE (PID: 6240)
      • vcredist2005_x86.exe (PID: 4560)
      • mOctYvD.exe (PID: 6172)
      • client32.exe (PID: 7300)
      • PeerUnit.exe (PID: 7276)
      • OM8hqGX.exe (PID: 7940)
      • ylTujhk.exe (PID: 5248)
      • B0B34B3375B144C680A0456FFDD639A0.exe (PID: 5284)
      • mOctYvD.exe (PID: 1912)
      • client32.exe (PID: 6096)
      • client32.exe (PID: 7392)
    • HAVOC has been found (auto)

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
    • AMADEY has been detected (SURICATA)

      • suker.exe (PID: 8060)
      • suker.exe (PID: 7648)
      • suker.exe (PID: 6600)
    • Bypass User Account Control (Modify registry)

      • UpdateManager.exe (PID: 6972)
    • Bypass User Account Control (ComputerDefaults)

      • ComputerDefaults.exe (PID: 4888)
    • METERPRETER has been found (auto)

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
    • LUMMA has been found (auto)

      • suker.exe (PID: 8060)
      • suker.exe (PID: 8060)
    • Ammy mutex has been found

      • AA_v3.exe (PID: 3944)
    • Antivirus name has been found in the command line (generic signature)

      • findstr.exe (PID: 1604)
      • findstr.exe (PID: 4544)
    • NETSUPPORT mutex has been found

      • client32.exe (PID: 7300)
      • client32.exe (PID: 6096)
      • client32.exe (PID: 7392)
    • NETSUPPORT has been detected (SURICATA)

      • client32.exe (PID: 7300)
      • client32.exe (PID: 6096)
      • client32.exe (PID: 7392)
    • DBATLOADER has been found (auto)

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • test1.exe (PID: 5584)
      • Adobe.exe (PID: 7184)
      • Adobe.exe (PID: 6156)
      • Adobe.exe (PID: 1432)
    • MODILOADER mutex has been found

      • AdobeART.exe (PID: 3408)
      • AdobeART.exe (PID: 7180)
      • AdobeART.exe (PID: 7360)
      • AdobeART.exe (PID: 5632)
      • AdobeART.exe (PID: 7436)
      • AdobeART.exe (PID: 8068)
    • Creates or modifies Windows services

      • RDPWInst.exe (PID: 7776)
    • RDPWRAP has been detected

      • RDPWInst.exe (PID: 7776)
    • Changes the Windows auto-update feature

      • LGPO.exe (PID: 5052)
    • BABADEDA has been found (auto)

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 1564)
    • Accesses environment variables (SCRIPT)

      • cscript.exe (PID: 7460)
    • Gets TEMP folder path (SCRIPT)

      • cscript.exe (PID: 7460)
    • Sends HTTP request (SCRIPT)

      • cscript.exe (PID: 7460)
    • Creates internet connection object (SCRIPT)

      • cscript.exe (PID: 7460)
    • Opens an HTTP connection (SCRIPT)

      • cscript.exe (PID: 7460)
    • NetSupport is detected

      • client32.exe (PID: 6096)
      • client32.exe (PID: 7392)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • NOTallowedtocrypt.exe (PID: 1728)
      • XClient.exe (PID: 6112)
      • Opolis.exe (PID: 2108)
      • hydkj.exe (PID: 1264)
      • rardkj.exe (PID: 6256)
      • remcos_a.exe (PID: 7108)
      • CritScript.exe (PID: 7280)
      • bek6xij8fOh9.duma (PID: 7848)
      • svchost.exe (PID: 6344)
      • suker.exe (PID: 8060)
      • dllhost.exe (PID: 3768)
      • calendar.exe (PID: 6456)
      • LNCACSPSetup(1.0.9.5).exe (PID: 2092)
      • QuizPokemon.exe (PID: 1088)
      • a9RD5LI.exe (PID: 6752)
      • mOctYvD.exe (PID: 6172)
      • snd16061.exe (PID: 8032)
      • svchost.exe (PID: 4444)
      • rw6eMTC.exe (PID: 4560)
      • test1.exe (PID: 5584)
      • 90.exe (PID: 7900)
      • svchost.exe (PID: 6164)
      • Ganja128.exe (PID: 5900)
      • byogbftl.exe (PID: 7004)
      • svchost.exe (PID: 5484)
      • index.exe (PID: 7328)
      • svchost.exe (PID: 6704)
      • D9eSqeIz.exe (PID: 5940)
      • index.exe (PID: 6304)
      • D9eSqeIz.exe (PID: 5308)
      • IMG001.exe (PID: 7028)
      • svchost.exe (PID: 6948)
      • IMG001.exe (PID: 7328)
      • Unlocker.exe (PID: 2616)
      • Unlocker.exe (PID: 7452)
      • Unlocker.exe (PID: 6484)
      • svchost.exe (PID: 7444)
      • Unlocker.exe (PID: 4748)
      • Unlocker.exe (PID: 1180)
      • mOctYvD.exe (PID: 1912)
      • UpdateManager.exe (PID: 3668)
      • dllhost.exe (PID: 3080)
      • 76y5trfed675ytg.exe (PID: 3076)
      • byogbftl.exe (PID: 6396)
      • eOetdpblApFe.salo (PID: 7356)
      • index.exe (PID: 7880)
      • Google Chrome.exe (PID: 6764)
      • D9eSqeIz.exe (PID: 3736)
      • Unlocker.exe (PID: 5180)
      • Unlocker.exe (PID: 6116)
      • Unlocker.exe (PID: 8180)
      • UpdateManager.exe (PID: 3652)
      • dllhost.exe (PID: 5804)
      • 76y5trfed675ytg.exe (PID: 3660)
      • byogbftl.exe (PID: 5892)
      • N3UzlGTdxyV4.salo (PID: 6336)
      • index.exe (PID: 6788)
      • Google Chrome.exe (PID: 5160)
      • D9eSqeIz.exe (PID: 7132)
      • Unlocker.exe (PID: 7312)
      • Unlocker.exe (PID: 6848)
      • Unlocker.exe (PID: 7408)
    • Reads security settings of Internet Explorer

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • NOTallowedtocrypt.exe (PID: 1728)
      • ShellExperienceHost.exe (PID: 4588)
      • XClient.exe (PID: 6112)
      • Opolis.exe (PID: 2108)
      • hydkj.exe (PID: 1264)
      • rardkj.exe (PID: 6256)
      • IDriverT.exe (PID: 6744)
      • remcos_a.exe (PID: 7108)
      • CritScript.exe (PID: 7280)
      • bek6xij8fOh9.duma (PID: 7848)
      • suker.exe (PID: 8060)
      • Client1.exe (PID: 6416)
      • svchost.exe (PID: 6344)
      • dllhost.exe (PID: 3768)
      • calendar.exe (PID: 6456)
      • LNCACSPSetup(1.0.9.5).exe (PID: 2092)
      • AA_v3.exe (PID: 3944)
      • NetSignCNG.exe (PID: 3448)
      • NetSignCNG.exe (PID: 4788)
      • QuizPokemon.exe (PID: 1088)
      • a9RD5LI.exe (PID: 6752)
      • BCobalt.exe (PID: 4344)
      • mOctYvD.exe (PID: 6172)
      • snd16061.exe (PID: 8032)
      • client32.exe (PID: 7300)
      • svchost.exe (PID: 4444)
      • rw6eMTC.exe (PID: 4560)
      • test1.exe (PID: 5584)
      • 90.exe (PID: 7900)
      • c1.exe (PID: 7288)
      • svchost.exe (PID: 6164)
      • RDPWInst.exe (PID: 7776)
      • Ganja128.exe (PID: 5900)
      • byogbftl.exe (PID: 7004)
      • svchost.exe (PID: 5484)
      • index.exe (PID: 7328)
      • svchost.exe (PID: 6704)
      • D9eSqeIz.exe (PID: 5940)
      • index.exe (PID: 6304)
      • D9eSqeIz.exe (PID: 5308)
      • IMG001.exe (PID: 7028)
      • svchost.exe (PID: 6948)
      • IMG001.exe (PID: 7328)
      • Unlocker.exe (PID: 2616)
      • Unlocker.exe (PID: 7452)
      • Unlocker.exe (PID: 6484)
      • svchost.exe (PID: 7444)
      • Unlocker.exe (PID: 4748)
      • Unlocker.exe (PID: 1180)
      • mOctYvD.exe (PID: 1912)
      • NetSignCNG.exe (PID: 4196)
      • Client1.exe (PID: 3644)
      • UpdateManager.exe (PID: 3668)
      • dllhost.exe (PID: 3080)
      • 76y5trfed675ytg.exe (PID: 3076)
      • eOetdpblApFe.salo (PID: 7356)
      • suker.exe (PID: 7648)
      • index.exe (PID: 7880)
      • D9eSqeIz.exe (PID: 3736)
      • client32.exe (PID: 6096)
      • Google Chrome.exe (PID: 6764)
      • Unlocker.exe (PID: 5180)
      • Unlocker.exe (PID: 6116)
      • Unlocker.exe (PID: 8180)
      • Client1.exe (PID: 3628)
      • NetSignCNG.exe (PID: 4204)
      • dllhost.exe (PID: 5804)
      • UpdateManager.exe (PID: 3652)
      • 76y5trfed675ytg.exe (PID: 3660)
      • byogbftl.exe (PID: 5892)
      • N3UzlGTdxyV4.salo (PID: 6336)
      • suker.exe (PID: 6600)
      • index.exe (PID: 6788)
      • Google Chrome.exe (PID: 5160)
      • D9eSqeIz.exe (PID: 7132)
      • client32.exe (PID: 7392)
      • Unlocker.exe (PID: 6848)
      • Unlocker.exe (PID: 7312)
      • Unlocker.exe (PID: 7408)
    • Process requests binary or script from the Internet

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • Opolis.exe (PID: 2108)
      • suker.exe (PID: 8060)
      • calendar.exe (PID: 6456)
      • WEBDOWN.EXE (PID: 5504)
      • calendar.exe (PID: 7352)
      • jeditor.exe (PID: 6468)
      • cscript.exe (PID: 7460)
    • Connects to unusual port

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • imagelogger.exe (PID: 1164)
      • Application Frame Host.exe (PID: 5916)
      • RustDesk.exe (PID: 2740)
      • svchost.exe (PID: 5020)
      • svchost.exe (PID: 5496)
      • XClient.exe (PID: 6112)
      • Client1.exe (PID: 6416)
      • jusched.exe (PID: 8148)
      • Server1.exe (PID: 6228)
      • access.exe (PID: 4584)
      • client32.exe (PID: 7300)
      • System.exe (PID: 7992)
      • Adobe.exe (PID: 7184)
      • AdobeART.exe (PID: 3408)
      • svhost.exe (PID: 4636)
      • svhost.exe (PID: 6508)
      • svhost.exe (PID: 7460)
      • jusched.exe (PID: 3568)
      • Client1.exe (PID: 3644)
      • svhost.exe (PID: 3600)
      • svchsot.exe (PID: 2384)
      • svchost.exe (PID: 5876)
      • Adobe.exe (PID: 6156)
      • Application Frame Host.exe (PID: 6488)
      • svchost.exe (PID: 6664)
      • svhost.exe (PID: 7512)
      • client32.exe (PID: 6096)
      • AdobeART.exe (PID: 7360)
      • svhost.exe (PID: 3552)
      • jusched.exe (PID: 3544)
      • Client1.exe (PID: 3628)
      • svchsot.exe (PID: 2560)
      • svchost.exe (PID: 5792)
      • Adobe.exe (PID: 1432)
      • Application Frame Host.exe (PID: 3044)
      • AdobeART.exe (PID: 5632)
      • svchost.exe (PID: 5280)
      • svhost.exe (PID: 6492)
      • client32.exe (PID: 7392)
    • Executable content was dropped or overwritten

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • imagelogger.exe (PID: 1164)
      • TiWorker.exe (PID: 5468)
      • Client-built.exe (PID: 4796)
      • RustDesk.exe (PID: 2740)
      • NOTallowedtocrypt.exe (PID: 1728)
      • Opolis.exe (PID: 2108)
      • hydkj.exe (PID: 1264)
      • XClient.exe (PID: 6112)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7072)
      • HDDrive1095_XinAnPlug3030_20230619_inno.exe (PID: 7052)
      • remcos_a.exe (PID: 7108)
      • CritScript.exe (PID: 7280)
      • random.exe (PID: 7604)
      • bek6xij8fOh9.duma (PID: 7848)
      • JUSCHED.EXE (PID: 7352)
      • vcredist2005_x86.exe (PID: 4560)
      • VCREDI~3.EXE (PID: 6240)
      • Sentil.exe (PID: 548)
      • svchost.exe (PID: 6344)
      • suker.exe (PID: 8060)
      • dllhost.exe (PID: 3768)
      • random1.exe (PID: 4788)
      • calendar.exe (PID: 6456)
      • random1.exe (PID: 7112)
      • LNCACSPSetup(1.0.9.5).exe (PID: 2092)
      • drvinst.exe (PID: 8044)
      • WEBDOWN.EXE (PID: 5504)
      • NetSignCNG-v3.0.3.0.exe (PID: 7376)
      • NetSignCNG-v3.0.3.0.tmp (PID: 7372)
      • AA_v3.exe (PID: 3944)
      • a9RD5LI.exe (PID: 6752)
      • cmd.exe (PID: 1392)
      • Shopzilla.pif (PID: 7844)
      • snd16061.exe (PID: 8032)
      • example_win32_dx11.exe (PID: 5484)
      • System.exe (PID: 5868)
      • rw6eMTC.exe (PID: 4560)
      • test1.exe (PID: 5584)
      • Adobe.exe (PID: 7184)
      • 90.exe (PID: 7900)
      • AdobeART.exe (PID: 3408)
      • OM8hqGX.exe (PID: 7940)
      • svhost.exe (PID: 6288)
      • RDPW_Installer.exe (PID: 4132)
      • xcopy.exe (PID: 6256)
      • xcopy.exe (PID: 7828)
      • RDPWInst.exe (PID: 7776)
      • Ganja128.exe (PID: 5900)
      • Jade.com (PID: 4844)
      • byogbftl.exe (PID: 7004)
      • iload.exe (PID: 3280)
      • index.exe (PID: 7328)
      • D9eSqeIz.exe (PID: 5940)
      • RXSpnWwM.exe (PID: 7232)
      • RXSpnWwM.exe (PID: 1212)
      • IMG001.exe (PID: 7028)
      • 7z.exe (PID: 2836)
      • Unlocker.exe (PID: 7452)
      • Unlocker.exe (PID: 4748)
      • Unlocker.exe (PID: 1180)
      • IMG001.exe (PID: 7328)
      • Jade.com (PID: 8092)
      • UpdateManager.exe (PID: 3668)
      • Adobe.exe (PID: 6156)
      • dllhost.exe (PID: 3080)
      • random1.exe (PID: 7216)
      • RXSpnWwM.exe (PID: 8140)
      • 7z.exe (PID: 3476)
      • Unlocker.exe (PID: 6116)
      • Unlocker.exe (PID: 8180)
      • UpdateManager.exe (PID: 3652)
      • Adobe.exe (PID: 1432)
      • dllhost.exe (PID: 5804)
      • random1.exe (PID: 6192)
      • RXSpnWwM.exe (PID: 7016)
      • 7z.exe (PID: 6756)
      • Unlocker.exe (PID: 7312)
      • Unlocker.exe (PID: 7408)
    • Connects to the server without a host name

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • suker.exe (PID: 8060)
      • client32.exe (PID: 7300)
      • suker.exe (PID: 7648)
      • client32.exe (PID: 6096)
      • suker.exe (PID: 6600)
      • client32.exe (PID: 7392)
    • Potential Corporate Privacy Violation

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • suker.exe (PID: 8060)
      • calendar.exe (PID: 6456)
      • WEBDOWN.EXE (PID: 5504)
      • svchost.exe (PID: 1564)
      • AA_v3.exe (PID: 3944)
      • client32.exe (PID: 7300)
      • calendar.exe (PID: 7352)
      • jeditor.exe (PID: 6468)
      • client32.exe (PID: 6096)
      • svchost.exe (PID: 1752)
      • svchost.exe (PID: 1568)
      • client32.exe (PID: 7392)
    • Checks for external IP

      • imagelogger.exe (PID: 1164)
      • svchost.exe (PID: 1564)
      • RegSvcs.exe (PID: 1372)
      • dllhost.exe (PID: 3768)
      • AA_v3.exe (PID: 3944)
      • RegSvcs.exe (PID: 7552)
      • svchost.exe (PID: 1752)
      • dllhost.exe (PID: 3080)
      • dllhost.exe (PID: 5804)
      • svchost.exe (PID: 1568)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
    • Uses RUNDLL32.EXE to load library

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • AA_v3.exe (PID: 3944)
    • Executes as Windows Service

      • VSSVC.exe (PID: 2528)
      • IDriverT.exe (PID: 6744)
      • GP_CLT_LNCA_Service.exe (PID: 7768)
      • AA_v3.exe (PID: 6256)
      • NetSignCNGGuardService.exe (PID: 8188)
    • Found regular expressions for crypto-addresses (YARA)

      • imagelogger.exe (PID: 1164)
    • Process drops legitimate windows executable

      • TiWorker.exe (PID: 5468)
      • hydkj.exe (PID: 1264)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7072)
      • vcredist2005_x86.exe (PID: 4560)
      • msiexec.exe (PID: 6520)
      • NetSignCNG-v3.0.3.0.tmp (PID: 7372)
      • snd16061.exe (PID: 8032)
      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • rw6eMTC.exe (PID: 4560)
      • RDPW_Installer.exe (PID: 4132)
      • RDPWInst.exe (PID: 7776)
    • The process creates files with name similar to system file names

      • TiWorker.exe (PID: 5468)
      • Client-built.exe (PID: 4796)
      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • svchost.exe (PID: 6344)
      • example_win32_dx11.exe (PID: 5484)
      • System.exe (PID: 5868)
      • svhost.exe (PID: 6288)
      • D9eSqeIz.exe (PID: 5940)
    • Creates file in the systems drive root

      • ntvdm.exe (PID: 3280)
    • Searches for installed software

      • TiWorker.exe (PID: 5468)
      • IDriver.exe (PID: 6796)
    • Starts itself from another location

      • Client-built.exe (PID: 4796)
      • NOTallowedtocrypt.exe (PID: 1728)
      • bek6xij8fOh9.duma (PID: 7848)
      • JUSCHED.EXE (PID: 7352)
      • Sentil.exe (PID: 548)
      • example_win32_dx11.exe (PID: 5484)
      • System.exe (PID: 5868)
      • test1.exe (PID: 5584)
      • 90.exe (PID: 7900)
      • svhost.exe (PID: 6288)
      • Ganja128.exe (PID: 5900)
      • byogbftl.exe (PID: 7004)
      • IMG001.exe (PID: 7028)
      • byogbftl.exe (PID: 6396)
      • eOetdpblApFe.salo (PID: 7356)
      • byogbftl.exe (PID: 5892)
      • N3UzlGTdxyV4.salo (PID: 6336)
    • Contacting a server suspected of hosting an Exploit Kit

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
    • Starts CMD.EXE for commands execution

      • NOTallowedtocrypt.exe (PID: 1728)
      • 76y5trfed675ytg.exe (PID: 4884)
      • svchost.exe (PID: 5020)
      • 76y5trfed675ytg.exe (PID: 2108)
      • svchost.exe (PID: 5496)
      • remcos_a.exe (PID: 7108)
      • wscript.exe (PID: 7228)
      • remcos.exe (PID: 7452)
      • random.exe (PID: 7604)
      • svchost.exe (PID: 6344)
      • UpdateManager.exe (PID: 6972)
      • UpdateManager.exe (PID: 5708)
      • random1.exe (PID: 4788)
      • random1.exe (PID: 7112)
      • QuizPokemon.exe (PID: 1088)
      • cmd.exe (PID: 1392)
      • mOctYvD.exe (PID: 6172)
      • svchost.exe (PID: 4444)
      • svchost.exe (PID: 6164)
      • ns6B4A.tmp (PID: 6336)
      • RDPW_Installer.exe (PID: 4132)
      • cmd.exe (PID: 7464)
      • svchost.exe (PID: 5484)
      • svchost.exe (PID: 6704)
      • OGAFRlqR.exe (PID: 8164)
      • D9eSqeIz.exe (PID: 5940)
      • OGAFRlqR.exe (PID: 7152)
      • D9eSqeIz.exe (PID: 5308)
      • IMG001.exe (PID: 7028)
      • svchost.exe (PID: 6948)
      • cscript.exe (PID: 7460)
      • cmd.exe (PID: 7116)
      • IMG001.exe (PID: 7328)
      • cmd.exe (PID: 6264)
      • Unlocker.exe (PID: 2616)
      • Unlocker.exe (PID: 6484)
      • Unlocker.exe (PID: 7452)
      • svchost.exe (PID: 7444)
      • Unlocker.exe (PID: 4748)
      • Unlocker.exe (PID: 1180)
      • mOctYvD.exe (PID: 1912)
      • UpdateManager.exe (PID: 3668)
      • remcos.exe (PID: 6036)
      • 76y5trfed675ytg.exe (PID: 5844)
      • svchost.exe (PID: 5876)
      • 76y5trfed675ytg.exe (PID: 6628)
      • svchost.exe (PID: 6664)
      • random1.exe (PID: 7216)
      • OGAFRlqR.exe (PID: 7932)
      • D9eSqeIz.exe (PID: 3736)
      • cmd.exe (PID: 6476)
      • Unlocker.exe (PID: 6116)
      • Unlocker.exe (PID: 5180)
      • Unlocker.exe (PID: 8180)
      • UpdateManager.exe (PID: 3652)
      • remcos.exe (PID: 2708)
      • 76y5trfed675ytg.exe (PID: 5748)
      • svchost.exe (PID: 5792)
      • 76y5trfed675ytg.exe (PID: 5604)
      • svchost.exe (PID: 5280)
      • random1.exe (PID: 6192)
      • OGAFRlqR.exe (PID: 6856)
      • D9eSqeIz.exe (PID: 7132)
      • cmd.exe (PID: 7352)
      • Unlocker.exe (PID: 6848)
      • Unlocker.exe (PID: 7312)
      • Unlocker.exe (PID: 7408)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 5300)
      • cmd.exe (PID: 2572)
      • cmd.exe (PID: 3120)
      • cmd.exe (PID: 4156)
      • cmd.exe (PID: 5660)
      • cmd.exe (PID: 7128)
      • cmd.exe (PID: 7480)
      • cmd.exe (PID: 7536)
      • cmd.exe (PID: 7116)
      • cmd.exe (PID: 6264)
      • cmd.exe (PID: 4416)
      • cmd.exe (PID: 5308)
      • cmd.exe (PID: 1940)
      • cmd.exe (PID: 5892)
      • cmd.exe (PID: 6704)
      • cmd.exe (PID: 6648)
      • cmd.exe (PID: 6476)
      • cmd.exe (PID: 5300)
      • cmd.exe (PID: 5392)
      • cmd.exe (PID: 1932)
      • cmd.exe (PID: 4904)
      • cmd.exe (PID: 5592)
      • cmd.exe (PID: 3144)
      • cmd.exe (PID: 7352)
    • Application launched itself

      • svchost.exe (PID: 5020)
      • msiexec.exe (PID: 6520)
      • dllhost.exe (PID: 1140)
      • dllhosts.exe (PID: 1592)
      • AA_v3.exe (PID: 6256)
      • dllhosts.exe (PID: 6864)
      • cmd.exe (PID: 1392)
      • 90.exe (PID: 3208)
      • AdobeART.exe (PID: 7584)
      • AdobeART.exe (PID: 4348)
      • cmd.exe (PID: 7464)
      • dllhosts.exe (PID: 8100)
      • cmd.exe (PID: 7116)
      • cmd.exe (PID: 6264)
      • Jade.com (PID: 4844)
      • updater.exe (PID: 3584)
      • dllhost.exe (PID: 3744)
      • 76y5trfed675ytg.exe (PID: 3076)
      • AdobeART.exe (PID: 6244)
      • dllhosts.exe (PID: 7120)
      • cmd.exe (PID: 6476)
      • AdobeART.exe (PID: 7836)
      • MindTechPro360.pif (PID: 3964)
      • updater.exe (PID: 3576)
      • dllhost.exe (PID: 5772)
      • 76y5trfed675ytg.exe (PID: 3660)
      • AdobeART.exe (PID: 5756)
      • dllhosts.exe (PID: 5596)
      • AdobeART.exe (PID: 6116)
      • cmd.exe (PID: 7352)
      • AdobeART.exe (PID: 6760)
    • Contacting a server suspected of hosting an CnC

      • RustDesk.exe (PID: 2740)
      • suker.exe (PID: 8060)
      • client32.exe (PID: 7300)
      • svchost.exe (PID: 1564)
      • svchsot.exe (PID: 2384)
      • suker.exe (PID: 7648)
      • client32.exe (PID: 6096)
      • svchsot.exe (PID: 2560)
      • suker.exe (PID: 6600)
      • client32.exe (PID: 7392)
    • There is functionality for taking screenshot (YARA)

      • Application Frame Host.exe (PID: 5916)
      • RustDesk.exe (PID: 2740)
      • svchost.exe (PID: 5020)
      • svchost.exe (PID: 828)
      • svchost.exe (PID: 5496)
      • setup.exe (PID: 6308)
      • OSM-Client.exe (PID: 908)
      • IDriver.exe (PID: 6796)
    • Starts POWERSHELL.EXE for commands execution

      • XClient.exe (PID: 6112)
      • random.exe (PID: 7604)
      • cmd.exe (PID: 6204)
      • cmd.exe (PID: 2864)
      • dllhost.exe (PID: 3768)
      • random1.exe (PID: 4788)
      • random1.exe (PID: 7112)
      • cmd.exe (PID: 2888)
      • cmd.exe (PID: 8092)
      • cmd.exe (PID: 2348)
      • dllhost.exe (PID: 3080)
      • random1.exe (PID: 7216)
      • Google Chrome.exe (PID: 6764)
      • cmd.exe (PID: 6292)
      • cmd.exe (PID: 3408)
      • dllhost.exe (PID: 5804)
      • random1.exe (PID: 6192)
      • Google Chrome.exe (PID: 5160)
      • cmd.exe (PID: 7304)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • RegSvcs.exe (PID: 1372)
      • dllhost.exe (PID: 3768)
      • RegSvcs.exe (PID: 7552)
      • dllhost.exe (PID: 3080)
      • dllhost.exe (PID: 5804)
    • Script adds exclusion path to Windows Defender

      • XClient.exe (PID: 6112)
      • cmd.exe (PID: 6204)
      • cmd.exe (PID: 2864)
      • dllhost.exe (PID: 3768)
      • cmd.exe (PID: 2348)
      • dllhost.exe (PID: 3080)
      • Google Chrome.exe (PID: 6764)
      • cmd.exe (PID: 3408)
      • dllhost.exe (PID: 5804)
      • Google Chrome.exe (PID: 5160)
    • Script adds exclusion process to Windows Defender

      • XClient.exe (PID: 6112)
      • dllhost.exe (PID: 3768)
      • dllhost.exe (PID: 3080)
      • Google Chrome.exe (PID: 6764)
      • dllhost.exe (PID: 5804)
      • Google Chrome.exe (PID: 5160)
    • Loads DLL from Mozilla Firefox

      • RegSvcs.exe (PID: 1372)
      • RegSvcs.exe (PID: 7552)
    • There is functionality for enable RDP (YARA)

      • RustDesk.exe (PID: 2740)
    • Connects to SMTP port

      • RegSvcs.exe (PID: 1372)
      • RegSvcs.exe (PID: 7552)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 6520)
      • IDriver.exe (PID: 6796)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7072)
      • NetSignCNG-v3.0.3.0.tmp (PID: 7372)
    • Adds/modifies Windows certificates

      • msiexec.exe (PID: 6520)
      • LNCACSPSetup(1.0.9.5).exe (PID: 2092)
      • InstallRootCertNew.exe (PID: 4332)
      • InstallRootCert.exe (PID: 6992)
    • Creates/Modifies COM task schedule object

      • msiexec.exe (PID: 6520)
      • regsvr32.exe (PID: 872)
      • regsvr32.exe (PID: 1860)
      • regsvr32.exe (PID: 6180)
      • regsvr32.exe (PID: 4432)
    • Write to the desktop.ini file (may be used to cloak folders)

      • IDriverT.exe (PID: 6744)
    • There is functionality for communication over UDP network (YARA)

      • OSM-Client.exe (PID: 908)
    • Block-list domains

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 7228)
    • The process executes VB scripts

      • remcos_a.exe (PID: 7108)
    • The process drops C-runtime libraries

      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7072)
      • msiexec.exe (PID: 6520)
      • NetSignCNG-v3.0.3.0.tmp (PID: 7372)
      • snd16061.exe (PID: 8032)
      • rw6eMTC.exe (PID: 4560)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 7228)
      • wscript.exe (PID: 6188)
      • cscript.exe (PID: 7460)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 7228)
      • wscript.exe (PID: 6188)
    • The executable file from the user directory is run by the CMD process

      • bek6xij8fOh9.duma (PID: 7848)
      • Shopzilla.pif (PID: 7844)
      • Grid.com (PID: 7472)
      • svchost.exe (PID: 6164)
      • RDPWInst.exe (PID: 408)
      • LGPO.exe (PID: 5052)
      • Jade.com (PID: 4844)
      • svchost.exe (PID: 5484)
      • svchost.exe (PID: 6704)
      • svchost.exe (PID: 6948)
      • Unlocker.exe (PID: 2616)
      • 7z.exe (PID: 2836)
      • svchost.exe (PID: 7444)
      • 7z.exe (PID: 6676)
      • Unlocker.exe (PID: 7900)
      • Unlocker.exe (PID: 7452)
      • Unlocker.exe (PID: 6484)
      • Unlocker.exe (PID: 1604)
      • Unlocker.exe (PID: 7604)
      • Unlocker.exe (PID: 1344)
      • Unlocker.exe (PID: 4748)
      • Unlocker.exe (PID: 1180)
      • Unlocker.exe (PID: 548)
      • Unlocker.exe (PID: 7236)
      • Unlocker.exe (PID: 7040)
      • 7z.exe (PID: 3476)
      • Unlocker.exe (PID: 5180)
      • Unlocker.exe (PID: 6116)
      • Unlocker.exe (PID: 8180)
      • 7z.exe (PID: 6756)
      • Unlocker.exe (PID: 6848)
      • Unlocker.exe (PID: 7312)
      • Unlocker.exe (PID: 7408)
    • Starts application with an unusual extension

      • cmd.exe (PID: 7720)
      • cmd.exe (PID: 3084)
      • cmd.exe (PID: 440)
      • cmd.exe (PID: 1392)
      • cmd.exe (PID: 6180)
      • cmd.exe (PID: 7896)
      • cmd.exe (PID: 352)
      • OM8hqGX.exe (PID: 7940)
      • cmd.exe (PID: 2068)
      • cmd.exe (PID: 6396)
      • cmd.exe (PID: 7448)
      • cmd.exe (PID: 6264)
      • cmd.exe (PID: 7116)
      • cmd.exe (PID: 1212)
      • Jade.com (PID: 4844)
      • cmd.exe (PID: 6448)
      • wscript.exe (PID: 3628)
      • cmd.exe (PID: 7256)
      • cmd.exe (PID: 6476)
      • MindTechPro360.pif (PID: 3964)
      • wscript.exe (PID: 3600)
      • cmd.exe (PID: 6228)
      • cmd.exe (PID: 7352)
    • The process bypasses the loading of PowerShell profile settings

      • random.exe (PID: 7604)
      • random1.exe (PID: 4788)
      • random1.exe (PID: 7112)
      • cmd.exe (PID: 2888)
      • cmd.exe (PID: 8092)
      • random1.exe (PID: 7216)
      • cmd.exe (PID: 6292)
      • random1.exe (PID: 6192)
      • cmd.exe (PID: 7304)
    • Starts a Microsoft application from unusual location

      • VCREDI~3.EXE (PID: 6240)
      • LGPO.exe (PID: 5052)
    • Changes default file association

      • UpdateManager.exe (PID: 6972)
    • Executes application which crashes

      • UpdateManager.exe (PID: 5708)
      • popapoers.exe (PID: 6632)
      • PeerUnit.exe (PID: 7276)
      • calc.exe (PID: 3988)
      • AdobeART.exe (PID: 7012)
      • calc.exe (PID: 7608)
      • calc.exe (PID: 1304)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • Server1.exe (PID: 6228)
      • RDPWInst.exe (PID: 7776)
    • Drops a system driver (possible attempt to evade defenses)

      • LNCACSPSetup(1.0.9.5).exe (PID: 2092)
      • drvinst.exe (PID: 8044)
      • iload.exe (PID: 3280)
      • Unlocker.exe (PID: 7452)
      • Unlocker.exe (PID: 4748)
      • Unlocker.exe (PID: 1180)
      • Unlocker.exe (PID: 6116)
      • Unlocker.exe (PID: 8180)
      • Unlocker.exe (PID: 7312)
      • Unlocker.exe (PID: 7408)
    • Creates files in the driver directory

      • drvinst.exe (PID: 8044)
      • iload.exe (PID: 3280)
    • Creates a software uninstall entry

      • LNCACSPSetup(1.0.9.5).exe (PID: 2092)
    • Starts SC.EXE for service management

      • NetSignCNG-v3.0.3.0.tmp (PID: 7372)
      • cmd.exe (PID: 6948)
      • cmd.exe (PID: 1460)
      • cmd.exe (PID: 7448)
      • cmd.exe (PID: 6316)
      • cmd.exe (PID: 548)
      • cmd.exe (PID: 7216)
      • cmd.exe (PID: 900)
      • cmd.exe (PID: 5628)
      • cmd.exe (PID: 4476)
      • cmd.exe (PID: 4472)
      • cmd.exe (PID: 3740)
      • cmd.exe (PID: 7024)
      • cmd.exe (PID: 7532)
      • cmd.exe (PID: 2724)
      • cmd.exe (PID: 6276)
    • The process executes via Task Scheduler

      • suker.exe (PID: 1884)
      • dllhosts.exe (PID: 6864)
      • suker.exe (PID: 6712)
      • dllhosts.exe (PID: 8100)
      • gpscript.exe (PID: 3620)
      • sihost.exe (PID: 7964)
      • sihost.exe (PID: 4720)
      • PLUGScheduler.exe (PID: 3592)
      • sihost.exe (PID: 3464)
      • updater.exe (PID: 3584)
      • jusched.exe (PID: 3568)
      • wscript.exe (PID: 3628)
      • Client1.exe (PID: 3644)
      • UpdateManager.exe (PID: 3668)
      • svhost.exe (PID: 3600)
      • sihost.exe (PID: 7204)
      • sihost.exe (PID: 3436)
      • jusched.exe (PID: 3544)
      • PLUGScheduler.exe (PID: 3532)
      • wscript.exe (PID: 3600)
      • svhost.exe (PID: 3552)
      • updater.exe (PID: 3576)
      • UpdateManager.exe (PID: 3652)
      • Client1.exe (PID: 3628)
      • sihost.exe (PID: 6788)
    • Windows service management via SC.EXE

      • sc.exe (PID: 4644)
      • sc.exe (PID: 7448)
      • sc.exe (PID: 4252)
      • sc.exe (PID: 6436)
      • sc.exe (PID: 8112)
      • sc.exe (PID: 6088)
      • sc.exe (PID: 1132)
      • sc.exe (PID: 6568)
      • sc.exe (PID: 4484)
      • sc.exe (PID: 7368)
      • sc.exe (PID: 4876)
      • sc.exe (PID: 7092)
      • sc.exe (PID: 6988)
      • sc.exe (PID: 2884)
      • sc.exe (PID: 2608)
      • sc.exe (PID: 6340)
    • Executing commands from ".cmd" file

      • QuizPokemon.exe (PID: 1088)
      • mOctYvD.exe (PID: 6172)
      • ns6B4A.tmp (PID: 6336)
      • mOctYvD.exe (PID: 1912)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 1392)
      • cmd.exe (PID: 7896)
      • cmd.exe (PID: 2068)
      • cmd.exe (PID: 6264)
      • cmd.exe (PID: 7116)
      • cmd.exe (PID: 6476)
      • cmd.exe (PID: 7352)
    • Get information on the list of running processes

      • cmd.exe (PID: 1392)
      • cmd.exe (PID: 7896)
      • cmd.exe (PID: 2068)
      • cmd.exe (PID: 7116)
      • cmd.exe (PID: 6676)
      • cmd.exe (PID: 6264)
      • cmd.exe (PID: 7652)
      • cmd.exe (PID: 6476)
      • cmd.exe (PID: 7220)
      • cmd.exe (PID: 7352)
      • cmd.exe (PID: 8024)
    • Suspicious file concatenation

      • cmd.exe (PID: 7948)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 1392)
      • cmd.exe (PID: 7896)
      • cmd.exe (PID: 2068)
      • Jade.com (PID: 4844)
      • wscript.exe (PID: 3628)
      • MindTechPro360.pif (PID: 3964)
      • wscript.exe (PID: 3600)
    • Drops a file with a rarely used extension (PIF)

      • cmd.exe (PID: 1392)
      • Shopzilla.pif (PID: 7844)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 1392)
      • cmd.exe (PID: 6264)
      • cmd.exe (PID: 7116)
      • cmd.exe (PID: 6476)
      • cmd.exe (PID: 7352)
    • Drop NetSupport executable file

      • snd16061.exe (PID: 8032)
    • Executing commands from a ".bat" file

      • svchost.exe (PID: 4444)
      • svchost.exe (PID: 6164)
      • RDPW_Installer.exe (PID: 4132)
      • svchost.exe (PID: 5484)
      • svchost.exe (PID: 6704)
      • D9eSqeIz.exe (PID: 5940)
      • D9eSqeIz.exe (PID: 5308)
      • svchost.exe (PID: 6948)
      • svchost.exe (PID: 7444)
      • D9eSqeIz.exe (PID: 3736)
      • D9eSqeIz.exe (PID: 7132)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 6180)
      • cmd.exe (PID: 352)
      • cmd.exe (PID: 7464)
      • cmd.exe (PID: 2068)
      • cmd.exe (PID: 6396)
      • cmd.exe (PID: 7448)
      • cmd.exe (PID: 1212)
      • cmd.exe (PID: 6448)
    • Loads Python modules

      • PeerUnit.exe (PID: 7276)
    • Process copies executable file

      • cmd.exe (PID: 7464)
    • Changes settings of the software policy

      • LGPO.exe (PID: 5052)
    • Reads the BIOS version

      • ylTujhk.exe (PID: 5248)
    • Drops 7-zip archiver for unpacking

      • index.exe (PID: 7328)
      • D9eSqeIz.exe (PID: 5940)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 7208)
      • cmd.exe (PID: 4348)
      • cmd.exe (PID: 7028)
      • cmd.exe (PID: 6940)
      • cmd.exe (PID: 408)
      • cmd.exe (PID: 4752)
      • cmd.exe (PID: 7340)
      • cmd.exe (PID: 5084)
      • cmd.exe (PID: 6916)
      • cmd.exe (PID: 7736)
    • Working with threads in the GNU C Compiler (GCC) libraries related mutex has been found

      • tftp.exe (PID: 4344)
      • tftp.exe (PID: 7912)
      • Jade.com (PID: 8092)
    • Reads data from a binary Stream object (SCRIPT)

      • cscript.exe (PID: 7460)
    • Creates or modifies Windows services

      • Unlocker.exe (PID: 7452)
      • Unlocker.exe (PID: 4748)
      • Unlocker.exe (PID: 6116)
      • Unlocker.exe (PID: 7312)
    • Stops a currently running service

      • sc.exe (PID: 7828)
      • sc.exe (PID: 6092)
      • sc.exe (PID: 8168)
      • sc.exe (PID: 4280)
    • The process verifies whether the antivirus software is installed

      • Unlocker.exe (PID: 1180)
      • Unlocker.exe (PID: 8180)
      • Unlocker.exe (PID: 7408)
  • INFO

    • Reads the computer name

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • imagelogger.exe (PID: 1164)
      • Client-built.exe (PID: 4796)
      • Application Frame Host.exe (PID: 5104)
      • RustDesk.exe (PID: 2740)
      • Application Frame Host.exe (PID: 4156)
      • Application Frame Host.exe (PID: 5916)
      • XClient.exe (PID: 6112)
      • NOTallowedtocrypt.exe (PID: 1728)
      • ShellExperienceHost.exe (PID: 4588)
      • 76y5trfed675ytg.exe (PID: 640)
      • RegSvcs.exe (PID: 1372)
      • Opolis.exe (PID: 2108)
      • hydkj.exe (PID: 1264)
      • OSM-Client.exe (PID: 908)
      • rardkj.exe (PID: 6256)
      • setup.exe (PID: 6308)
      • msiexec.exe (PID: 6520)
      • msiexec.exe (PID: 6696)
      • IDriverT.exe (PID: 6744)
      • Google Chrome.exe (PID: 6616)
      • IDriver.exe (PID: 6796)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7072)
      • remcos_a.exe (PID: 7108)
      • CritScript.exe (PID: 7280)
      • JUSCHED.EXE (PID: 7352)
      • random.exe (PID: 7604)
      • bek6xij8fOh9.duma (PID: 7848)
      • suker.exe (PID: 8060)
      • jusched.exe (PID: 8148)
      • Sentil.exe (PID: 548)
      • vcredist2005_x86.exe (PID: 4560)
      • jusched.exe (PID: 6160)
      • VCREDI~3.EXE (PID: 6240)
      • svchost.exe (PID: 6344)
      • Client1.exe (PID: 6416)
      • Client1.exe (PID: 4128)
      • msiexec.exe (PID: 3104)
      • UpdateManager.exe (PID: 6972)
      • dllhost.exe (PID: 1140)
      • dllhost.exe (PID: 3768)
      • UpdateManager.exe (PID: 5708)
      • calendar.exe (PID: 6456)
      • Server1.exe (PID: 6228)
      • dllhosts.exe (PID: 3988)
      • random1.exe (PID: 4788)
      • dllhosts.exe (PID: 1592)
      • WxWorkMultiOpen.exe (PID: 6424)
      • random1.exe (PID: 7112)
      • WEBDOWN.EXE (PID: 5504)
      • LNCACSPSetup(1.0.9.5).exe (PID: 2092)
      • drvinst.exe (PID: 8044)
      • GP_CLT_LNCA_Service.exe (PID: 7812)
      • GP_CLT_LNCA_Service.exe (PID: 7768)
      • NetSignCNG-v3.0.3.0.tmp (PID: 7372)
      • calendar.exe (PID: 7352)
      • GP_CLT_LNCA.exe (PID: 8076)
      • InstallRootCertNew.exe (PID: 4332)
      • InstallRootCert.exe (PID: 6992)
      • AA_v3.exe (PID: 6256)
      • NetSignCNGGuardService.exe (PID: 8188)
      • AA_v3.exe (PID: 3944)
      • NetSignCNGGuardService.exe (PID: 1288)
      • AA_v3.exe (PID: 6536)
      • dllhosts.exe (PID: 6876)
      • dllhosts.exe (PID: 6864)
      • NetSignCNG.exe (PID: 3448)
      • NetSignCNG.exe (PID: 4788)
      • keygen.exe (PID: 6472)
      • QuizPokemon.exe (PID: 1088)
      • a9RD5LI.exe (PID: 6752)
      • BCobalt.exe (PID: 4344)
      • Shopzilla.pif (PID: 7844)
      • SharpHound.exe (PID: 7428)
      • example_win32_dx11.exe (PID: 5484)
      • mOctYvD.exe (PID: 6172)
      • svchost.exe (PID: 4444)
      • snd16061.exe (PID: 8032)
      • client32.exe (PID: 7300)
      • mimikatz.exe (PID: 6972)
      • System.exe (PID: 5868)
      • popapoers.exe (PID: 6632)
      • System.exe (PID: 7992)
      • rw6eMTC.exe (PID: 4560)
      • 90.exe (PID: 3208)
      • extrac32.exe (PID: 3224)
      • test1.exe (PID: 5584)
      • PeerUnit.exe (PID: 7276)
      • Adobe.exe (PID: 7184)
      • Grid.com (PID: 7472)
      • 90.exe (PID: 7900)
      • c1.exe (PID: 7288)
      • AdobeART.exe (PID: 7584)
      • svchost.exe (PID: 6164)
      • AdobeART.exe (PID: 3408)
      • svhost.exe (PID: 6288)
      • OM8hqGX.exe (PID: 7940)
      • svhost.exe (PID: 4636)
      • svhost.exe (PID: 5468)
      • AdobeART.exe (PID: 4348)
      • svhost.exe (PID: 6508)
      • RegSvcs.exe (PID: 7552)
      • RDPWInst.exe (PID: 7776)
      • Ganja128.exe (PID: 5900)
      • extrac32.exe (PID: 7764)
      • inetinfo.exe (PID: 7888)
      • svhost.exe (PID: 7460)
      • byogbftl.exe (PID: 7004)
      • LGPO.exe (PID: 5052)
      • Jade.com (PID: 4844)
      • RDP_CnC.exe (PID: 3004)
      • svchost.exe (PID: 5484)
      • nzdbqjy.exe (PID: 3056)
      • byogbftl.exe (PID: 6620)
      • dllhosts.exe (PID: 8100)
      • iload.exe (PID: 3280)
      • jeditor.exe (PID: 6468)
      • svchost.exe (PID: 6704)
      • dllhosts.exe (PID: 7800)
      • index.exe (PID: 7328)
      • D9eSqeIz.exe (PID: 5940)
      • RXSpnWwM.exe (PID: 7232)
      • index.exe (PID: 6304)
      • D9eSqeIz.exe (PID: 5308)
      • RXSpnWwM.exe (PID: 1212)
      • IMG001.exe (PID: 7028)
      • svchost.exe (PID: 6948)
      • IMG001.exe (PID: 7328)
      • 7z.exe (PID: 2836)
      • Unlocker.exe (PID: 2616)
      • Unlocker.exe (PID: 7452)
      • 7z.exe (PID: 6676)
      • svchost.exe (PID: 7444)
      • Unlocker.exe (PID: 6484)
      • random2.exe (PID: 7196)
      • Unlocker.exe (PID: 4748)
      • Unlocker.exe (PID: 1180)
      • Jade.com (PID: 8092)
      • random2.exe (PID: 6336)
      • mOctYvD.exe (PID: 1912)
      • IObitUnlocker.exe (PID: 5844)
      • Unlocker.exe (PID: 7040)
      • NetSignCNG.exe (PID: 4196)
      • dllhost.exe (PID: 3080)
      • dllhost.exe (PID: 3744)
      • 76y5trfed675ytg.exe (PID: 3076)
      • svchsot.exe (PID: 2384)
      • GP_CLT_LNCA.exe (PID: 5968)
      • AdobeART.exe (PID: 6244)
      • byogbftl.exe (PID: 6396)
      • Adobe.exe (PID: 6156)
      • Application Frame Host.exe (PID: 6488)
      • random1.exe (PID: 7216)
      • eOetdpblApFe.salo (PID: 7356)
      • AdobeART.exe (PID: 7836)
      • index.exe (PID: 7880)
      • client32.exe (PID: 6096)
      • AdobeART.exe (PID: 7360)
      • Unlocker.exe (PID: 5180)
      • 7z.exe (PID: 3476)
      • Unlocker.exe (PID: 6116)
      • Unlocker.exe (PID: 8180)
      • GP_CLT_LNCA_Service.exe (PID: 2316)
      • NetSignCNGGuardService.exe (PID: 2416)
      • IObitUnlocker.exe (PID: 7240)
      • updater.exe (PID: 3576)
      • PLUGScheduler.exe (PID: 3532)
      • dllhost.exe (PID: 5772)
      • dllhost.exe (PID: 5804)
      • svchsot.exe (PID: 2560)
      • 76y5trfed675ytg.exe (PID: 3660)
      • GP_CLT_LNCA.exe (PID: 3828)
      • Adobe.exe (PID: 1432)
      • AdobeART.exe (PID: 5756)
      • Application Frame Host.exe (PID: 3044)
      • byogbftl.exe (PID: 5892)
      • Google Chrome.exe (PID: 5160)
      • AdobeART.exe (PID: 5632)
      • nzdbqjy.exe (PID: 4088)
      • AdobeART.exe (PID: 6116)
      • dllhosts.exe (PID: 6164)
      • random1.exe (PID: 6192)
      • dllhosts.exe (PID: 5596)
      • svhost.exe (PID: 6492)
      • suker.exe (PID: 6600)
      • N3UzlGTdxyV4.salo (PID: 6336)
      • index.exe (PID: 6788)
      • AdobeART.exe (PID: 6760)
      • RXSpnWwM.exe (PID: 7016)
      • D9eSqeIz.exe (PID: 7132)
      • random2.exe (PID: 6900)
      • client32.exe (PID: 7392)
      • 7z.exe (PID: 6756)
      • Unlocker.exe (PID: 6848)
      • Unlocker.exe (PID: 7312)
      • Unlocker.exe (PID: 7408)
      • IObitUnlocker.exe (PID: 3608)
    • Checks supported languages

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • imagelogger.exe (PID: 1164)
      • Client-built.exe (PID: 4796)
      • award.pdf.exe (PID: 3056)
      • Application Frame Host.exe (PID: 5916)
      • Application Frame Host.exe (PID: 5104)
      • Application Frame Host.exe (PID: 4156)
      • RustDesk.exe (PID: 2740)
      • XClient.exe (PID: 6112)
      • NOTallowedtocrypt.exe (PID: 1728)
      • ShellExperienceHost.exe (PID: 4588)
      • 76y5trfed675ytg.exe (PID: 4884)
      • svchsot.exe (PID: 2112)
      • 76y5trfed675ytg.exe (PID: 2108)
      • 76y5trfed675ytg.exe (PID: 640)
      • linkingg66%206.exe (PID: 3968)
      • RegSvcs.exe (PID: 1372)
      • Opolis.exe (PID: 2108)
      • OSM-Client.exe (PID: 908)
      • hydkj.exe (PID: 1264)
      • rea.exe (PID: 1464)
      • rardkj.exe (PID: 6256)
      • setup.exe (PID: 6308)
      • msiexec.exe (PID: 6520)
      • Google Chrome.exe (PID: 6616)
      • msiexec.exe (PID: 6696)
      • IDriverT.exe (PID: 6744)
      • IDriver.exe (PID: 6796)
      • remcos_a.exe (PID: 7108)
      • HDDrive1095_XinAnPlug3030_20230619_inno.exe (PID: 7052)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7072)
      • CritScript.exe (PID: 7280)
      • JUSCHED.EXE (PID: 7352)
      • remcos.exe (PID: 7512)
      • random.exe (PID: 7604)
      • remcos.exe (PID: 7452)
      • bek6xij8fOh9.duma (PID: 7848)
      • suker.exe (PID: 8060)
      • jusched.exe (PID: 8148)
      • Sentil.exe (PID: 548)
      • vcredist2005_x86.exe (PID: 4560)
      • jusched.exe (PID: 6160)
      • VCREDI~3.EXE (PID: 6240)
      • Client1.exe (PID: 6416)
      • svchost.exe (PID: 6344)
      • Client1.exe (PID: 4128)
      • msiexec.exe (PID: 3104)
      • UpdateManager.exe (PID: 6972)
      • dllhost.exe (PID: 1140)
      • dllhost.exe (PID: 3768)
      • UpdateManager.exe (PID: 5708)
      • calendar.exe (PID: 6456)
      • Server1.exe (PID: 6228)
      • UrbanVPN.exe (PID: 5064)
      • dllhosts.exe (PID: 1592)
      • World%20of%20Tanks.exe (PID: 5536)
      • dllhosts.exe (PID: 3988)
      • WxWorkMultiOpen.exe (PID: 6424)
      • random1.exe (PID: 4788)
      • GYP8zJuTJUDA.salo (PID: 2068)
      • WEBDOWN.EXE (PID: 5504)
      • random1.exe (PID: 7112)
      • qvGWHyX8uJRB.salo (PID: 7420)
      • LNCACSPSetup(1.0.9.5).exe (PID: 2092)
      • drvinst.exe (PID: 8044)
      • GP_CLT_LNCA_Service.exe (PID: 7812)
      • GP_CLT_LNCA_Service.exe (PID: 7768)
      • GP_CLT_LNCA.exe (PID: 8076)
      • NetSignCNG-v3.0.3.0.tmp (PID: 7372)
      • GP_CLT_LNCA.exe (PID: 6288)
      • NetSignCNG-v3.0.3.0.exe (PID: 7376)
      • calendar.exe (PID: 7352)
      • InstallRootCert.exe (PID: 6992)
      • InstallDigiCertTrustedRootG4Cert.exe (PID: 456)
      • InstallRootCertNew.exe (PID: 4332)
      • AA_v3.exe (PID: 6536)
      • NetSignCNGGuardService.exe (PID: 1288)
      • NetSignCNGGuardService.exe (PID: 8188)
      • AA_v3.exe (PID: 3944)
      • dllhosts.exe (PID: 6864)
      • suker.exe (PID: 1884)
      • AA_v3.exe (PID: 6256)
      • dllhosts.exe (PID: 6876)
      • keygen.exe (PID: 6472)
      • NetSignCNG.exe (PID: 3448)
      • NetSignCNG.exe (PID: 4788)
      • a9RD5LI.exe (PID: 6752)
      • update.exe (PID: 4004)
      • mini_04.exe (PID: 3536)
      • QuizPokemon.exe (PID: 1088)
      • Shopzilla.pif (PID: 7844)
      • BCobalt.exe (PID: 4344)
      • SharpHound.exe (PID: 7428)
      • access.exe (PID: 4584)
      • mOctYvD.exe (PID: 6172)
      • example_win32_dx11.exe (PID: 5484)
      • snd16061.exe (PID: 8032)
      • svchost.exe (PID: 4444)
      • client32.exe (PID: 7300)
      • mimikatz.exe (PID: 6972)
      • System.exe (PID: 5868)
      • System.exe (PID: 7992)
      • chcp.com (PID: 1860)
      • rw6eMTC.exe (PID: 4560)
      • popapoers.exe (PID: 6632)
      • extrac32.exe (PID: 3224)
      • test1.exe (PID: 5584)
      • PeerUnit.exe (PID: 7276)
      • 90.exe (PID: 3208)
      • Adobe.exe (PID: 7184)
      • Adobe.exe (PID: 6760)
      • 90.exe (PID: 7900)
      • AdobeART.exe (PID: 7584)
      • FileA.exe (PID: 7588)
      • Grid.com (PID: 7472)
      • svchost.exe (PID: 6164)
      • Adobe.exe (PID: 7776)
      • c1.exe (PID: 7288)
      • AdobeART.exe (PID: 3408)
      • svhost.exe (PID: 6288)
      • 80aK2YmFb6vbKeU.exe (PID: 6340)
      • chcp.com (PID: 8120)
      • OM8hqGX.exe (PID: 7940)
      • ns6B4A.tmp (PID: 6336)
      • AdobeART.exe (PID: 4348)
      • svhost.exe (PID: 4636)
      • svhost.exe (PID: 5468)
      • RDPW_Installer.exe (PID: 4132)
      • RDPWInst.exe (PID: 408)
      • svhost.exe (PID: 6508)
      • AdobeART.exe (PID: 7180)
      • RegSvcs.exe (PID: 7552)
      • Ganja128.exe (PID: 5900)
      • RDPWInst.exe (PID: 7776)
      • svhost.exe (PID: 7460)
      • inetinfo.exe (PID: 7888)
      • extrac32.exe (PID: 7764)
      • Adobe.exe (PID: 6532)
      • byogbftl.exe (PID: 7004)
      • Jade.com (PID: 4844)
      • LGPO.exe (PID: 5052)
      • svchost.exe (PID: 5484)
      • RDP_CnC.exe (PID: 3004)
      • nzdbqjy.exe (PID: 3056)
      • chcp.com (PID: 4480)
      • byogbftl.exe (PID: 6620)
      • dllhosts.exe (PID: 7800)
      • iload.exe (PID: 3280)
      • ylTujhk.exe (PID: 5248)
      • suker.exe (PID: 6712)
      • dllhosts.exe (PID: 8100)
      • svchost.exe (PID: 6704)
      • B0B34B3375B144C680A0456FFDD639A0.exe (PID: 5284)
      • Adobe.exe (PID: 5612)
      • jeditor.exe (PID: 6468)
      • index.exe (PID: 7328)
      • chcp.com (PID: 3464)
      • OGAFRlqR.exe (PID: 8164)
      • Wn0dqI3w.exe (PID: 6168)
      • D9eSqeIz.exe (PID: 5940)
      • RXSpnWwM.exe (PID: 7232)
      • OGAFRlqR.exe (PID: 7152)
      • index.exe (PID: 6304)
      • Wn0dqI3w.exe (PID: 6380)
      • RXSpnWwM.exe (PID: 1212)
      • D9eSqeIz.exe (PID: 5308)
      • chcp.com (PID: 7764)
      • ProcessHide32.exe (PID: 7284)
      • IMG001.exe (PID: 7028)
      • chcp.com (PID: 2040)
      • svchost.exe (PID: 6948)
      • Adobe.exe (PID: 1392)
      • tftp.exe (PID: 4344)
      • chcp.com (PID: 548)
      • mode.com (PID: 3140)
      • mode.com (PID: 7660)
      • IMG001.exe (PID: 7328)
      • Unlocker.exe (PID: 2616)
      • Adobe.exe (PID: 3772)
      • 7z.exe (PID: 2836)
      • svchost.exe (PID: 7444)
      • 7z.exe (PID: 6676)
      • Unlocker.exe (PID: 7452)
      • Unlocker.exe (PID: 6484)
      • random2.exe (PID: 7196)
      • Unlocker.exe (PID: 4748)
      • chcp.com (PID: 3732)
      • Jade.com (PID: 8092)
      • tftp.exe (PID: 7912)
      • Unlocker.exe (PID: 1180)
      • mOctYvD.exe (PID: 1912)
      • random2.exe (PID: 6336)
      • IObitUnlocker.exe (PID: 5844)
      • Unlocker.exe (PID: 7040)
      • UpdateManager.exe (PID: 3668)
      • dllhost.exe (PID: 3080)
      • dllhost.exe (PID: 3744)
      • remcos.exe (PID: 6036)
      • svchsot.exe (PID: 2384)
      • 76y5trfed675ytg.exe (PID: 3076)
      • 76y5trfed675ytg.exe (PID: 5844)
      • GP_CLT_LNCA.exe (PID: 5968)
      • NetSignCNG.exe (PID: 2848)
      • Adobe.exe (PID: 6156)
      • remcos.exe (PID: 4884)
      • Adobe.exe (PID: 6220)
      • AdobeART.exe (PID: 6244)
      • byogbftl.exe (PID: 6396)
      • Application Frame Host.exe (PID: 6488)
      • 76y5trfed675ytg.exe (PID: 6628)
      • Google Chrome.exe (PID: 6764)
      • dllhosts.exe (PID: 7120)
      • dllhosts.exe (PID: 7188)
      • eOetdpblApFe.salo (PID: 7356)
      • Adobe.exe (PID: 7476)
      • AdobeART.exe (PID: 7836)
      • suker.exe (PID: 7648)
      • index.exe (PID: 7880)
      • Wn0dqI3w.exe (PID: 6240)
      • random2.exe (PID: 7968)
      • client32.exe (PID: 6096)
      • D9eSqeIz.exe (PID: 3736)
      • chcp.com (PID: 6908)
      • mode.com (PID: 7056)
      • AdobeART.exe (PID: 7360)
      • 7z.exe (PID: 3476)
      • Unlocker.exe (PID: 5180)
      • Unlocker.exe (PID: 6116)
      • Adobe.exe (PID: 7064)
      • Unlocker.exe (PID: 8180)
      • IObitUnlocker.exe (PID: 7240)
      • NetSignCNGGuardService.exe (PID: 2416)
      • GP_CLT_LNCA_Service.exe (PID: 2316)
      • updater.exe (PID: 1728)
      • svhost.exe (PID: 3552)
      • updater.exe (PID: 3576)
      • PLUGScheduler.exe (PID: 3532)
      • dllhost.exe (PID: 5772)
      • dllhost.exe (PID: 5804)
      • UpdateManager.exe (PID: 3652)
      • svchsot.exe (PID: 2560)
      • remcos.exe (PID: 2708)
      • 76y5trfed675ytg.exe (PID: 5748)
      • 76y5trfed675ytg.exe (PID: 3660)
      • remcos.exe (PID: 4088)
      • GP_CLT_LNCA.exe (PID: 3828)
      • Adobe.exe (PID: 1432)
      • NetSignCNG.exe (PID: 4408)
      • byogbftl.exe (PID: 5892)
      • AdobeART.exe (PID: 5756)
      • Application Frame Host.exe (PID: 3044)
      • 76y5trfed675ytg.exe (PID: 5604)
      • nzdbqjy.exe (PID: 4088)
      • Google Chrome.exe (PID: 5160)
      • AdobeART.exe (PID: 5632)
      • dllhosts.exe (PID: 5596)
      • remcos.exe (PID: 6116)
      • dllhosts.exe (PID: 6164)
      • random1.exe (PID: 6192)
      • AdobeART.exe (PID: 6116)
      • svhost.exe (PID: 6492)
      • Adobe.exe (PID: 6460)
      • N3UzlGTdxyV4.salo (PID: 6336)
      • suker.exe (PID: 6600)
      • AdobeART.exe (PID: 6760)
      • index.exe (PID: 6788)
      • OGAFRlqR.exe (PID: 6856)
      • random2.exe (PID: 6900)
      • Wn0dqI3w.exe (PID: 7124)
      • D9eSqeIz.exe (PID: 7132)
      • RXSpnWwM.exe (PID: 7016)
      • AdobeART.exe (PID: 7436)
      • client32.exe (PID: 7392)
      • chcp.com (PID: 7608)
      • mode.com (PID: 7924)
      • 7z.exe (PID: 6756)
      • AdobeART.exe (PID: 8068)
      • Unlocker.exe (PID: 6848)
      • Unlocker.exe (PID: 7312)
      • Unlocker.exe (PID: 7408)
      • IObitUnlocker.exe (PID: 3608)
    • Create files in a temporary directory

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • imagelogger.exe (PID: 1164)
      • svchost.exe (PID: 5020)
      • svchost.exe (PID: 5496)
      • linkingg66%206.exe (PID: 3968)
      • Opolis.exe (PID: 2108)
      • OSM-Client.exe (PID: 908)
      • hydkj.exe (PID: 1264)
      • rardkj.exe (PID: 6256)
      • setup.exe (PID: 6308)
      • msiexec.exe (PID: 6696)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7072)
      • HDDrive1095_XinAnPlug3030_20230619_inno.exe (PID: 7052)
      • remcos_a.exe (PID: 7108)
      • XClient.exe (PID: 6112)
      • CritScript.exe (PID: 7280)
      • bek6xij8fOh9.duma (PID: 7848)
      • powershell.exe (PID: 7936)
      • vcredist2005_x86.exe (PID: 4560)
      • VCREDI~3.EXE (PID: 6240)
      • svchost.exe (PID: 6344)
      • suker.exe (PID: 8060)
      • msiexec.exe (PID: 1464)
      • calendar.exe (PID: 6456)
      • Server1.exe (PID: 6228)
      • dllhost.exe (PID: 3768)
      • WEBDOWN.EXE (PID: 5504)
      • powershell.exe (PID: 1604)
      • powershell.exe (PID: 2236)
      • LNCACSPSetup(1.0.9.5).exe (PID: 2092)
      • NetSignCNG-v3.0.3.0.tmp (PID: 7372)
      • calendar.exe (PID: 7352)
      • NetSignCNG-v3.0.3.0.exe (PID: 7376)
      • NetSignCNG.exe (PID: 3448)
      • AA_v3.exe (PID: 3944)
      • QuizPokemon.exe (PID: 1088)
      • a9RD5LI.exe (PID: 6752)
      • BCobalt.exe (PID: 4344)
      • mOctYvD.exe (PID: 6172)
      • svchost.exe (PID: 4444)
      • rw6eMTC.exe (PID: 4560)
      • extrac32.exe (PID: 3224)
      • svchost.exe (PID: 6164)
      • c1.exe (PID: 7288)
      • 80aK2YmFb6vbKeU.exe (PID: 6340)
      • OM8hqGX.exe (PID: 7940)
      • RDPW_Installer.exe (PID: 4132)
      • extrac32.exe (PID: 7764)
      • svchost.exe (PID: 5484)
      • iload.exe (PID: 3280)
      • svchost.exe (PID: 6704)
      • D9eSqeIz.exe (PID: 5940)
      • D9eSqeIz.exe (PID: 5308)
      • IMG001.exe (PID: 7028)
      • svchost.exe (PID: 6948)
      • 7z.exe (PID: 2836)
      • IMG001.exe (PID: 7328)
      • Unlocker.exe (PID: 7452)
      • svchost.exe (PID: 7444)
      • Unlocker.exe (PID: 4748)
      • mOctYvD.exe (PID: 1912)
      • Unlocker.exe (PID: 1180)
      • IObitUnlocker.exe (PID: 5844)
      • UpdateManager.exe (PID: 3668)
      • svchost.exe (PID: 5876)
      • svchost.exe (PID: 6664)
      • dllhost.exe (PID: 3080)
      • powershell.exe (PID: 7408)
      • D9eSqeIz.exe (PID: 3736)
      • 7z.exe (PID: 3476)
      • Unlocker.exe (PID: 6116)
      • Unlocker.exe (PID: 8180)
      • IObitUnlocker.exe (PID: 7240)
      • UpdateManager.exe (PID: 3652)
      • svchost.exe (PID: 5792)
      • dllhost.exe (PID: 5804)
      • svchost.exe (PID: 5280)
      • powershell.exe (PID: 6396)
      • D9eSqeIz.exe (PID: 7132)
      • 7z.exe (PID: 6756)
      • Unlocker.exe (PID: 7312)
      • IObitUnlocker.exe (PID: 3608)
    • Disables trace logs

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • imagelogger.exe (PID: 1164)
      • RegSvcs.exe (PID: 1372)
      • XClient.exe (PID: 6112)
      • svchost.exe (PID: 6344)
      • dllhost.exe (PID: 3768)
      • RegSvcs.exe (PID: 7552)
      • Ganja128.exe (PID: 5900)
      • byogbftl.exe (PID: 7004)
      • nzdbqjy.exe (PID: 3056)
      • byogbftl.exe (PID: 6620)
      • UpdateManager.exe (PID: 3668)
      • dllhost.exe (PID: 3080)
      • byogbftl.exe (PID: 6396)
      • nzdbqjy.exe (PID: 6984)
      • Google Chrome.exe (PID: 6764)
      • UpdateManager.exe (PID: 3652)
      • dllhost.exe (PID: 5804)
      • byogbftl.exe (PID: 5892)
      • nzdbqjy.exe (PID: 4088)
    • Checks proxy server information

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • imagelogger.exe (PID: 1164)
      • RegSvcs.exe (PID: 1372)
      • XClient.exe (PID: 6112)
      • slui.exe (PID: 440)
      • suker.exe (PID: 8060)
      • msiexec.exe (PID: 1464)
      • svchost.exe (PID: 6344)
      • dllhost.exe (PID: 3768)
      • AA_v3.exe (PID: 6536)
      • AA_v3.exe (PID: 3944)
      • NetSignCNG.exe (PID: 3448)
      • BCobalt.exe (PID: 4344)
      • client32.exe (PID: 7300)
      • RegSvcs.exe (PID: 7552)
      • RDPWInst.exe (PID: 7776)
      • Ganja128.exe (PID: 5900)
      • byogbftl.exe (PID: 7004)
      • nzdbqjy.exe (PID: 3056)
      • byogbftl.exe (PID: 6620)
      • cscript.exe (PID: 7460)
      • UpdateManager.exe (PID: 3668)
      • dllhost.exe (PID: 3080)
      • byogbftl.exe (PID: 6396)
      • suker.exe (PID: 7648)
      • client32.exe (PID: 6096)
      • explorer.exe (PID: 8040)
      • Google Chrome.exe (PID: 6764)
      • dllhost.exe (PID: 5804)
      • UpdateManager.exe (PID: 3652)
      • byogbftl.exe (PID: 5892)
      • nzdbqjy.exe (PID: 4088)
      • suker.exe (PID: 6600)
      • client32.exe (PID: 7392)
      • explorer.exe (PID: 5072)
    • Reads Environment values

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • imagelogger.exe (PID: 1164)
      • Client-built.exe (PID: 4796)
      • Application Frame Host.exe (PID: 5916)
      • Application Frame Host.exe (PID: 5104)
      • Application Frame Host.exe (PID: 4156)
      • NOTallowedtocrypt.exe (PID: 1728)
      • 76y5trfed675ytg.exe (PID: 4884)
      • 76y5trfed675ytg.exe (PID: 2108)
      • 76y5trfed675ytg.exe (PID: 640)
      • RegSvcs.exe (PID: 1372)
      • rea.exe (PID: 1464)
      • XClient.exe (PID: 6112)
      • remcos_a.exe (PID: 7108)
      • remcos.exe (PID: 7452)
      • JUSCHED.EXE (PID: 7352)
      • bek6xij8fOh9.duma (PID: 7848)
      • jusched.exe (PID: 8148)
      • Sentil.exe (PID: 548)
      • suker.exe (PID: 8060)
      • jusched.exe (PID: 6160)
      • Client1.exe (PID: 6416)
      • Client1.exe (PID: 4128)
      • svchost.exe (PID: 6344)
      • dllhost.exe (PID: 3768)
      • Server1.exe (PID: 6228)
      • example_win32_dx11.exe (PID: 5484)
      • svchost.exe (PID: 4444)
      • client32.exe (PID: 7300)
      • System.exe (PID: 5868)
      • System.exe (PID: 7992)
      • svchost.exe (PID: 6164)
      • c1.exe (PID: 7288)
      • svhost.exe (PID: 6288)
      • svhost.exe (PID: 4636)
      • svhost.exe (PID: 5468)
      • svhost.exe (PID: 6508)
      • RegSvcs.exe (PID: 7552)
      • Ganja128.exe (PID: 5900)
      • svhost.exe (PID: 7460)
      • byogbftl.exe (PID: 7004)
      • svchost.exe (PID: 5484)
      • nzdbqjy.exe (PID: 3056)
      • byogbftl.exe (PID: 6620)
      • svchost.exe (PID: 6704)
      • svchost.exe (PID: 6948)
      • svchost.exe (PID: 7444)
      • UpdateManager.exe (PID: 3668)
      • dllhost.exe (PID: 3080)
      • remcos.exe (PID: 6036)
      • 76y5trfed675ytg.exe (PID: 5844)
      • byogbftl.exe (PID: 6396)
      • 76y5trfed675ytg.exe (PID: 6628)
      • Application Frame Host.exe (PID: 6488)
      • nzdbqjy.exe (PID: 6984)
      • eOetdpblApFe.salo (PID: 7356)
      • client32.exe (PID: 6096)
      • Google Chrome.exe (PID: 6764)
      • UpdateManager.exe (PID: 3652)
      • dllhost.exe (PID: 5804)
      • remcos.exe (PID: 2708)
      • 76y5trfed675ytg.exe (PID: 5748)
      • byogbftl.exe (PID: 5892)
      • Application Frame Host.exe (PID: 3044)
      • 76y5trfed675ytg.exe (PID: 5604)
      • nzdbqjy.exe (PID: 4088)
      • svhost.exe (PID: 6492)
      • suker.exe (PID: 6600)
      • N3UzlGTdxyV4.salo (PID: 6336)
      • client32.exe (PID: 7392)
    • Reads the machine GUID from the registry

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • imagelogger.exe (PID: 1164)
      • Client-built.exe (PID: 4796)
      • Application Frame Host.exe (PID: 5104)
      • Application Frame Host.exe (PID: 5916)
      • Application Frame Host.exe (PID: 4156)
      • XClient.exe (PID: 6112)
      • 76y5trfed675ytg.exe (PID: 640)
      • RegSvcs.exe (PID: 1372)
      • msiexec.exe (PID: 6520)
      • Google Chrome.exe (PID: 6616)
      • JUSCHED.EXE (PID: 7352)
      • jusched.exe (PID: 8148)
      • Sentil.exe (PID: 548)
      • jusched.exe (PID: 6160)
      • Client1.exe (PID: 6416)
      • Client1.exe (PID: 4128)
      • svchost.exe (PID: 6344)
      • dllhost.exe (PID: 1140)
      • UpdateManager.exe (PID: 5708)
      • dllhost.exe (PID: 3768)
      • dllhosts.exe (PID: 1592)
      • dllhosts.exe (PID: 3988)
      • Server1.exe (PID: 6228)
      • drvinst.exe (PID: 8044)
      • dllhosts.exe (PID: 6864)
      • dllhosts.exe (PID: 6876)
      • NetSignCNG.exe (PID: 3448)
      • AA_v3.exe (PID: 3944)
      • NetSignCNG.exe (PID: 4788)
      • SharpHound.exe (PID: 7428)
      • BCobalt.exe (PID: 4344)
      • example_win32_dx11.exe (PID: 5484)
      • svchost.exe (PID: 4444)
      • System.exe (PID: 5868)
      • System.exe (PID: 7992)
      • 90.exe (PID: 3208)
      • svchost.exe (PID: 6164)
      • AdobeART.exe (PID: 7584)
      • c1.exe (PID: 7288)
      • svhost.exe (PID: 6288)
      • svhost.exe (PID: 4636)
      • svhost.exe (PID: 5468)
      • svhost.exe (PID: 6508)
      • AdobeART.exe (PID: 4348)
      • RegSvcs.exe (PID: 7552)
      • Ganja128.exe (PID: 5900)
      • RDPWInst.exe (PID: 7776)
      • svhost.exe (PID: 7460)
      • byogbftl.exe (PID: 7004)
      • svchost.exe (PID: 5484)
      • nzdbqjy.exe (PID: 3056)
      • byogbftl.exe (PID: 6620)
      • dllhosts.exe (PID: 8100)
      • svchost.exe (PID: 6704)
      • suker.exe (PID: 8060)
      • dllhosts.exe (PID: 7800)
      • svchost.exe (PID: 6948)
      • Unlocker.exe (PID: 2616)
      • Unlocker.exe (PID: 7452)
      • svchost.exe (PID: 7444)
      • Unlocker.exe (PID: 6484)
      • Unlocker.exe (PID: 4748)
      • Unlocker.exe (PID: 1180)
      • jusched.exe (PID: 3568)
      • NetSignCNG.exe (PID: 4196)
      • Client1.exe (PID: 3644)
      • svhost.exe (PID: 3600)
      • UpdateManager.exe (PID: 3668)
      • dllhost.exe (PID: 3744)
      • dllhost.exe (PID: 3080)
      • byogbftl.exe (PID: 6396)
      • Application Frame Host.exe (PID: 6488)
      • nzdbqjy.exe (PID: 6984)
      • svhost.exe (PID: 7512)
      • AdobeART.exe (PID: 7836)
      • Unlocker.exe (PID: 5180)
      • Unlocker.exe (PID: 6116)
      • Unlocker.exe (PID: 8180)
      • NetSignCNG.exe (PID: 4204)
      • svhost.exe (PID: 3552)
      • jusched.exe (PID: 3544)
      • UpdateManager.exe (PID: 3652)
      • Client1.exe (PID: 3628)
      • dllhost.exe (PID: 5772)
      • dllhost.exe (PID: 5804)
      • byogbftl.exe (PID: 5892)
      • Application Frame Host.exe (PID: 3044)
      • Google Chrome.exe (PID: 5160)
      • nzdbqjy.exe (PID: 4088)
      • AdobeART.exe (PID: 5756)
      • dllhosts.exe (PID: 6164)
      • dllhosts.exe (PID: 5596)
      • svhost.exe (PID: 6492)
      • AdobeART.exe (PID: 6116)
      • AdobeART.exe (PID: 6760)
      • Unlocker.exe (PID: 6848)
      • Unlocker.exe (PID: 7312)
      • Unlocker.exe (PID: 7408)
    • Process checks computer location settings

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • NOTallowedtocrypt.exe (PID: 1728)
      • XClient.exe (PID: 6112)
      • Opolis.exe (PID: 2108)
      • hydkj.exe (PID: 1264)
      • rardkj.exe (PID: 6256)
      • remcos_a.exe (PID: 7108)
      • CritScript.exe (PID: 7280)
      • bek6xij8fOh9.duma (PID: 7848)
      • svchost.exe (PID: 6344)
      • suker.exe (PID: 8060)
      • dllhost.exe (PID: 3768)
      • calendar.exe (PID: 6456)
      • LNCACSPSetup(1.0.9.5).exe (PID: 2092)
      • AA_v3.exe (PID: 3944)
      • QuizPokemon.exe (PID: 1088)
      • a9RD5LI.exe (PID: 6752)
      • mOctYvD.exe (PID: 6172)
      • snd16061.exe (PID: 8032)
      • svchost.exe (PID: 4444)
      • rw6eMTC.exe (PID: 4560)
      • test1.exe (PID: 5584)
      • 90.exe (PID: 7900)
      • svchost.exe (PID: 6164)
      • Ganja128.exe (PID: 5900)
      • byogbftl.exe (PID: 7004)
      • svchost.exe (PID: 5484)
      • index.exe (PID: 7328)
      • svchost.exe (PID: 6704)
      • D9eSqeIz.exe (PID: 5940)
      • index.exe (PID: 6304)
      • D9eSqeIz.exe (PID: 5308)
      • IMG001.exe (PID: 7028)
      • svchost.exe (PID: 6948)
      • IMG001.exe (PID: 7328)
      • Unlocker.exe (PID: 2616)
      • Unlocker.exe (PID: 7452)
      • Unlocker.exe (PID: 6484)
      • svchost.exe (PID: 7444)
      • Unlocker.exe (PID: 1180)
      • Unlocker.exe (PID: 4748)
      • mOctYvD.exe (PID: 1912)
      • UpdateManager.exe (PID: 3668)
      • dllhost.exe (PID: 3080)
      • 76y5trfed675ytg.exe (PID: 3076)
      • byogbftl.exe (PID: 6396)
      • eOetdpblApFe.salo (PID: 7356)
      • index.exe (PID: 7880)
      • Google Chrome.exe (PID: 6764)
      • D9eSqeIz.exe (PID: 3736)
      • Unlocker.exe (PID: 5180)
      • Unlocker.exe (PID: 6116)
      • Unlocker.exe (PID: 8180)
      • dllhost.exe (PID: 5804)
      • UpdateManager.exe (PID: 3652)
      • 76y5trfed675ytg.exe (PID: 3660)
      • byogbftl.exe (PID: 5892)
      • N3UzlGTdxyV4.salo (PID: 6336)
      • index.exe (PID: 6788)
      • Google Chrome.exe (PID: 5160)
      • D9eSqeIz.exe (PID: 7132)
      • Unlocker.exe (PID: 6848)
      • Unlocker.exe (PID: 7312)
      • Unlocker.exe (PID: 7408)
    • Reads the software policy settings

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • TiWorker.exe (PID: 5468)
      • RegSvcs.exe (PID: 1372)
      • XClient.exe (PID: 6112)
      • msiexec.exe (PID: 6520)
      • slui.exe (PID: 440)
      • powershell.exe (PID: 7936)
      • msiexec.exe (PID: 1464)
      • svchost.exe (PID: 6344)
      • dllhost.exe (PID: 3768)
      • powershell.exe (PID: 1604)
      • drvinst.exe (PID: 8044)
      • powershell.exe (PID: 2236)
      • NetSignCNG.exe (PID: 3448)
      • AA_v3.exe (PID: 3944)
      • NetSignCNG.exe (PID: 4788)
      • BCobalt.exe (PID: 4344)
      • RegSvcs.exe (PID: 7552)
      • RDPWInst.exe (PID: 7776)
      • suker.exe (PID: 8060)
      • Grid.com (PID: 7472)
      • NetSignCNG.exe (PID: 4196)
      • UpdateManager.exe (PID: 3668)
      • dllhost.exe (PID: 3080)
      • Google Chrome.exe (PID: 6764)
      • NetSignCNG.exe (PID: 4204)
      • UpdateManager.exe (PID: 3652)
      • dllhost.exe (PID: 5804)
      • powershell.exe (PID: 6396)
    • Launching a file from the Startup directory

      • imagelogger.exe (PID: 1164)
      • IDriverT.exe (PID: 6744)
      • dllhost.exe (PID: 3768)
      • snd16061.exe (PID: 8032)
      • cmd.exe (PID: 4508)
      • IMG001.exe (PID: 7328)
      • dllhost.exe (PID: 3080)
      • dllhost.exe (PID: 5804)
    • Creates files or folders in the user directory

      • imagelogger.exe (PID: 1164)
      • Client-built.exe (PID: 4796)
      • NOTallowedtocrypt.exe (PID: 1728)
      • XClient.exe (PID: 6112)
      • msiexec.exe (PID: 6520)
      • random.exe (PID: 7604)
      • JUSCHED.EXE (PID: 7352)
      • Sentil.exe (PID: 548)
      • msiexec.exe (PID: 1464)
      • suker.exe (PID: 8060)
      • WerFault.exe (PID: 7872)
      • jusched.exe (PID: 8148)
      • dllhost.exe (PID: 3768)
      • Client1.exe (PID: 6416)
      • Server1.exe (PID: 6228)
      • InstallRootCertNew.exe (PID: 4332)
      • InstallRootCert.exe (PID: 6992)
      • NetSignCNG.exe (PID: 3448)
      • Shopzilla.pif (PID: 7844)
      • example_win32_dx11.exe (PID: 5484)
      • BCobalt.exe (PID: 4344)
      • snd16061.exe (PID: 8032)
      • client32.exe (PID: 7300)
      • System.exe (PID: 5868)
      • WerFault.exe (PID: 1108)
      • test1.exe (PID: 5584)
      • Adobe.exe (PID: 7184)
      • 90.exe (PID: 7900)
      • WerFault.exe (PID: 1464)
      • svhost.exe (PID: 6288)
      • WerFault.exe (PID: 6712)
      • RDPWInst.exe (PID: 7776)
      • Jade.com (PID: 4844)
      • IMG001.exe (PID: 7028)
      • IMG001.exe (PID: 7328)
      • client32.exe (PID: 6096)
      • WerFault.exe (PID: 6296)
      • WerFault.exe (PID: 2384)
      • client32.exe (PID: 7392)
    • Reads security settings of Internet Explorer

      • Fondue.exe (PID: 3344)
      • dllhost.exe (PID: 1480)
      • powershell.exe (PID: 7936)
      • msiexec.exe (PID: 1464)
      • ComputerDefaults.exe (PID: 4888)
      • powershell.exe (PID: 1604)
      • powershell.exe (PID: 2236)
      • calc.exe (PID: 4328)
      • cscript.exe (PID: 7460)
      • calc.exe (PID: 6176)
      • powershell.exe (PID: 7408)
      • explorer.exe (PID: 8040)
      • calc.exe (PID: 6076)
      • powershell.exe (PID: 6396)
      • explorer.exe (PID: 5072)
    • Manages system restore points

      • SrTasks.exe (PID: 4560)
    • The sample compiled with english language support

      • TiWorker.exe (PID: 5468)
      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • Opolis.exe (PID: 2108)
      • hydkj.exe (PID: 1264)
      • msiexec.exe (PID: 6652)
      • msiexec.exe (PID: 6520)
      • msiexec.exe (PID: 6696)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7072)
      • vcredist2005_x86.exe (PID: 4560)
      • LNCACSPSetup(1.0.9.5).exe (PID: 2092)
      • drvinst.exe (PID: 8044)
      • NetSignCNG-v3.0.3.0.tmp (PID: 7372)
      • a9RD5LI.exe (PID: 6752)
      • Shopzilla.pif (PID: 7844)
      • snd16061.exe (PID: 8032)
      • rw6eMTC.exe (PID: 4560)
      • RDPW_Installer.exe (PID: 4132)
      • xcopy.exe (PID: 6256)
      • xcopy.exe (PID: 7828)
      • RDPWInst.exe (PID: 7776)
      • Jade.com (PID: 4844)
      • index.exe (PID: 7328)
      • D9eSqeIz.exe (PID: 5940)
      • Unlocker.exe (PID: 7452)
      • Unlocker.exe (PID: 4748)
      • Unlocker.exe (PID: 1180)
      • Jade.com (PID: 8092)
      • Unlocker.exe (PID: 6116)
      • Unlocker.exe (PID: 8180)
      • Unlocker.exe (PID: 7312)
      • Unlocker.exe (PID: 7408)
    • Uses Task Scheduler to autorun other applications (AUTOMATE)

      • Client-built.exe (PID: 4796)
      • svchost.exe (PID: 6344)
      • jusched.exe (PID: 3544)
      • svhost.exe (PID: 3552)
    • Manual execution by a user

      • Application Frame Host.exe (PID: 5104)
      • Application Frame Host.exe (PID: 4156)
      • svchsot.exe (PID: 2112)
      • 76y5trfed675ytg.exe (PID: 640)
      • Google Chrome.exe (PID: 6616)
      • remcos.exe (PID: 7512)
      • jusched.exe (PID: 6160)
      • Client1.exe (PID: 4128)
      • rundll32.exe (PID: 2408)
      • rundll32.exe (PID: 4244)
      • UpdateManager.exe (PID: 6972)
      • dllhosts.exe (PID: 1592)
      • random1.exe (PID: 7112)
      • GP_CLT_LNCA.exe (PID: 6288)
      • NetSignCNG.exe (PID: 3448)
      • wscript.exe (PID: 7112)
      • Adobe.exe (PID: 7776)
      • AdobeART.exe (PID: 4348)
      • svhost.exe (PID: 5468)
      • svhost.exe (PID: 6508)
      • svhost.exe (PID: 7460)
      • cmd.exe (PID: 6812)
      • cmd.exe (PID: 4508)
      • RDPWInst.exe (PID: 4444)
      • byogbftl.exe (PID: 6620)
      • index.exe (PID: 6304)
      • wscript.exe (PID: 6188)
      • random2.exe (PID: 6336)
      • IObitUnlocker.exe (PID: 7504)
      • remcos.exe (PID: 6036)
      • svchsot.exe (PID: 2384)
      • 76y5trfed675ytg.exe (PID: 3076)
      • NetSignCNG.exe (PID: 2848)
      • Adobe.exe (PID: 6156)
      • remcos.exe (PID: 4884)
      • GP_CLT_LNCA.exe (PID: 5968)
      • AdobeART.exe (PID: 6244)
      • byogbftl.exe (PID: 6396)
      • 76y5trfed675ytg.exe (PID: 6628)
      • Google Chrome.exe (PID: 6764)
      • Application Frame Host.exe (PID: 6488)
      • dllhosts.exe (PID: 7120)
      • random1.exe (PID: 7216)
      • remcos.exe (PID: 7076)
      • svhost.exe (PID: 7512)
      • Adobe.exe (PID: 7476)
      • AdobeART.exe (PID: 7836)
      • index.exe (PID: 7880)
      • random2.exe (PID: 7968)
      • client32.exe (PID: 6096)
      • remcos.exe (PID: 2708)
      • 76y5trfed675ytg.exe (PID: 3660)
      • svchsot.exe (PID: 2560)
      • remcos.exe (PID: 4088)
      • GP_CLT_LNCA.exe (PID: 3828)
      • Adobe.exe (PID: 1432)
      • NetSignCNG.exe (PID: 4408)
      • AdobeART.exe (PID: 5756)
      • byogbftl.exe (PID: 5892)
      • Application Frame Host.exe (PID: 3044)
      • 76y5trfed675ytg.exe (PID: 5604)
      • Google Chrome.exe (PID: 5160)
      • remcos.exe (PID: 6116)
      • dllhosts.exe (PID: 5596)
      • random1.exe (PID: 6192)
      • Adobe.exe (PID: 6460)
      • svhost.exe (PID: 6492)
      • AdobeART.exe (PID: 6760)
      • index.exe (PID: 6788)
      • random2.exe (PID: 6900)
      • client32.exe (PID: 7392)
    • Launching a file from a Registry key

      • Client-built.exe (PID: 4796)
      • Application Frame Host.exe (PID: 5916)
      • RustDesk.exe (PID: 2740)
      • NOTallowedtocrypt.exe (PID: 1728)
      • 76y5trfed675ytg.exe (PID: 4884)
      • 76y5trfed675ytg.exe (PID: 2108)
      • svchost.exe (PID: 5020)
      • svchost.exe (PID: 5496)
      • XClient.exe (PID: 6112)
      • remcos_a.exe (PID: 7108)
      • remcos.exe (PID: 7452)
      • vcredist2005_x86.exe (PID: 4560)
      • VCREDI~3.EXE (PID: 6240)
      • dllhost.exe (PID: 3768)
      • suker.exe (PID: 8060)
      • LNCACSPSetup(1.0.9.5).exe (PID: 2092)
      • NetSignCNG-v3.0.3.0.tmp (PID: 7372)
      • Adobe.exe (PID: 7184)
      • Adobe.exe (PID: 6760)
      • Adobe.exe (PID: 7776)
      • AdobeART.exe (PID: 3408)
      • AdobeART.exe (PID: 7180)
      • svhost.exe (PID: 6508)
      • svhost.exe (PID: 7460)
      • Adobe.exe (PID: 6532)
      • byogbftl.exe (PID: 7004)
      • Adobe.exe (PID: 5612)
      • Adobe.exe (PID: 1392)
      • Adobe.exe (PID: 3772)
      • svchsot.exe (PID: 2384)
      • 76y5trfed675ytg.exe (PID: 5844)
      • Adobe.exe (PID: 6156)
      • Adobe.exe (PID: 6220)
      • 76y5trfed675ytg.exe (PID: 6628)
      • svchost.exe (PID: 5876)
      • byogbftl.exe (PID: 6396)
      • Adobe.exe (PID: 7476)
      • AdobeART.exe (PID: 7360)
      • svchost.exe (PID: 6664)
      • Google Chrome.exe (PID: 6764)
      • Adobe.exe (PID: 7064)
      • svchsot.exe (PID: 2560)
      • 76y5trfed675ytg.exe (PID: 5748)
      • Adobe.exe (PID: 1432)
      • dllhost.exe (PID: 5804)
      • Application Frame Host.exe (PID: 3044)
      • 76y5trfed675ytg.exe (PID: 5604)
      • svchost.exe (PID: 5792)
      • byogbftl.exe (PID: 5892)
      • AdobeART.exe (PID: 5632)
      • Adobe.exe (PID: 6460)
      • svchost.exe (PID: 5280)
      • AdobeART.exe (PID: 7436)
      • AdobeART.exe (PID: 8068)
    • The sample compiled with chinese language support

      • 4363463463464363463463463.exe.bin.exe (PID: 2060)
      • RustDesk.exe (PID: 2740)
      • hydkj.exe (PID: 1264)
      • msiexec.exe (PID: 6696)
      • HDDrive1095_XinAnPlug3030_20230619_inno.exe (PID: 7052)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7072)
      • msiexec.exe (PID: 6520)
      • LNCACSPSetup(1.0.9.5).exe (PID: 2092)
      • NetSignCNG-v3.0.3.0.tmp (PID: 7372)
    • Reads product name

      • NOTallowedtocrypt.exe (PID: 1728)
      • 76y5trfed675ytg.exe (PID: 4884)
      • 76y5trfed675ytg.exe (PID: 640)
      • 76y5trfed675ytg.exe (PID: 2108)
      • rea.exe (PID: 1464)
      • remcos_a.exe (PID: 7108)
      • remcos.exe (PID: 7452)
      • remcos.exe (PID: 6036)
      • 76y5trfed675ytg.exe (PID: 5844)
      • 76y5trfed675ytg.exe (PID: 6628)
      • remcos.exe (PID: 2708)
      • 76y5trfed675ytg.exe (PID: 5748)
      • 76y5trfed675ytg.exe (PID: 5604)
    • Reads CPU info

      • RustDesk.exe (PID: 2740)
      • Ganja128.exe (PID: 5900)
      • byogbftl.exe (PID: 7004)
      • nzdbqjy.exe (PID: 3056)
      • byogbftl.exe (PID: 6620)
      • svchsot.exe (PID: 2384)
      • byogbftl.exe (PID: 6396)
      • nzdbqjy.exe (PID: 6984)
      • svchsot.exe (PID: 2560)
      • byogbftl.exe (PID: 5892)
      • nzdbqjy.exe (PID: 4088)
    • Checks transactions between databases Windows and Oracle

      • 76y5trfed675ytg.exe (PID: 640)
    • Reads mouse settings

      • linkingg66%206.exe (PID: 3968)
      • Shopzilla.pif (PID: 7844)
      • Grid.com (PID: 7472)
      • 80aK2YmFb6vbKeU.exe (PID: 6340)
      • Jade.com (PID: 4844)
      • OGAFRlqR.exe (PID: 8164)
      • OGAFRlqR.exe (PID: 7152)
      • OGAFRlqR.exe (PID: 6856)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 1088)
      • powershell.exe (PID: 5532)
      • powershell.exe (PID: 3084)
      • powershell.exe (PID: 6168)
      • powershell.exe (PID: 7936)
      • powershell.exe (PID: 3084)
      • powershell.exe (PID: 7044)
      • powershell.exe (PID: 7508)
      • powershell.exe (PID: 7764)
      • powershell.exe (PID: 7848)
      • powershell.exe (PID: 6304)
      • powershell.exe (PID: 1604)
      • powershell.exe (PID: 2236)
      • powershell.exe (PID: 5584)
      • powershell.exe (PID: 5868)
    • Creates files in the program directory

      • svchost.exe (PID: 5020)
      • iexplore.exe (PID: 3496)
      • remcos_a.exe (PID: 7108)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7072)
      • UrbanVPN.exe (PID: 5064)
      • LNCACSPSetup(1.0.9.5).exe (PID: 2092)
      • NetSignCNG-v3.0.3.0.tmp (PID: 7372)
      • AA_v3.exe (PID: 6536)
      • AA_v3.exe (PID: 3944)
      • BCobalt.exe (PID: 4344)
      • SharpHound.exe (PID: 7428)
      • xcopy.exe (PID: 6256)
      • xcopy.exe (PID: 5980)
      • xcopy.exe (PID: 7828)
      • RDPWInst.exe (PID: 7776)
      • Ganja128.exe (PID: 5900)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 5532)
      • powershell.exe (PID: 1088)
      • powershell.exe (PID: 3084)
      • powershell.exe (PID: 6168)
      • powershell.exe (PID: 7936)
      • powershell.exe (PID: 3084)
      • powershell.exe (PID: 7044)
      • powershell.exe (PID: 7508)
      • powershell.exe (PID: 7764)
      • powershell.exe (PID: 7848)
      • powershell.exe (PID: 6304)
      • powershell.exe (PID: 1604)
      • powershell.exe (PID: 2236)
      • powershell.exe (PID: 5584)
      • powershell.exe (PID: 5868)
    • NsPack has been detected

      • RustDesk.exe (PID: 2740)
    • Connects to unusual port

      • iexplore.exe (PID: 3496)
      • iexplore.exe (PID: 7488)
      • iexplore.exe (PID: 3632)
      • iexplore.exe (PID: 5364)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 6520)
      • msiexec.exe (PID: 6652)
      • msiexec.exe (PID: 6696)
    • Reads Microsoft Office registry keys

      • remcos_a.exe (PID: 7108)
      • OpenWith.exe (PID: 7384)
    • Detects InnoSetup installer (YARA)

      • HDDrive1095_XinAnPlug3030_20230619_inno.exe (PID: 7052)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7072)
    • Compiled with Borland Delphi (YARA)

      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7072)
    • Creates a software uninstall entry

      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7072)
      • NetSignCNG-v3.0.3.0.tmp (PID: 7372)
    • The sample compiled with japanese language support

      • msiexec.exe (PID: 6520)
    • The sample compiled with spanish language support

      • msiexec.exe (PID: 6520)
    • The sample compiled with french language support

      • msiexec.exe (PID: 6520)
    • The sample compiled with german language support

      • msiexec.exe (PID: 6520)
    • The sample compiled with Italian language support

      • msiexec.exe (PID: 6520)
    • The sample compiled with korean language support

      • msiexec.exe (PID: 6520)
    • Adds/modifies Windows certificates

      • drvinst.exe (PID: 8044)
    • Creates a new folder

      • cmd.exe (PID: 476)
    • Changes the display of characters in the console

      • cmd.exe (PID: 6180)
      • cmd.exe (PID: 352)
      • cmd.exe (PID: 6396)
      • cmd.exe (PID: 7448)
      • cmd.exe (PID: 6264)
      • cmd.exe (PID: 7116)
      • cmd.exe (PID: 1212)
      • cmd.exe (PID: 6448)
      • cmd.exe (PID: 6476)
      • cmd.exe (PID: 7352)
    • Python executable

      • PeerUnit.exe (PID: 7276)
    • RDPWRAP has been detected

      • RDPWInst.exe (PID: 7776)
      • RDP_CnC.exe (PID: 3004)
    • Launching a file from Task Scheduler

      • cmd.exe (PID: 7464)
      • cmd.exe (PID: 6812)
    • Process checks whether UAC notifications are on

      • ylTujhk.exe (PID: 5248)
    • Checks operating system version

      • cmd.exe (PID: 7116)
      • cmd.exe (PID: 6264)
      • cmd.exe (PID: 6476)
      • cmd.exe (PID: 7352)
    • Starts MODE.COM to configure console settings

      • mode.com (PID: 7660)
      • mode.com (PID: 3140)
      • mode.com (PID: 7056)
      • mode.com (PID: 7924)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

ims-api

(PID) Process(2060) 4363463463464363463463463.exe.bin.exe
Discord-Webhook-Tokens (1)1243901656010195086/WUjbiaUfVNR-1f4rmXHcpErSH4eRI1_6pN7cbAjWB9OG6Mmvdq9Kc1CkS9R93rd6LlIe
Discord-Info-Links
1243901656010195086/WUjbiaUfVNR-1f4rmXHcpErSH4eRI1_6pN7cbAjWB9OG6Mmvdq9Kc1CkS9R93rd6LlIe
Get Webhook Infohttps://discord.com/api/webhooks/1243901656010195086/WUjbiaUfVNR-1f4rmXHcpErSH4eRI1_6pN7cbAjWB9OG6Mmvdq9Kc1CkS9R93rd6LlIe

XWorm

(PID) Process(1164) imagelogger.exe
C2among-publication.at.ply.gg:42209
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.0
MutexXoA0MqwQ1nAIklDm

Quasar

(PID) Process(5916) Application Frame Host.exe
Version1.4.1
C2 (2)serveo.net:11453
Sub_DirSubDir
Install_NameApplication Frame Host.exe
Mutex7a1301f7-dc6f-4847-a8ee-ca627a9efa0f
StartupMicrosoft
TagRAT 5 (EPIC VERISON)
LogDirLogs
Signaturej3tTOBHxUHYvLmnOf7HlbeKv1Xdfe9Nud17bNkCIROaLN9omrvbQDEkXbQPmO4+8XEu/wp2lcrmkcKwq2JnDS0lp3iTiTvscZ3HF8roXWniBeTwSzvNrJhS4OazlQWtW9G5NXyBkptMnN9TO2oI33FsqY7dLIGN7mnRCKMt+D71dAHbH1rTANd8ttEMGL4eiwWt6GxBHHRA+lAjLhS5NE6vwStROOmaqz0ojBQ9TmHIeIBmZjo2vYPwiDy1VFUgvg5JXjia2DSKYG3bQOgvCf/GQuJ4PWqJ9AgrNJNpYlRpm...
CertificateMIIE9DCCAtygAwIBAgIQAOw/0jMwVg+N1Rg/1889yTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MDEyMTE3NDExM1oYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAo+k9wQDgzn5wUwkSy5tz44ET0Y8dXc4hdQavoUORLGQ9iWr7kG2RDp4NvghFffQ5X99/76H2...

Remcos

(PID) Process(5020) svchost.exe
C2 (1)185.225.73.67:1050
BotnetCrypt
Options
Connect_interval1
Install_flagTrue
Install_HKCU\RunTrue
Install_HKLM\RunTrue
Install_HKLM\Explorer\Run1
Setup_path%APPDATA%
Copy_file76y5trfed675ytg.exe
Startup_value6754ytr756ytr7654yretg8765uyt
Hide_fileTrue
Mutex_name89765y4tergfw6587ryute-80UMP1
Keylog_flag1
Keylog_path%LOCALAPPDATA%
Keylog_file654ytrf654trf654ytgref.dat
Keylog_cryptFalse
Hide_keylogTrue
Screenshot_flagTrue
Screenshot_time5
Take_ScreenshotTrue
Screenshot_namebank
Screenshot_path%TEMP%
Screenshot_file67y4htergf65trgewfd654tyrfg
Screenshot_cryptFalse
Mouse_optionFalse
Delete_fileTrue
Audio_record_time5
Audio_path%windir%
Audio_dir576ruythg6534trewf
Connect_delay0
Copy_dirkjhgfdc
Keylog_dir67yrtg564tr6754yter
Max_keylog_file0
(PID) Process(828) svchost.exe
C2 (1)185.225.73.67:1050
BotnetCrypt
Options
Connect_interval1
Install_flagTrue
Install_HKCU\RunTrue
Install_HKLM\RunTrue
Install_HKLM\Explorer\Run1
Setup_path%APPDATA%
Copy_file76y5trfed675ytg.exe
Startup_value6754ytr756ytr7654yretg8765uyt
Hide_fileTrue
Mutex_name89765y4tergfw6587ryute-80UMP1
Keylog_flag1
Keylog_path%LOCALAPPDATA%
Keylog_file654ytrf654trf654ytgref.dat
Keylog_cryptFalse
Hide_keylogTrue
Screenshot_flagTrue
Screenshot_time5
Take_ScreenshotTrue
Screenshot_namebank
Screenshot_path%TEMP%
Screenshot_file67y4htergf65trgewfd654tyrfg
Screenshot_cryptFalse
Mouse_optionFalse
Delete_fileTrue
Audio_record_time5
Audio_path%windir%
Audio_dir576ruythg6534trewf
Connect_delay0
Copy_dirkjhgfdc
Keylog_dir67yrtg564tr6754yter
Max_keylog_file0
(PID) Process(5496) svchost.exe
C2 (1)185.225.73.67:1050
BotnetCrypt
Options
Connect_interval1
Install_flagTrue
Install_HKCU\RunTrue
Install_HKLM\RunTrue
Install_HKLM\Explorer\Run1
Setup_path%APPDATA%
Copy_file76y5trfed675ytg.exe
Startup_value6754ytr756ytr7654yretg8765uyt
Hide_fileTrue
Mutex_name89765y4tergfw6587ryute-80UMP1
Keylog_flag1
Keylog_path%LOCALAPPDATA%
Keylog_file654ytrf654trf654ytgref.dat
Keylog_cryptFalse
Hide_keylogTrue
Screenshot_flagTrue
Screenshot_time5
Take_ScreenshotTrue
Screenshot_namebank
Screenshot_path%TEMP%
Screenshot_file67y4htergf65trgewfd654tyrfg
Screenshot_cryptFalse
Mouse_optionFalse
Delete_fileTrue
Audio_record_time5
Audio_path%windir%
Audio_dir576ruythg6534trewf
Connect_delay0
Copy_dirkjhgfdc
Keylog_dir67yrtg564tr6754yter
Max_keylog_file0

SnakeKeylogger

(PID) Process(1372) RegSvcs.exe
Keys
DES6fc98cd68a1aab8b
Options
SMTP Userlinkings@tonicables.top
SMTP Password7213575aceACE@#
SMTP Hostmail.tonicables.top
SMTP SendTolinking@tonicables.top
SMTP Port587
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:12:22 08:29:10+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 80
CodeSize: 5632
InitializedDataSize: 4608
UninitializedDataSize: -
EntryPoint: 0x3552
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 0.0.0.0
InternalName: 4363463463464363463463463.exe
LegalCopyright:
OriginalFileName: 4363463463464363463463463.exe
ProductVersion: 0.0.0.0
AssemblyVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
1 191
Monitored processes
932
Malicious processes
185
Suspicious processes
67

Behavior graph

Click at the process to see the details
start #HAUSBOMBER 4363463463464363463463463.exe.bin.exe conhost.exe no specs #XWORM imagelogger.exe #LUMMA svchost.exe rundll32.exe no specs fondue.exe no specs tiworker.exe optionalfeatures.exe no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs ntvdm.exe no specs conhost.exe no specs #QUASARRAT client-built.exe #METASPLOIT award.pdf.exe schtasks.exe no specs conhost.exe no specs #QUASAR application frame host.exe application frame host.exe no specs schtasks.exe no specs conhost.exe no specs application frame host.exe no specs #GH0ST rustdesk.exe #XWORM xclient.exe #REMCOS notallowedtocrypt.exe cmd.exe no specs conhost.exe no specs reg.exe no specs shellexperiencehost.exe no specs #REMCOS 76y5trfed675ytg.exe cmd.exe no specs #REMCOS svchost.exe conhost.exe no specs cmd.exe no specs conhost.exe no specs #REMCOS svchost.exe no specs reg.exe no specs reg.exe no specs svchsot.exe no specs #REMCOS 76y5trfed675ytg.exe no specs CMSTPLUA #REMCOS 76y5trfed675ytg.exe cmd.exe no specs conhost.exe no specs #REMCOS svchost.exe cmd.exe no specs conhost.exe no specs reg.exe no specs reg.exe no specs linkingg66%206.exe no specs powershell.exe no specs #SNAKE regsvcs.exe conhost.exe no specs opolis.exe powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs slui.exe osm-client.exe hydkj.exe #REMCOS rea.exe no specs #REMCOS iexplore.exe powershell.exe no specs conhost.exe no specs rardkj.exe no specs setup.exe no specs schtasks.exe no specs conhost.exe no specs msiexec.exe google chrome.exe no specs msiexec.exe msiexec.exe idrivert.exe idriver.exe no specs hddrive1095_xinanplug3030_20230619_inno.exe hddrive1095_xinanplug3030_20230619_inno.tmp #REMCOS remcos_a.exe cmd.exe no specs conhost.exe no specs reg.exe no specs wscript.exe no specs critscript.exe jusched.exe openwith.exe no specs cmd.exe no specs conhost.exe no specs #REMCOS remcos.exe cmd.exe no specs #REMCOS iexplore.exe conhost.exe no specs #REMCOS remcos.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs random.exe cmd.exe no specs cmd.exe no specs #REMCOS svchost.exe no specs conhost.exe no specs conhost.exe no specs reg.exe no specs bek6xij8foh9.duma reg.exe no specs schtasks.exe no specs powershell.exe no specs conhost.exe no specs #AMADEY suker.exe schtasks.exe no specs conhost.exe no specs jusched.exe #QUASARRAT sentil.exe regsvr32.exe no specs vcredist2005_x86.exe jusched.exe no specs vcredi~3.exe schtasks.exe no specs conhost.exe no specs msiexec.exe svchost.exe schtasks.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs client1.exe powershell.exe no specs client1.exe no specs rundll32.exe no specs schtasks.exe no specs conhost.exe no specs rundll32.exe no specs msiexec.exe no specs schtasks.exe no specs conhost.exe no specs updatemanager.exe no specs cmd.exe no specs conhost.exe no specs computerdefaults.exe no specs computerdefaults.exe no specs dllhost.exe no specs dllhost.exe computerdefaults.exe updatemanager.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs werfault.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs calendar.exe server1.exe world%20of%20tanks.exe schtasks.exe no specs conhost.exe no specs netsh.exe no specs conhost.exe no specs urbanvpn.exe no specs dllhosts.exe no specs dllhosts.exe no specs wxworkmultiopen.exe no specs conhost.exe no specs random1.exe cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs gyp8zjutjuda.salo no specs schtasks.exe no specs powershell.exe no specs conhost.exe no specs #GENERIC webdown.exe random1.exe cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs qvgwhyx8ujrb.salo no specs schtasks.exe no specs powershell.exe no specs conhost.exe no specs tiworker.exe no specs lncacspsetup(1.0.9.5).exe drvinst.exe gp_clt_lnca_service.exe no specs gp_clt_lnca_service.exe no specs gp_clt_lnca.exe no specs netsigncng-v3.0.3.0.exe netsigncng-v3.0.3.0.tmp calendar.exe gp_clt_lnca.exe no specs installrootcert.exe no specs installrootcertnew.exe no specs installdigicerttrustedrootg4cert.exe no specs regsvr32.exe no specs regsvr32.exe no specs aa_v3.exe no specs regsvr32.exe no specs aa_v3.exe no specs netsigncngguardservice.exe no specs #AMMY aa_v3.exe sc.exe no specs conhost.exe no specs netsigncngguardservice.exe no specs suker.exe no specs dllhosts.exe no specs dllhosts.exe no specs netsigncng.exe keygen.exe no specs rundll32.exe netsigncng.exe no specs update.exe no specs mini_04.exe no specs quizpokemon.exe no specs cmd.exe conhost.exe no specs a9rd5li.exe tasklist.exe no specs findstr.exe no specs bcobalt.exe tasklist.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs shopzilla.pif timeout.exe no specs schtasks.exe no specs conhost.exe no specs wscript.exe no specs sharphound.exe no specs conhost.exe no specs access.exe moctyvd.exe no specs #QUASARRAT example_win32_dx11.exe cmd.exe no specs conhost.exe no specs svchost.exe no specs snd16061.exe #NETSUPPORT client32.exe mimikatz.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs #QUASARRAT system.exe tasklist.exe no specs findstr.exe no specs system.exe tasklist.exe no specs findstr.exe no specs popapoers.exe conhost.exe no specs rw6emtc.exe werfault.exe no specs peerunit.exe werfault.exe no specs 90.exe no specs extrac32.exe no specs findstr.exe no specs #DBATLOADER test1.exe #DBATLOADER adobe.exe calc.exe no specs adobe.exe grid.com choice.exe no specs 90.exe adobeart.exe no specs filea.exe no specs adobe.exe svchost.exe no specs c1.exe no specs #MODILOADER adobeart.exe calc.exe werfault.exe no specs 80ak2ymfb6vbkeu.exe no specs #QUASARRAT svhost.exe cmd.exe no specs conhost.exe no specs chcp.com no specs om8hqgx.exe ping.exe no specs ns6b4a.tmp no specs conhost.exe no specs cmd.exe no specs schtasks.exe no specs conhost.exe no specs svhost.exe rdpw_installer.exe conhost.exe no specs adobeart.exe no specs svhost.exe no specs cmd.exe no specs rdpwinst.exe no specs ping.exe no specs schtasks.exe no specs conhost.exe no specs svhost.exe #SNAKEKEYLOGGER regsvcs.exe #MODILOADER adobeart.exe xcopy.exe xcopy.exe xcopy.exe no specs xcopy.exe no specs THREAT rdpwinst.exe #GENERIC ganja128.exe tasklist.exe no specs findstr.exe no specs svhost.exe inetinfo.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs netsh.exe no specs extrac32.exe no specs adobe.exe #GENERIC byogbftl.exe netsh.exe no specs lgpo.exe no specs findstr.exe no specs jade.com cmd.exe no specs cmd.exe schtasks.exe no specs conhost.exe no specs conhost.exe no specs ping.exe no specs schtasks.exe no specs cmd.exe no specs rdp_cnc.exe no specs svchost.exe no specs rdpwinst.exe no specs nzdbqjy.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs byogbftl.exe no specs suker.exe no specs dllhosts.exe no specs dllhosts.exe no specs gpscript.exe no specs iload.exe conhost.exe no specs yltujhk.exe no specs jeditor.exe svchost.exe no specs b0b34b3375b144c680a0456ffdd639a0.exe no specs adobe.exe cmd.exe no specs conhost.exe no specs index.exe chcp.com no specs ogafrlqr.exe no specs cmd.exe no specs conhost.exe no specs rxspnwwm.exe wn0dqi3w.exe no specs d9esqeiz.exe cmd.exe no specs ping.exe no specs conhost.exe no specs cmd.exe no specs schtasks.exe no specs conhost.exe no specs index.exe no specs cmd.exe no specs conhost.exe no specs ogafrlqr.exe no specs cmd.exe no specs conhost.exe no specs processhide32.exe no specs conhost.exe no specs powershell.exe no specs rxspnwwm.exe chcp.com no specs wn0dqi3w.exe no specs d9esqeiz.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs img001.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs chcp.com no specs conhost.exe no specs taskkill.exe no specs powershell.exe no specs relogintool.exe no specs tskill.exe no specs adobe.exe svchost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs tftp.exe no specs wscript.exe no specs chcp.com no specs reg.exe no specs cscript.exe conhost.exe no specs ping.exe no specs reg.exe no specs mode.com no specs cmd.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs mode.com no specs cmd.exe no specs tasklist.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs tasklist.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs img001.exe reg.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs jade.com no specs reg.exe no specs reg.exe no specs reg.exe no specs jade.com reg.exe no specs reg.exe no specs tskill.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs find.exe no specs reg.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs findstr.exe no specs 7z.exe unlocker.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs taskkill.exe no specs adobe.exe reg.exe no specs find.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs findstr.exe no specs unlocker.exe svchost.exe no specs 7z.exe no specs unlocker.exe no specs cmd.exe no specs conhost.exe no specs unlocker.exe no specs sc.exe no specs unlocker.exe cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs random2.exe no specs taskkill.exe no specs sihost.exe no specs taskkill.exe no specs timeout.exe no specs unlocker.exe no specs unlocker.exe no specs unlocker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs tftp.exe no specs unlocker.exe timeout.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs moctyvd.exe no specs random2.exe no specs sihost.exe no specs cmd.exe no specs conhost.exe no specs unlocker.exe no specs unlocker.exe no specs iobitunlocker.exe iobitunlocker.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs unlocker.exe gp_clt_lnca_service.exe no specs netsigncngguardservice.exe no specs sihost.exe no specs jusched.exe updater.exe no specs plugscheduler.exe no specs svhost.exe wscript.exe no specs client1.exe updatemanager.exe updater.exe no specs mindtechpro360.pif no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs netsigncng.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs dllhost.exe no specs dllhost.exe powershell.exe no specs conhost.exe no specs svchost.exe powershell.exe no specs conhost.exe no specs #REMCOS remcos.exe no specs cmd.exe no specs #REMCOS iexplore.exe conhost.exe no specs #GH0ST svchsot.exe reg.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs reg.exe no specs #REMCOS svchost.exe no specs #REMCOS 76y5trfed675ytg.exe no specs #REMCOS 76y5trfed675ytg.exe cmd.exe no specs conhost.exe no specs #REMCOS svchost.exe cmd.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs powershell.exe no specs conhost.exe no specs #REMCOS remcos.exe no specs gp_clt_lnca.exe no specs netsigncng.exe no specs #DBATLOADER adobe.exe calc.exe no specs adobe.exe adobeart.exe no specs powershell.exe no specs conhost.exe no specs byogbftl.exe application frame host.exe schtasks.exe no specs conhost.exe no specs #REMCOS 76y5trfed675ytg.exe cmd.exe no specs conhost.exe no specs #REMCOS svchost.exe cmd.exe no specs conhost.exe no specs google chrome.exe reg.exe no specs reg.exe no specs schtasks.exe no specs conhost.exe no specs nzdbqjy.exe no specs adobeart.exe #REMCOS remcos.exe no specs werfault.exe no specs dllhosts.exe no specs dllhosts.exe no specs random1.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs eoetdpblapfe.salo no specs schtasks.exe no specs powershell.exe no specs conhost.exe no specs adobe.exe svhost.exe #AMADEY suker.exe schtasks.exe no specs conhost.exe no specs adobeart.exe no specs index.exe no specs ogafrlqr.exe no specs random2.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs rxspnwwm.exe wn0dqi3w.exe no specs d9esqeiz.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs #NETSUPPORT client32.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs chcp.com no specs reg.exe no specs reg.exe no specs mode.com no specs powershell.exe no specs conhost.exe no specs sihost.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs tasklist.exe no specs #MODILOADER adobeart.exe calc.exe werfault.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs explorer.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs powershell.exe no specs conhost.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs find.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs findstr.exe no specs 7z.exe unlocker.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs unlocker.exe cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs timeout.exe no specs schtasks.exe no specs conhost.exe no specs adobe.exe unlocker.exe cmd.exe no specs conhost.exe no specs sc.exe no specs mindtechpro360.pif no specs iobitunlocker.exe no specs gp_clt_lnca_service.exe no specs netsigncngguardservice.exe no specs sihost.exe no specs plugscheduler.exe no specs jusched.exe svhost.exe updater.exe no specs wscript.exe no specs client1.exe updatemanager.exe updater.exe no specs mindtechpro360.pif no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs netsigncng.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs dllhost.exe no specs dllhost.exe svchost.exe powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs #REMCOS remcos.exe no specs cmd.exe no specs conhost.exe no specs #REMCOS iexplore.exe #GH0ST svchsot.exe reg.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs reg.exe no specs #REMCOS svchost.exe no specs #REMCOS 76y5trfed675ytg.exe no specs #REMCOS 76y5trfed675ytg.exe cmd.exe no specs conhost.exe no specs #REMCOS svchost.exe cmd.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs powershell.exe no specs conhost.exe no specs #REMCOS remcos.exe no specs gp_clt_lnca.exe no specs netsigncng.exe no specs #DBATLOADER adobe.exe calc.exe werfault.exe no specs adobeart.exe no specs byogbftl.exe application frame host.exe schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs #REMCOS 76y5trfed675ytg.exe cmd.exe no specs conhost.exe no specs #REMCOS svchost.exe cmd.exe no specs conhost.exe no specs google chrome.exe no specs reg.exe no specs reg.exe no specs nzdbqjy.exe no specs #MODILOADER adobeart.exe calc.exe no specs #REMCOS remcos.exe no specs dllhosts.exe no specs adobeart.exe no specs dllhosts.exe no specs random1.exe cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs n3uzlgtdxyv4.salo no specs schtasks.exe no specs powershell.exe no specs conhost.exe no specs adobe.exe svhost.exe #AMADEY suker.exe schtasks.exe no specs conhost.exe no specs adobeart.exe no specs index.exe no specs ogafrlqr.exe no specs cmd.exe no specs conhost.exe no specs random2.exe no specs rxspnwwm.exe powershell.exe no specs conhost.exe no specs wn0dqi3w.exe no specs d9esqeiz.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs #NETSUPPORT client32.exe #MODILOADER adobeart.exe chcp.com no specs reg.exe no specs reg.exe no specs mode.com no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs tasklist.exe no specs #MODILOADER adobeart.exe powershell.exe no specs conhost.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs find.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs findstr.exe no specs 7z.exe unlocker.exe no specs sihost.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs unlocker.exe powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs timeout.exe no specs explorer.exe no specs powershell.exe no specs conhost.exe no specs unlocker.exe cmd.exe no specs conhost.exe no specs sc.exe no specs schtasks.exe no specs conhost.exe no specs iobitunlocker.exe no specs 4363463463464363463463463.exe.bin.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
8\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
184\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
352C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\sx5udL4esIOd.bat" "C:\Windows\System32\cmd.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
352reg query "HKLM\System\CurrentControlSet\Services\MDCoreSvc" C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
352"C:\WINDOWS\system32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZC:\Windows\System32\cmd.exeIMG001.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
408"RDPWInst" -uC:\Users\admin\AppData\Local\Temp\6F01.tmp\RDPWInst.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\6f01.tmp\rdpwinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
408"C:\Windows\System32\cmd.exe" /c taskkill /f /pid "6484"C:\Windows\System32\cmd.exeUnlocker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
440C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
440"cmd.exe" /c "C:\Users\admin\Desktop\qvGWHyX8uJRB.salo"C:\Windows\System32\cmd.exerandom1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
440tasklistC:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
414 429
Read events
411 740
Write events
2 351
Delete events
338

Modification events

(PID) Process:(2060) 4363463463464363463463463.exe.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2060) 4363463463464363463463463.exe.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2060) 4363463463464363463463463.exe.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2060) 4363463463464363463463463.exe.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2060) 4363463463464363463463463.exe.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2060) 4363463463464363463463463.exe.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2060) 4363463463464363463463463.exe.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2060) 4363463463464363463463463.exe.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2060) 4363463463464363463463463.exe.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2060) 4363463463464363463463463.exe.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
612
Suspicious files
307
Text files
282
Unknown types
191

Dropped files

PID
Process
Filename
Type
5468TiWorker.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
1164imagelogger.exeC:\Users\admin\AppData\Local\Temp\imageloggerexecutable
MD5:9655B8120C0D0469EE87EEBDEECA3B4D
SHA256:D5355284B6411903AB344C3DA20178FF2891B7C14B2CECF27943C9331E6FE652
1164imagelogger.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\imagelogger.lnklnk
MD5:68BAF7455C8EA2B417AAE41C41B51F6D
SHA256:01C5B3F33B8E342433DE8E5DBE77183D9EBED6603708F331EC71E5E917257DD2
20604363463463464363463463463.exe.bin.exeC:\Users\admin\AppData\Local\Temp\Files\02.08.2022.exebinary
MD5:7E519E0B7C8EA4660842AFF7DB13845C
SHA256:D353E2012CCC717C88C043EB3ADBD98D9173C1A3F37F43ED15D83ECDA1BA654D
20604363463463464363463463463.exe.bin.exeC:\Users\admin\AppData\Local\Temp\Files\hbd360.exeexecutable
MD5:FC24F24BDF2136DE19CB979151370C21
SHA256:5EBEACF8FA1BE53D31E0B3E1D72933DEE1A19803AEC0C4002A952B436039C3A5
5468TiWorker.exeC:\Windows\WinSxS\x86_microsoft-windows-ntvdm-system-payload_31bf3856ad364e35_10.0.19041.1_none_a1244509f9cfe2ef\COMMDLG.DLLexecutable
MD5:FF924F8AD691F25E5772B6E1A635831A
SHA256:0E70BCE4B742482C5BFB69B323A3863B43E22211954E82480335C66FA3C03217
5468TiWorker.exeC:\Windows\Logs\CBS\CBS.logtext
MD5:3864B56D5494C36043276950A915F5C0
SHA256:C9385C2ABD94BCB774C1F1E4CB47C0AA69758681B683384DF9914B921CB69956
20604363463463464363463463463.exe.bin.exeC:\Users\admin\AppData\Local\Temp\Files\imagelogger.exeexecutable
MD5:9655B8120C0D0469EE87EEBDEECA3B4D
SHA256:D5355284B6411903AB344C3DA20178FF2891B7C14B2CECF27943C9331E6FE652
5468TiWorker.exeC:\Windows\servicing\Sessions\31192306_2448243362.xmlxml
MD5:40077B265DD491413F340AD751C1AA6F
SHA256:38C1EA3D1E5DE36827FAABEF93C8AAB67A8F59758E68CA7F14EEFEC0D46989D2
5468TiWorker.exeC:\Windows\WinSxS\Temp\InFlight\2f215f98f2f4db01090000005c15440c\x86_microsoft-windows-ntvdm-system-payload_31bf3856ad364e35_10.0.19041.1_none_a1244509f9cfe2ef\SHELL.DLLexecutable
MD5:DC8A8C47542EDD026AD8F4AC3D6C2292
SHA256:988E406AD8DFA8EBAFAE9FF86C9631CEF97045892813FAD570F85F9BBEB44F71
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
185
TCP/UDP connections
693
DNS requests
171
Threats
384

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2664
firefox.exe
POST
200
2.17.190.73:80
http://ocsp.digicert.com/
unknown
whitelisted
2192
svchost.exe
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2060
4363463463464363463463463.exe.bin.exe
GET
200
47.108.141.25:2876
http://47.108.141.25:2876/hbd360.exe
unknown
unknown
2192
svchost.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1164
imagelogger.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
whitelisted
2060
4363463463464363463463463.exe.bin.exe
GET
200
43.159.52.193:80
http://43.159.52.193/02.08.2022.exe
unknown
unknown
5440
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2060
4363463463464363463463463.exe.bin.exe
GET
301
140.82.121.4:80
http://github.com/ValOfficial/Client-follower/raw/refs/heads/main/Client-built.exe
unknown
whitelisted
5440
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2060
4363463463464363463463463.exe.bin.exe
GET
200
62.109.140.53:80
http://www.kokopellz.4fan.cz/koko4.exe
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2076
pingsender.exe
34.120.208.123:443
incoming.telemetry.mozilla.org
GOOGLE-CLOUD-PLATFORM
US
whitelisted
34.120.208.123:443
incoming.telemetry.mozilla.org
GOOGLE-CLOUD-PLATFORM
US
whitelisted
2664
firefox.exe
34.120.208.123:443
incoming.telemetry.mozilla.org
GOOGLE-CLOUD-PLATFORM
US
whitelisted
2664
firefox.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2060
4363463463464363463463463.exe.bin.exe
151.101.130.49:443
urlhaus.abuse.ch
FASTLY
US
whitelisted
2060
4363463463464363463463463.exe.bin.exe
47.108.141.25:2876
Hangzhou Alibaba Advertising Co.,Ltd.
CN
unknown
2192
svchost.exe
20.44.10.122:443
v20.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2192
svchost.exe
23.216.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2060
4363463463464363463463463.exe.bin.exe
185.199.108.133:443
raw.githubusercontent.com
FASTLY
US
whitelisted

DNS requests

Domain
IP
Reputation
incoming.telemetry.mozilla.org
  • 34.120.208.123
whitelisted
telemetry-incoming.r53-2.services.mozilla.com
  • 34.120.208.123
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
e3913.cd.akamaiedge.net
  • 2.17.190.73
unknown
google.com
  • 172.217.18.14
whitelisted
urlhaus.abuse.ch
  • 151.101.130.49
  • 151.101.194.49
  • 151.101.2.49
  • 151.101.66.49
whitelisted
login.live.com
  • 40.126.32.136
  • 20.190.160.128
  • 40.126.32.138
  • 40.126.32.133
  • 20.190.160.64
  • 20.190.160.14
  • 20.190.160.65
  • 40.126.32.72
  • 20.190.160.131
  • 20.190.160.5
  • 20.190.160.2
  • 40.126.32.76
  • 40.126.32.68
  • 20.190.160.20
whitelisted
v20.events.data.microsoft.com
  • 20.44.10.122
  • 52.168.117.169
  • 13.69.109.131
whitelisted
crl.microsoft.com
  • 23.216.77.42
  • 23.216.77.6
  • 23.55.110.193
  • 23.55.110.211
whitelisted
www.microsoft.com
  • 69.192.161.161
whitelisted

Threats

PID
Process
Class
Message
2060
4363463463464363463463463.exe.bin.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
2060
4363463463464363463463463.exe.bin.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2060
4363463463464363463463463.exe.bin.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
2060
4363463463464363463463463.exe.bin.exe
Misc activity
ET INFO Packed Executable Download
2060
4363463463464363463463463.exe.bin.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
1564
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
2060
4363463463464363463463463.exe.bin.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
1564
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
1564
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
1164
imagelogger.exe
A Network Trojan was detected
ET MALWARE Common Stealer Behavior - Source IP Associated with Hosting Provider Check via ip.api .com
Process
Message
4363463463464363463463463.exe.bin.exe
The specified executable is not a valid application for this OS platform.
4363463463464363463463463.exe.bin.exe
The specified executable is not a valid application for this OS platform.
4363463463464363463463463.exe.bin.exe
The file or directory is corrupted and unreadable
4363463463464363463463463.exe.bin.exe
The specified executable is not a valid application for this OS platform.
4363463463464363463463463.exe.bin.exe
The specified executable is not a valid application for this OS platform.
4363463463464363463463463.exe.bin.exe
The underlying connection was closed: An unexpected error occurred on a receive.
4363463463464363463463463.exe.bin.exe
The specified executable is not a valid application for this OS platform.
4363463463464363463463463.exe.bin.exe
The specified executable is not a valid application for this OS platform.
4363463463464363463463463.exe.bin.exe
The specified executable is not a valid application for this OS platform.
CritScript.exe
C:\Users\admin\AppData\Local\Temp\JUSCHED.EXE