File name:

4363463463464363463463463.exe

Full analysis: https://app.any.run/tasks/b663651e-09d0-4cad-9fb6-0ee801106554
Verdict: Malicious activity
Threats:

ACR Stealer is a modern information-stealing malware designed to harvest sensitive data from infected devices. Like other infostealers, it targets credentials, financial details, browser data, and files, enabling cybercriminals to monetize stolen information through direct fraud or underground market sales.

Analysis date: June 18, 2025, 22:18:37
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
hausbomber
github
ssh
pchunter
tool
auto
quasarrat
discord
stealer
python
rat
njrat
bladabindi
evasion
phishing
blankgrabber
noescape
wiper
generic
asyncrat
adware
xred
backdoor
quasar
upx
golang
lumma
metasploit
acr
screenshot
cobaltstrike
snake
keylogger
havoc
stealc
meterpreter
payload
telegram
babadeda
remcos
stealerium
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

2A94F3960C58C6E70826495F76D00B85

SHA1:

E2A1A5641295F5EBF01A37AC1C170AC0814BB71A

SHA256:

2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE

SSDEEP:

192:2we8sGKE6MqyG7c20L7BIW12n/ePSmzkTInu8stYcFwVc03KY:9e8sGKfMqyGg20PKn/cRaInuptYcFwVY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • 4363463463464363463463463.exe (PID: 4708)
      • svchost.exe (PID: 2200)
      • 4363463463464363463463463.exe (PID: 7664)
    • HAUSBOMBER has been detected (YARA)

      • 4363463463464363463463463.exe (PID: 4708)
    • PCHUNTER mutex has been found

      • PCHunter64.exe (PID: 3676)
    • QUASARRAT has been found (auto)

      • 4363463463464363463463463.exe (PID: 4708)
      • 4363463463464363463463463.exe (PID: 4844)
      • Client-built-Playit.exe (PID: 8108)
      • 4363463463464363463463463.exe (PID: 7664)
      • 4363463463464363463463463.exe (PID: 4708)
    • Uses Task Scheduler to autorun other applications

      • JUSCHED.EXE (PID: 5252)
      • jusched.exe (PID: 316)
      • bootstrapper.exe (PID: 6216)
      • Client-built.exe (PID: 3048)
      • Windows Font Manager.exe (PID: 7552)
      • Client-built-Playit.exe (PID: 8108)
      • System32.exe (PID: 9148)
      • Client-built8.exe (PID: 10060)
    • NjRAT is detected

      • server.exe (PID: 4312)
    • Changes the autorun value in the registry

      • server.exe (PID: 4312)
      • set-2%20firmware%204.01.exe (PID: 8236)
      • es.exe (PID: 9136)
      • Axam.a.exe (PID: 9412)
      • Axam.exe (PID: 5248)
      • Axam.exe (PID: 10456)
      • Axam.exe (PID: 10600)
      • Axam.exe (PID: 10764)
      • Axam.exe (PID: 10736)
      • Axam.exe (PID: 10888)
      • Axam.exe (PID: 10856)
      • Axam.exe (PID: 11012)
      • Axam.exe (PID: 8768)
      • Axam.exe (PID: 10496)
      • Axam.exe (PID: 8620)
      • Axam.exe (PID: 10444)
      • Axam.exe (PID: 10080)
      • Axam.exe (PID: 10904)
      • Axam.exe (PID: 10508)
      • Axam.exe (PID: 8692)
      • Axam.exe (PID: 10896)
      • Axam.exe (PID: 10044)
      • Axam.exe (PID: 1056)
      • Axam.exe (PID: 9496)
      • Axam.exe (PID: 11148)
      • Axam.exe (PID: 8880)
      • Axam.exe (PID: 9444)
      • Axam.exe (PID: 2632)
      • Axam.exe (PID: 9372)
      • Axam.exe (PID: 10464)
      • Axam.exe (PID: 8212)
      • Axam.exe (PID: 11192)
      • Axam.exe (PID: 3644)
      • Axam.exe (PID: 7956)
      • Axam.exe (PID: 8868)
      • Axam.exe (PID: 11336)
      • Axam.exe (PID: 11448)
      • Axam.exe (PID: 11516)
      • Axam.exe (PID: 11668)
      • Axam.exe (PID: 12148)
      • Axam.exe (PID: 12164)
      • Axam.exe (PID: 12096)
      • Axam.exe (PID: 12116)
      • Axam.exe (PID: 12204)
      • Axam.exe (PID: 12252)
      • Axam.exe (PID: 12212)
      • Axam.exe (PID: 7516)
      • Axam.exe (PID: 8712)
      • Axam.exe (PID: 9472)
      • Axam.exe (PID: 8732)
      • Axam.exe (PID: 11132)
      • Axam.exe (PID: 7524)
      • Axam.exe (PID: 10248)
      • Axam.exe (PID: 11184)
      • Axam.exe (PID: 11544)
      • Axam.exe (PID: 8816)
      • Axam.exe (PID: 11532)
      • Axam.exe (PID: 11464)
      • Axam.exe (PID: 756)
      • Axam.exe (PID: 10328)
      • Axam.exe (PID: 10936)
      • Axam.exe (PID: 8992)
      • Axam.exe (PID: 11660)
      • Axam.exe (PID: 8968)
      • Axam.exe (PID: 8056)
      • Axam.exe (PID: 10876)
      • Axam.exe (PID: 12044)
      • Axam.exe (PID: 10992)
      • Axam.exe (PID: 5896)
      • Axam.exe (PID: 10320)
      • Axam.exe (PID: 10164)
      • Axam.exe (PID: 11368)
      • Axam.exe (PID: 10312)
      • Axam.exe (PID: 9004)
      • Axam.exe (PID: 10172)
      • Axam.exe (PID: 8208)
      • Axam.exe (PID: 3740)
      • Axam.exe (PID: 3748)
      • Axam.exe (PID: 5692)
      • Axam.exe (PID: 8252)
      • Axam.exe (PID: 8204)
      • Axam.exe (PID: 2044)
      • Axam.exe (PID: 8896)
      • Axam.exe (PID: 8036)
      • Axam.exe (PID: 10440)
      • Axam.exe (PID: 3048)
      • Axam.exe (PID: 3956)
      • Axam.exe (PID: 8388)
      • Axam.exe (PID: 7748)
      • Axam.exe (PID: 11236)
      • Axam.exe (PID: 10112)
      • Axam.exe (PID: 8728)
      • Axam.exe (PID: 1984)
      • Axam.exe (PID: 7460)
      • Axam.exe (PID: 8856)
      • Axam.exe (PID: 5012)
      • Axam.exe (PID: 2708)
      • Axam.exe (PID: 6900)
      • Axam.exe (PID: 6236)
      • Axam.exe (PID: 7640)
      • Axam.exe (PID: 7008)
      • Axam.exe (PID: 7872)
      • Axam.exe (PID: 9748)
      • Axam.exe (PID: 9172)
      • Axam.exe (PID: 8564)
      • Axam.exe (PID: 9716)
      • Axam.exe (PID: 10316)
      • Axam.exe (PID: 10644)
      • Axam.exe (PID: 12312)
      • Axam.exe (PID: 9204)
      • Axam.exe (PID: 12332)
      • Axam.exe (PID: 10928)
    • Steals credentials from Web Browsers

      • main.exe (PID: 6756)
      • Built.exe (PID: 7900)
      • random.exe (PID: 8480)
      • RegSvcs.exe (PID: 11644)
    • Actions looks like stealing of personal data

      • main.exe (PID: 6756)
      • Built.exe (PID: 7900)
      • random.exe (PID: 8480)
      • RegSvcs.exe (PID: 11644)
    • GENERIC has been found (auto)

      • 4363463463464363463463463.exe (PID: 4060)
      • 4363463463464363463463463.exe (PID: 1652)
      • 4363463463464363463463463.exe (PID: 1932)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 4688)
      • 4363463463464363463463463.exe (PID: 7336)
      • 4363463463464363463463463.exe (PID: 1652)
      • 4363463463464363463463463.exe (PID: 7336)
      • 4363463463464363463463463.exe (PID: 7336)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 4708)
      • 4363463463464363463463463.exe (PID: 4060)
      • 4363463463464363463463463.exe (PID: 1652)
    • NJRAT has been detected (YARA)

      • server.exe (PID: 4312)
    • QUASAR has been found (auto)

      • 4363463463464363463463463.exe (PID: 4844)
      • Client-built.exe (PID: 3048)
      • 4363463463464363463463463.exe (PID: 4844)
    • PHISHING has been detected (SURICATA)

      • svchost.exe (PID: 2200)
    • ASYNCRAT has been found (auto)

      • 4363463463464363463463463.exe (PID: 1932)
      • 4363463463464363463463463.exe (PID: 1932)
      • 4363463463464363463463463.exe (PID: 4688)
      • 4363463463464363463463463.exe (PID: 7664)
      • Terminal_9235.exe (PID: 2388)
      • 4363463463464363463463463.exe (PID: 4060)
    • Executing a file with an untrusted certificate

      • Built.exe (PID: 7400)
      • Built.exe (PID: 7900)
      • random.exe (PID: 8480)
    • BlankGrabber has been detected

      • Built.exe (PID: 7400)
    • METASPLOIT has been found (auto)

      • 4363463463464363463463463.exe (PID: 1932)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 4708)
    • Adds path to the Windows Defender exclusion list

      • Built.exe (PID: 7900)
      • cmd.exe (PID: 7384)
      • boleto.exe (PID: 7632)
      • XClient.exe (PID: 8268)
    • Antivirus name has been found in the command line (generic signature)

      • cmd.exe (PID: 7388)
    • NOESCAPE has been detected

      • NoEscape.exe (PID: 7548)
    • ACR has been found (auto)

      • 4363463463464363463463463.exe (PID: 6956)
    • Changes Windows Defender settings

      • cmd.exe (PID: 7384)
      • cmd.exe (PID: 7388)
      • boleto.exe (PID: 7632)
      • XClient.exe (PID: 8268)
    • Changes settings for sending potential threat samples to Microsoft servers

      • powershell.exe (PID: 8604)
    • Changes settings for reporting to Microsoft Active Protection Service (MAPS)

      • powershell.exe (PID: 8604)
    • Changes settings for protection against network attacks (IPS)

      • powershell.exe (PID: 8604)
    • Changes settings for real-time protection

      • powershell.exe (PID: 8604)
    • Changes antivirus protection settings for downloading files from the Internet (IOAVProtection)

      • powershell.exe (PID: 8604)
    • Changes settings for checking scripts for malicious actions

      • powershell.exe (PID: 8604)
    • Changes Controlled Folder Access settings

      • powershell.exe (PID: 8604)
    • ASYNCRAT has been detected (MUTEX)

      • aaa%20(3).exe (PID: 7392)
    • Application was injected by another process

      • explorer.exe (PID: 4772)
    • Runs injected code in another process

      • celkadrobitel.exe (PID: 9320)
    • QUASAR has been detected (YARA)

      • jusched.exe (PID: 316)
    • Changes powershell execution policy (Bypass)

      • boleto.exe (PID: 7632)
      • cmd.exe (PID: 9068)
      • XClient.exe (PID: 8268)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 9636)
      • powershell.exe (PID: 9788)
      • powershell.exe (PID: 10104)
    • XRED mutex has been found

      • es.exe (PID: 9136)
      • Synaptics.exe (PID: 9556)
    • STEALERIUM has been found (auto)

      • 4363463463464363463463463.exe (PID: 4844)
    • Create files in the Startup directory

      • Axam.a.exe (PID: 9412)
      • eric.exe (PID: 8548)
    • COBALTSTRIKE has been found (auto)

      • 4363463463464363463463463.exe (PID: 7336)
    • HAVOC has been found (auto)

      • 4363463463464363463463463.exe (PID: 7664)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2200)
      • MSBuild.exe (PID: 10216)
    • LUMMA mutex has been found

      • MSBuild.exe (PID: 10216)
    • BABADEDA has been found (auto)

      • 4363463463464363463463463.exe (PID: 7664)
    • Detects Cygwin installation

      • unzip.exe (PID: 7516)
    • REMCOS has been found (auto)

      • 4363463463464363463463463.exe (PID: 4844)
    • Adds process to the Windows Defender exclusion list

      • XClient.exe (PID: 8268)
      • boleto.exe (PID: 7632)
    • Resets Windows Defender malware definitions to the base version

      • MpCmdRun.exe (PID: 10208)
    • STEALER has been found (auto)

      • 4363463463464363463463463.exe (PID: 7336)
    • SNAKEKEYLOGGER has been detected (SURICATA)

      • RegSvcs.exe (PID: 11644)
    • METERPRETER has been detected (SURICATA)

      • 4363463463464363463463463.exe (PID: 7664)
      • 4363463463464363463463463.exe (PID: 4844)
    • METASPLOIT has been detected (SURICATA)

      • 4363463463464363463463463.exe (PID: 7664)
      • 4363463463464363463463463.exe (PID: 4844)
    • LUMMA has been found (auto)

      • 4363463463464363463463463.exe (PID: 4708)
      • 4363463463464363463463463.exe (PID: 7664)
      • 4363463463464363463463463.exe (PID: 1652)
    • BLANKGRABBER has been detected (SURICATA)

      • Built.exe (PID: 7900)
    • COINMINER has been found (auto)

      • 4363463463464363463463463.exe (PID: 4688)
      • 4363463463464363463463463.exe (PID: 4688)
    • SNAKE has been found (auto)

      • 4363463463464363463463463.exe (PID: 1652)
  • SUSPICIOUS

    • Contacting a server suspected of hosting an CnC

      • 4363463463464363463463463.exe (PID: 4708)
      • MSBuild.exe (PID: 10216)
      • svchost.exe (PID: 2200)
      • 4363463463464363463463463.exe (PID: 7664)
    • Reads security settings of Internet Explorer

      • 4363463463464363463463463.exe (PID: 4708)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 6344)
      • CritScript.exe (PID: 4680)
      • 4363463463464363463463463.exe (PID: 4060)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 1932)
      • 4363463463464363463463463.exe (PID: 1652)
      • BootstrapperNew.exe (PID: 5008)
      • 3e3ev3.exe (PID: 7228)
      • 4363463463464363463463463.exe (PID: 4688)
      • 4363463463464363463463463.exe (PID: 6956)
      • 4363463463464363463463463.exe (PID: 7664)
      • pornhub_downloader.exe (PID: 7800)
      • 4363463463464363463463463.exe (PID: 7336)
      • es.exe (PID: 9136)
      • boleto.exe (PID: 7632)
      • DhlServer.exe (PID: 9308)
      • XClient.exe (PID: 8268)
      • namu832.exe (PID: 7808)
      • PCclear_Eng_mini.exe (PID: 10068)
      • Terminal_9235.exe (PID: 2388)
      • dfsvc.exe (PID: 10016)
    • Application launched itself

      • 3=====.exe (PID: 2532)
      • MS14-068.exe (PID: 7060)
      • main.exe (PID: 6172)
      • Built.exe (PID: 7400)
      • rsync.exe (PID: 11328)
    • Connects to unusual port

      • 3=====.exe (PID: 5620)
      • 4363463463464363463463463.exe (PID: 4708)
      • jusched.exe (PID: 316)
      • bootstrapper.exe (PID: 6216)
      • access.exe (PID: 1352)
      • 4363463463464363463463463.exe (PID: 1932)
      • 4363463463464363463463463.exe (PID: 4688)
      • esp32.exe (PID: 7964)
      • 4363463463464363463463463.exe (PID: 7664)
      • 4363463463464363463463463.exe (PID: 6956)
      • Windows Font Manager.exe (PID: 7552)
      • 4363463463464363463463463.exe (PID: 7336)
      • System32.exe (PID: 9148)
      • 4363463463464363463463463.exe (PID: 1652)
      • eric.exe (PID: 8548)
      • rsync.exe (PID: 11328)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 4060)
      • aaa%20(3).exe (PID: 7392)
    • Process requests binary or script from the Internet

      • 4363463463464363463463463.exe (PID: 4708)
      • 4363463463464363463463463.exe (PID: 4060)
      • 4363463463464363463463463.exe (PID: 1652)
      • 4363463463464363463463463.exe (PID: 1932)
      • 4363463463464363463463463.exe (PID: 4688)
      • 4363463463464363463463463.exe (PID: 7664)
      • 4363463463464363463463463.exe (PID: 6956)
      • 4363463463464363463463463.exe (PID: 7336)
      • DhlServer.exe (PID: 9308)
      • macmid_sonoma_14_5.exe (PID: 9448)
      • 4363463463464363463463463.exe (PID: 4844)
    • Potential Corporate Privacy Violation

      • 4363463463464363463463463.exe (PID: 4708)
      • 3=====.exe (PID: 5620)
      • 4363463463464363463463463.exe (PID: 4060)
      • 4363463463464363463463463.exe (PID: 1652)
      • 4363463463464363463463463.exe (PID: 1932)
      • 4363463463464363463463463.exe (PID: 7336)
      • 4363463463464363463463463.exe (PID: 4688)
      • 4363463463464363463463463.exe (PID: 7664)
      • 4363463463464363463463463.exe (PID: 6956)
      • 4363463463464363463463463.exe (PID: 4844)
      • macmid_sonoma_14_5.exe (PID: 9448)
      • random.exe (PID: 8480)
    • Executable content was dropped or overwritten

      • explorer.exe (PID: 4772)
      • 4363463463464363463463463.exe (PID: 4708)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 6344)
      • CritScript.exe (PID: 4680)
      • JUSCHED.EXE (PID: 5252)
      • PCHunter64.exe (PID: 3676)
      • main.exe (PID: 6172)
      • MS14-068.exe (PID: 7060)
      • 4363463463464363463463463.exe (PID: 4060)
      • bootstrapper.exe (PID: 6424)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 1932)
      • Client-built.exe (PID: 3048)
      • Built.exe (PID: 7400)
      • 4363463463464363463463463.exe (PID: 4688)
      • 4363463463464363463463463.exe (PID: 6956)
      • 4363463463464363463463463.exe (PID: 7664)
      • namu832.exe (PID: 7808)
      • set-2%20firmware%204.01.exe (PID: 8236)
      • Client-built-Playit.exe (PID: 8108)
      • 4363463463464363463463463.exe (PID: 7336)
      • es.exe (PID: 9136)
      • Axam.a.exe (PID: 9412)
      • Synaptics.exe (PID: 9556)
      • Terminal_9235.exe (PID: 2388)
      • Client-built8.exe (PID: 10060)
      • macmid_sonoma_14_5.exe (PID: 9448)
      • eric.exe (PID: 8548)
      • DhlServer.exe (PID: 9308)
      • 4363463463464363463463463.exe (PID: 1652)
      • unzip.exe (PID: 7516)
      • csc.exe (PID: 4816)
      • random.exe (PID: 8480)
    • Starts itself from another location

      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 6344)
      • JUSCHED.EXE (PID: 5252)
      • bootstrapper.exe (PID: 6424)
      • Client-built.exe (PID: 3048)
      • Client-built-Playit.exe (PID: 8108)
    • Identifying current user with WHOAMI command

      • 3=====.exe (PID: 5620)
    • Drops a system driver (possible attempt to evade defenses)

      • PCHunter64.exe (PID: 3676)
    • Creates or modifies Windows services

      • PCHunter64.exe (PID: 3676)
      • DhlServer.exe (PID: 9308)
    • Process drops python dynamic module

      • main.exe (PID: 6172)
      • MS14-068.exe (PID: 7060)
      • Built.exe (PID: 7400)
    • The process drops C-runtime libraries

      • main.exe (PID: 6172)
      • MS14-068.exe (PID: 7060)
      • Built.exe (PID: 7400)
    • Process drops legitimate windows executable

      • main.exe (PID: 6172)
      • MS14-068.exe (PID: 7060)
      • Built.exe (PID: 7400)
      • 4363463463464363463463463.exe (PID: 4688)
      • 4363463463464363463463463.exe (PID: 7664)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 1652)
    • Loads Python modules

      • main.exe (PID: 6756)
    • Starts CMD.EXE for commands execution

      • main.exe (PID: 6756)
      • Built.exe (PID: 7900)
      • pornhub_downloader.exe (PID: 7800)
      • Terminal_9235.exe (PID: 2388)
      • macmid_sonoma_14_5.exe (PID: 9448)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 7072)
      • cmd.exe (PID: 3624)
      • cmd.exe (PID: 6796)
      • cmd.exe (PID: 1896)
      • cmd.exe (PID: 8616)
      • cmd.exe (PID: 11352)
    • Creates file in the systems drive root

      • explorer.exe (PID: 4772)
      • Axam.a.exe (PID: 9412)
      • Axam.exe (PID: 5248)
      • Axam.exe (PID: 10456)
      • Axam.exe (PID: 10600)
      • Axam.exe (PID: 10736)
      • Axam.exe (PID: 10764)
      • Axam.exe (PID: 10856)
      • Axam.exe (PID: 10888)
      • Axam.exe (PID: 11012)
      • Axam.exe (PID: 8768)
      • Axam.exe (PID: 10496)
      • Axam.exe (PID: 10508)
      • Axam.exe (PID: 10080)
      • Axam.exe (PID: 8620)
      • Axam.exe (PID: 10444)
      • Axam.exe (PID: 8692)
      • Axam.exe (PID: 10904)
      • Axam.exe (PID: 10044)
      • Axam.exe (PID: 1056)
      • Axam.exe (PID: 10896)
      • Axam.exe (PID: 9496)
      • Axam.exe (PID: 11148)
      • Axam.exe (PID: 2632)
      • Axam.exe (PID: 9372)
      • Axam.exe (PID: 8880)
      • Axam.exe (PID: 9444)
      • Axam.exe (PID: 8212)
      • Axam.exe (PID: 10464)
      • Axam.exe (PID: 11192)
      • Axam.exe (PID: 7956)
      • Axam.exe (PID: 3644)
      • Axam.exe (PID: 8868)
      • Axam.exe (PID: 11336)
      • Axam.exe (PID: 11448)
      • Axam.exe (PID: 11516)
      • Axam.exe (PID: 11668)
      • Axam.exe (PID: 12116)
      • Axam.exe (PID: 12148)
      • Axam.exe (PID: 12164)
      • Axam.exe (PID: 12096)
      • Axam.exe (PID: 12212)
      • Axam.exe (PID: 12204)
      • Axam.exe (PID: 12252)
      • Axam.exe (PID: 7516)
      • Axam.exe (PID: 8712)
      • Axam.exe (PID: 8732)
      • Axam.exe (PID: 10248)
      • Axam.exe (PID: 9472)
      • Axam.exe (PID: 11132)
      • Axam.exe (PID: 7524)
      • Axam.exe (PID: 8816)
      • Axam.exe (PID: 11184)
      • Axam.exe (PID: 11544)
      • Axam.exe (PID: 11532)
      • Axam.exe (PID: 11464)
      • Axam.exe (PID: 756)
      • Axam.exe (PID: 8992)
      • Axam.exe (PID: 10328)
      • Axam.exe (PID: 10936)
      • Axam.exe (PID: 11660)
      • Axam.exe (PID: 8968)
      • Axam.exe (PID: 8056)
      • Axam.exe (PID: 10876)
      • Axam.exe (PID: 12044)
      • Axam.exe (PID: 5896)
      • Axam.exe (PID: 10992)
      • Axam.exe (PID: 10320)
      • Axam.exe (PID: 10164)
      • Axam.exe (PID: 11368)
      • Axam.exe (PID: 10312)
      • Axam.exe (PID: 8952)
      • Axam.exe (PID: 9004)
      • Axam.exe (PID: 10172)
      • Axam.exe (PID: 3760)
      • Axam.exe (PID: 8208)
      • Axam.exe (PID: 3748)
      • Axam.exe (PID: 8204)
      • Axam.exe (PID: 10440)
      • Axam.exe (PID: 8036)
      • Axam.exe (PID: 3048)
      • Axam.exe (PID: 10632)
      • Axam.exe (PID: 7748)
      • Axam.exe (PID: 11236)
      • Axam.exe (PID: 10112)
      • Axam.exe (PID: 9664)
      • Axam.exe (PID: 8728)
      • Axam.exe (PID: 4232)
      • Axam.exe (PID: 1984)
      • Axam.exe (PID: 7460)
      • Axam.exe (PID: 6236)
      • Axam.exe (PID: 2708)
      • Axam.exe (PID: 5012)
      • Axam.exe (PID: 7008)
      • Axam.exe (PID: 6344)
      • Axam.exe (PID: 9748)
      • Axam.exe (PID: 8564)
      • Axam.exe (PID: 7812)
      • Axam.exe (PID: 9172)
      • Axam.exe (PID: 10048)
      • Axam.exe (PID: 10232)
      • Axam.exe (PID: 8556)
      • Axam.exe (PID: 9716)
      • Axam.exe (PID: 10316)
      • Axam.exe (PID: 10644)
      • Axam.exe (PID: 9204)
      • Axam.exe (PID: 12312)
      • Axam.exe (PID: 12332)
      • Axam.exe (PID: 10928)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • server.exe (PID: 4312)
    • Accesses product unique identifier via WMI (SCRIPT)

      • WMIC.exe (PID: 6216)
      • WMIC.exe (PID: 5780)
      • WMIC.exe (PID: 2520)
      • WMIC.exe (PID: 7152)
      • WMIC.exe (PID: 8120)
    • Checks for external IP

      • svchost.exe (PID: 2200)
      • boleto.exe (PID: 7632)
      • RegSvcs.exe (PID: 11644)
      • Built.exe (PID: 7900)
    • Connects to the server without a host name

      • 4363463463464363463463463.exe (PID: 4060)
      • 4363463463464363463463463.exe (PID: 1652)
      • esp32.exe (PID: 7964)
      • 4363463463464363463463463.exe (PID: 6956)
      • 4363463463464363463463463.exe (PID: 7664)
      • 4363463463464363463463463.exe (PID: 4688)
      • DhlServer.exe (PID: 9308)
      • 4363463463464363463463463.exe (PID: 7336)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 4708)
    • Uses NETSH.EXE to obtain data on the network

      • cmd.exe (PID: 6224)
      • cmd.exe (PID: 4476)
      • cmd.exe (PID: 856)
      • cmd.exe (PID: 8756)
    • Detected use of alternative data streams (AltDS)

      • main.exe (PID: 6756)
    • Starts a Microsoft application from unusual location

      • Built.exe (PID: 7400)
      • Built.exe (PID: 7900)
      • set-2%20firmware%204.01.exe (PID: 8236)
      • Windows%20Update.exe (PID: 8524)
    • Reads the date of Windows installation

      • 3e3ev3.exe (PID: 7228)
      • boleto.exe (PID: 7632)
      • XClient.exe (PID: 8268)
    • Executes application which crashes

      • 3e3ev3.exe (PID: 7228)
      • support.client.exe (PID: 9648)
    • Contacting a server suspected of hosting an Exploit Kit

      • 4363463463464363463463463.exe (PID: 7336)
      • 4363463463464363463463463.exe (PID: 4708)
      • 4363463463464363463463463.exe (PID: 4060)
      • 4363463463464363463463463.exe (PID: 7664)
    • Found strings related to reading or modifying Windows Defender settings

      • Built.exe (PID: 7900)
    • Get information on the list of running processes

      • Built.exe (PID: 7900)
      • cmd.exe (PID: 8216)
      • cmd.exe (PID: 8248)
      • cmd.exe (PID: 8668)
    • Executing commands from a ".bat" file

      • pornhub_downloader.exe (PID: 7800)
      • Terminal_9235.exe (PID: 2388)
    • Script adds exclusion path to Windows Defender

      • cmd.exe (PID: 7384)
      • boleto.exe (PID: 7632)
      • XClient.exe (PID: 8268)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 7384)
      • cmd.exe (PID: 7388)
      • cmd.exe (PID: 8636)
      • boleto.exe (PID: 7632)
      • cmd.exe (PID: 9068)
      • XClient.exe (PID: 8268)
      • cmd.exe (PID: 5596)
      • cmd.exe (PID: 9060)
      • cmd.exe (PID: 2044)
      • cmd.exe (PID: 7644)
    • Script disables Windows Defender's IPS

      • cmd.exe (PID: 7388)
    • Script disables Windows Defender's real-time protection

      • cmd.exe (PID: 7388)
    • There is functionality for taking screenshot (YARA)

      • jusched.exe (PID: 316)
    • Adds/modifies Windows certificates

      • support.client.exe (PID: 9648)
    • BASE64 encoded PowerShell command has been detected

      • cmd.exe (PID: 9068)
    • Base64-obfuscated command line is found

      • cmd.exe (PID: 9068)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 9068)
    • Uses SYSTEMINFO.EXE to read the environment

      • cmd.exe (PID: 8904)
    • Starts application with an unusual extension

      • cmd.exe (PID: 8712)
      • cmd.exe (PID: 10400)
      • cmd.exe (PID: 8760)
      • cmd.exe (PID: 4944)
      • cmd.exe (PID: 11276)
      • cmd.exe (PID: 11560)
    • Access to an unwanted program domain was detected

      • DhlServer.exe (PID: 9308)
    • Accesses antivirus product name via WMI (SCRIPT)

      • WMIC.exe (PID: 9564)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 10840)
    • Searches for installed software

      • MSBuild.exe (PID: 10216)
    • Reads Internet Explorer settings

      • dfsvc.exe (PID: 10016)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 4816)
    • The executable file from the user directory is run by the CMD process

      • client.exe (PID: 9824)
      • rar.exe (PID: 8388)
    • The process creates files with name similar to system file names

      • 4363463463464363463463463.exe (PID: 1652)
      • 4363463463464363463463463.exe (PID: 4844)
    • Captures screenshot (POWERSHELL)

      • powershell.exe (PID: 9788)
    • Uses WMIC.EXE to obtain operating system information

      • cmd.exe (PID: 9632)
    • Accesses operating system name via WMI (SCRIPT)

      • WMIC.exe (PID: 4172)
    • Uses WMIC.EXE to obtain computer system information

      • cmd.exe (PID: 10416)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • RegSvcs.exe (PID: 11644)
    • Uses WMIC.EXE to obtain a list of video controllers

      • cmd.exe (PID: 10632)
    • Accesses video controller name via WMI (SCRIPT)

      • WMIC.exe (PID: 8672)
  • INFO

    • Reads the machine GUID from the registry

      • 4363463463464363463463463.exe (PID: 4708)
      • JUSCHED.EXE (PID: 5252)
      • jusched.exe (PID: 316)
      • MS14-068.exe (PID: 3628)
      • main.exe (PID: 6756)
      • server.exe (PID: 4312)
      • 4363463463464363463463463.exe (PID: 4060)
      • bootstrapper.exe (PID: 6424)
      • 4363463463464363463463463.exe (PID: 4844)
      • bootstrapper.exe (PID: 6216)
      • 4363463463464363463463463.exe (PID: 6956)
      • 4363463463464363463463463.exe (PID: 1652)
      • 4363463463464363463463463.exe (PID: 1932)
      • Client-built.exe (PID: 3048)
      • BootstrapperNew.exe (PID: 5008)
      • 3e3ev3.exe (PID: 7228)
      • 4363463463464363463463463.exe (PID: 4688)
      • 4363463463464363463463463.exe (PID: 7336)
      • boleto.exe (PID: 7632)
      • 4363463463464363463463463.exe (PID: 7664)
      • Windows Font Manager.exe (PID: 7552)
      • SharpHound.exe (PID: 8044)
      • aaa%20(3).exe (PID: 7392)
      • Client-built-Playit.exe (PID: 8108)
      • qcoin142.exe (PID: 8512)
      • XClient.exe (PID: 8268)
      • System32.exe (PID: 9148)
      • Windows%20Update.exe (PID: 8524)
      • Terminal_9235.exe (PID: 2388)
      • eric.exe (PID: 8548)
      • support.client.exe (PID: 9648)
      • Phantom.exe (PID: 8972)
      • Client-built8.exe (PID: 10060)
      • dfsvc.exe (PID: 10016)
      • MSBuild.exe (PID: 10216)
      • csc.exe (PID: 4816)
      • client.exe (PID: 9824)
      • RegSvcs.exe (PID: 11644)
      • random.exe (PID: 8480)
      • rar.exe (PID: 8388)
    • Checks supported languages

      • 4363463463464363463463463.exe (PID: 4708)
      • 3=====.exe (PID: 2532)
      • 3=====.exe (PID: 5620)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 6344)
      • server.exe (PID: 4312)
      • PCHunter64.exe (PID: 3676)
      • CritScript.exe (PID: 4680)
      • JUSCHED.EXE (PID: 5252)
      • jusched.exe (PID: 316)
      • main.exe (PID: 6172)
      • MS14-068.exe (PID: 7060)
      • MS14-068.exe (PID: 3628)
      • main.exe (PID: 6756)
      • 4363463463464363463463463.exe (PID: 4060)
      • bootstrapper.exe (PID: 6424)
      • bootstrapper.exe (PID: 6216)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 6956)
      • access.exe (PID: 1352)
      • 4363463463464363463463463.exe (PID: 1932)
      • Client-built.exe (PID: 3048)
      • 4363463463464363463463463.exe (PID: 1652)
      • asistenciaok3.exe (PID: 6336)
      • BootstrapperNew.exe (PID: 5008)
      • 4363463463464363463463463.exe (PID: 4688)
      • 3e3ev3.exe (PID: 7228)
      • Built.exe (PID: 7400)
      • aaa%20(3).exe (PID: 7392)
      • Windows Font Manager.exe (PID: 7552)
      • 4363463463464363463463463.exe (PID: 7336)
      • 4363463463464363463463463.exe (PID: 7664)
      • kdmapper_Release.exe (PID: 7756)
      • boleto.exe (PID: 7632)
      • hack.exe (PID: 7848)
      • esp32.exe (PID: 7964)
      • SharpHound.exe (PID: 8044)
      • Built.exe (PID: 7900)
      • Client-built-Playit.exe (PID: 8108)
      • pornhub_downloader.exe (PID: 7800)
      • NoEscape.exe (PID: 7548)
      • namu832.exe (PID: 7808)
      • Terminal_9235.exe (PID: 2388)
      • set-2%20firmware%204.01.exe (PID: 8236)
      • WxWorkMultiOpen.exe (PID: 7876)
      • qcoin142.exe (PID: 8512)
      • SLoader.exe (PID: 8528)
      • random.exe (PID: 8480)
      • Phantom.exe (PID: 8972)
      • System32.exe (PID: 9148)
      • es.exe (PID: 9136)
      • XClient.exe (PID: 8268)
      • Windows%20Update.exe (PID: 8524)
      • MEMZ.exe (PID: 8596)
      • eric.exe (PID: 8548)
      • fdsfsd.exe (PID: 9228)
      • jtEmt5nxbRnq5jC.exe (PID: 9252)
      • celkadrobitel.exe (PID: 9320)
      • DhlServer.exe (PID: 9308)
      • Axam.a.exe (PID: 9412)
      • support.client.exe (PID: 9648)
      • TestMemTest35.exe (PID: 9404)
      • ._cache_es.exe (PID: 9704)
      • tree.com (PID: 9820)
      • dfsvc.exe (PID: 10016)
      • PCclear_Eng_mini.exe (PID: 10068)
      • macmid_sonoma_14_5.exe (PID: 9448)
      • Client-built8.exe (PID: 10060)
      • Synaptics.exe (PID: 9556)
      • Axam.exe (PID: 5248)
      • namu832.exe (PID: 10260)
      • Axam.exe (PID: 10456)
      • Axam.exe (PID: 10600)
      • Axam.exe (PID: 10764)
      • Axam.exe (PID: 10736)
      • Axam.exe (PID: 10888)
      • Axam.exe (PID: 11012)
      • MSBuild.exe (PID: 10216)
      • Axam.exe (PID: 10856)
      • Axam.exe (PID: 10496)
      • tree.com (PID: 11244)
      • Axam.exe (PID: 8768)
      • Axam.exe (PID: 10444)
      • Axam.exe (PID: 8620)
      • Axam.exe (PID: 10508)
      • Axam.exe (PID: 8692)
      • Axam.exe (PID: 10080)
      • Axam.exe (PID: 10904)
      • Axam.exe (PID: 10896)
      • Axam.exe (PID: 1056)
      • Axam.exe (PID: 10044)
      • Axam.exe (PID: 9496)
      • tree.com (PID: 10852)
      • Axam.exe (PID: 11148)
      • Axam.exe (PID: 8880)
      • unzip.exe (PID: 7516)
      • Axam.exe (PID: 9444)
      • Axam.exe (PID: 2632)
      • Axam.exe (PID: 9372)
      • Axam.exe (PID: 10464)
      • Axam.exe (PID: 8212)
      • Axam.exe (PID: 11192)
      • tree.com (PID: 10476)
      • client.exe (PID: 9824)
      • Axam.exe (PID: 3644)
      • csc.exe (PID: 4816)
      • Axam.exe (PID: 7956)
      • Axam.exe (PID: 8868)
      • cvtres.exe (PID: 11308)
      • rsync.exe (PID: 11328)
      • Axam.exe (PID: 11336)
      • Axam.exe (PID: 11516)
      • tree.com (PID: 11532)
      • Axam.exe (PID: 11448)
      • Axam.exe (PID: 11668)
      • rsync.exe (PID: 12024)
      • tree.com (PID: 11648)
      • Axam.exe (PID: 12148)
      • Axam.exe (PID: 12164)
      • Axam.exe (PID: 12204)
      • Axam.exe (PID: 12212)
      • Axam.exe (PID: 12096)
      • Axam.exe (PID: 12116)
      • Axam.exe (PID: 12252)
      • Axam.exe (PID: 7516)
      • Axam.exe (PID: 8712)
      • Axam.exe (PID: 9472)
      • MpCmdRun.exe (PID: 10208)
      • Axam.exe (PID: 8732)
      • Axam.exe (PID: 10248)
      • Axam.exe (PID: 11132)
      • Axam.exe (PID: 7524)
      • Axam.exe (PID: 8816)
      • Axam.exe (PID: 11184)
      • Axam.exe (PID: 11544)
      • Axam.exe (PID: 11532)
      • Axam.exe (PID: 11464)
      • Axam.exe (PID: 8992)
      • Axam.exe (PID: 756)
      • Axam.exe (PID: 10328)
      • Axam.exe (PID: 10936)
      • Axam.exe (PID: 10876)
      • Axam.exe (PID: 8968)
      • Axam.exe (PID: 8056)
      • Axam.exe (PID: 11660)
      • Axam.exe (PID: 12044)
      • Axam.exe (PID: 10992)
      • Axam.exe (PID: 5896)
      • RegSvcs.exe (PID: 11644)
      • Axam.exe (PID: 10164)
      • Axam.exe (PID: 11368)
      • Axam.exe (PID: 10312)
      • Axam.exe (PID: 8952)
      • Axam.exe (PID: 9004)
      • Axam.exe (PID: 3760)
      • Axam.exe (PID: 8208)
      • rar.exe (PID: 8388)
      • Axam.exe (PID: 10172)
      • Axam.exe (PID: 9072)
      • Axam.exe (PID: 3748)
      • Axam.exe (PID: 8204)
      • Axam.exe (PID: 8252)
      • Axam.exe (PID: 5692)
      • Axam.exe (PID: 2044)
      • Axam.exe (PID: 3048)
      • Axam.exe (PID: 8896)
      • Axam.exe (PID: 10440)
      • Axam.exe (PID: 8036)
      • Axam.exe (PID: 8388)
      • Axam.exe (PID: 10632)
      • Axam.exe (PID: 3956)
      • Axam.exe (PID: 9664)
      • Axam.exe (PID: 10112)
      • Axam.exe (PID: 10468)
      • Axam.exe (PID: 8728)
      • Axam.exe (PID: 11236)
      • Axam.exe (PID: 7460)
      • Axam.exe (PID: 8856)
      • Axam.exe (PID: 6236)
      • Axam.exe (PID: 1984)
      • Axam.exe (PID: 4232)
      • Axam.exe (PID: 6900)
      • Axam.exe (PID: 2964)
      • Axam.exe (PID: 2708)
      • Axam.exe (PID: 7640)
      • Axam.exe (PID: 7872)
      • Axam.exe (PID: 7812)
      • Axam.exe (PID: 6344)
      • Axam.exe (PID: 9748)
      • Axam.exe (PID: 8556)
      • Axam.exe (PID: 9172)
      • Axam.exe (PID: 8564)
      • Axam.exe (PID: 10316)
      • Axam.exe (PID: 10048)
      • Axam.exe (PID: 10232)
      • Axam.exe (PID: 10644)
      • Axam.exe (PID: 9716)
      • Axam.exe (PID: 12312)
      • Axam.exe (PID: 10928)
      • Axam.exe (PID: 12376)
      • Axam.exe (PID: 12332)
    • Reads the computer name

      • 4363463463464363463463463.exe (PID: 4708)
      • 3=====.exe (PID: 5620)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 6344)
      • PCHunter64.exe (PID: 3676)
      • CritScript.exe (PID: 4680)
      • JUSCHED.EXE (PID: 5252)
      • jusched.exe (PID: 316)
      • main.exe (PID: 6172)
      • main.exe (PID: 6756)
      • server.exe (PID: 4312)
      • 4363463463464363463463463.exe (PID: 4060)
      • bootstrapper.exe (PID: 6424)
      • bootstrapper.exe (PID: 6216)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 6956)
      • 4363463463464363463463463.exe (PID: 1932)
      • 4363463463464363463463463.exe (PID: 1652)
      • BootstrapperNew.exe (PID: 5008)
      • Client-built.exe (PID: 3048)
      • 3e3ev3.exe (PID: 7228)
      • 4363463463464363463463463.exe (PID: 4688)
      • asistenciaok3.exe (PID: 6336)
      • aaa%20(3).exe (PID: 7392)
      • Built.exe (PID: 7400)
      • Windows Font Manager.exe (PID: 7552)
      • 4363463463464363463463463.exe (PID: 7336)
      • 4363463463464363463463463.exe (PID: 7664)
      • boleto.exe (PID: 7632)
      • Client-built-Playit.exe (PID: 8108)
      • SharpHound.exe (PID: 8044)
      • Built.exe (PID: 7900)
      • NoEscape.exe (PID: 7548)
      • Terminal_9235.exe (PID: 2388)
      • namu832.exe (PID: 7808)
      • pornhub_downloader.exe (PID: 7800)
      • WxWorkMultiOpen.exe (PID: 7876)
      • qcoin142.exe (PID: 8512)
      • SLoader.exe (PID: 8528)
      • Phantom.exe (PID: 8972)
      • System32.exe (PID: 9148)
      • Windows%20Update.exe (PID: 8524)
      • eric.exe (PID: 8548)
      • XClient.exe (PID: 8268)
      • es.exe (PID: 9136)
      • MEMZ.exe (PID: 8596)
      • DhlServer.exe (PID: 9308)
      • support.client.exe (PID: 9648)
      • TestMemTest35.exe (PID: 9404)
      • ._cache_es.exe (PID: 9704)
      • Axam.a.exe (PID: 9412)
      • Client-built8.exe (PID: 10060)
      • macmid_sonoma_14_5.exe (PID: 9448)
      • dfsvc.exe (PID: 10016)
      • Synaptics.exe (PID: 9556)
      • PCclear_Eng_mini.exe (PID: 10068)
      • namu832.exe (PID: 10260)
      • Axam.exe (PID: 5248)
      • Axam.exe (PID: 10456)
      • MSBuild.exe (PID: 10216)
      • Axam.exe (PID: 10764)
      • Axam.exe (PID: 10736)
      • Axam.exe (PID: 10600)
      • Axam.exe (PID: 10856)
      • Axam.exe (PID: 10888)
      • Axam.exe (PID: 11012)
      • Axam.exe (PID: 10444)
      • Axam.exe (PID: 8768)
      • Axam.exe (PID: 10496)
      • Axam.exe (PID: 10080)
      • Axam.exe (PID: 8620)
      • Axam.exe (PID: 10508)
      • Axam.exe (PID: 10904)
      • Axam.exe (PID: 8692)
      • Axam.exe (PID: 10896)
      • Axam.exe (PID: 10044)
      • Axam.exe (PID: 1056)
      • Axam.exe (PID: 9496)
      • Axam.exe (PID: 11148)
      • Axam.exe (PID: 8880)
      • Axam.exe (PID: 9444)
      • Axam.exe (PID: 2632)
      • Axam.exe (PID: 9372)
      • client.exe (PID: 9824)
      • Axam.exe (PID: 10464)
      • Axam.exe (PID: 11192)
      • Axam.exe (PID: 8212)
      • rsync.exe (PID: 11328)
      • Axam.exe (PID: 7956)
      • Axam.exe (PID: 3644)
      • Axam.exe (PID: 8868)
      • Axam.exe (PID: 11336)
      • Axam.exe (PID: 11516)
      • Axam.exe (PID: 11448)
      • Axam.exe (PID: 11668)
      • Axam.exe (PID: 12116)
      • Axam.exe (PID: 12148)
      • Axam.exe (PID: 12164)
      • Axam.exe (PID: 12096)
      • Axam.exe (PID: 12204)
      • Axam.exe (PID: 12252)
      • Axam.exe (PID: 8712)
      • Axam.exe (PID: 12212)
      • MpCmdRun.exe (PID: 10208)
      • Axam.exe (PID: 7516)
      • Axam.exe (PID: 8732)
      • Axam.exe (PID: 10248)
      • Axam.exe (PID: 9472)
      • Axam.exe (PID: 11132)
      • Axam.exe (PID: 7524)
      • Axam.exe (PID: 11544)
      • Axam.exe (PID: 8816)
      • Axam.exe (PID: 11184)
      • Axam.exe (PID: 11532)
      • Axam.exe (PID: 11464)
      • Axam.exe (PID: 756)
      • Axam.exe (PID: 10328)
      • Axam.exe (PID: 10936)
      • Axam.exe (PID: 8992)
      • Axam.exe (PID: 11660)
      • Axam.exe (PID: 8968)
      • Axam.exe (PID: 8056)
      • Axam.exe (PID: 10876)
      • Axam.exe (PID: 12044)
      • RegSvcs.exe (PID: 11644)
      • Axam.exe (PID: 5896)
      • Axam.exe (PID: 10992)
      • Axam.exe (PID: 10164)
      • Axam.exe (PID: 10320)
      • Axam.exe (PID: 11368)
      • Axam.exe (PID: 10312)
      • random.exe (PID: 8480)
      • Axam.exe (PID: 9004)
      • Axam.exe (PID: 10172)
      • Axam.exe (PID: 8208)
      • Axam.exe (PID: 3740)
      • Axam.exe (PID: 5692)
      • Axam.exe (PID: 8252)
      • Axam.exe (PID: 3748)
      • Axam.exe (PID: 8896)
      • Axam.exe (PID: 3048)
      • Axam.exe (PID: 8204)
      • Axam.exe (PID: 2044)
      • Axam.exe (PID: 8036)
      • Axam.exe (PID: 10440)
      • Axam.exe (PID: 3956)
      • Axam.exe (PID: 7748)
      • Axam.exe (PID: 8388)
      • Axam.exe (PID: 11236)
      • Axam.exe (PID: 10112)
      • Axam.exe (PID: 8728)
      • Axam.exe (PID: 7460)
      • Axam.exe (PID: 8856)
      • Axam.exe (PID: 6236)
      • Axam.exe (PID: 2708)
      • Axam.exe (PID: 6900)
      • Axam.exe (PID: 5012)
      • Axam.exe (PID: 7640)
      • Axam.exe (PID: 7008)
      • Axam.exe (PID: 7872)
      • Axam.exe (PID: 9748)
      • Axam.exe (PID: 8564)
      • Axam.exe (PID: 9172)
      • Axam.exe (PID: 10316)
      • Axam.exe (PID: 10644)
      • Axam.exe (PID: 9716)
      • Axam.exe (PID: 12312)
      • Axam.exe (PID: 12332)
      • Axam.exe (PID: 10928)
      • Axam.exe (PID: 9204)
    • Disables trace logs

      • 4363463463464363463463463.exe (PID: 4708)
      • 4363463463464363463463463.exe (PID: 4060)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 6956)
      • 4363463463464363463463463.exe (PID: 1652)
      • 4363463463464363463463463.exe (PID: 1932)
      • 4363463463464363463463463.exe (PID: 4688)
      • 3e3ev3.exe (PID: 7228)
      • 4363463463464363463463463.exe (PID: 7336)
      • 4363463463464363463463463.exe (PID: 7664)
      • qcoin142.exe (PID: 8512)
      • boleto.exe (PID: 7632)
      • Phantom.exe (PID: 8972)
      • dfsvc.exe (PID: 10016)
      • RegSvcs.exe (PID: 11644)
    • Checks proxy server information

      • 4363463463464363463463463.exe (PID: 4708)
      • main.exe (PID: 6756)
      • 4363463463464363463463463.exe (PID: 4060)
      • 4363463463464363463463463.exe (PID: 6956)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 1652)
      • 4363463463464363463463463.exe (PID: 1932)
      • 4363463463464363463463463.exe (PID: 4688)
      • 3e3ev3.exe (PID: 7228)
      • 4363463463464363463463463.exe (PID: 7336)
      • 4363463463464363463463463.exe (PID: 7664)
      • qcoin142.exe (PID: 8512)
      • boleto.exe (PID: 7632)
      • WerFault.exe (PID: 7832)
      • DhlServer.exe (PID: 9308)
      • explorer.exe (PID: 4772)
      • Phantom.exe (PID: 8972)
      • PCclear_Eng_mini.exe (PID: 10068)
      • dfsvc.exe (PID: 10016)
      • RegSvcs.exe (PID: 11644)
    • Process checks computer location settings

      • 4363463463464363463463463.exe (PID: 4708)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 6344)
      • CritScript.exe (PID: 4680)
      • 4363463463464363463463463.exe (PID: 4060)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 1932)
      • 4363463463464363463463463.exe (PID: 1652)
      • 3e3ev3.exe (PID: 7228)
      • 4363463463464363463463463.exe (PID: 4688)
      • 4363463463464363463463463.exe (PID: 6956)
      • 4363463463464363463463463.exe (PID: 7664)
      • pornhub_downloader.exe (PID: 7800)
      • es.exe (PID: 9136)
      • 4363463463464363463463463.exe (PID: 7336)
      • boleto.exe (PID: 7632)
      • XClient.exe (PID: 8268)
      • namu832.exe (PID: 7808)
      • Terminal_9235.exe (PID: 2388)
      • DhlServer.exe (PID: 9308)
    • Reads the software policy settings

      • 4363463463464363463463463.exe (PID: 4708)
      • 4363463463464363463463463.exe (PID: 4060)
      • bootstrapper.exe (PID: 6216)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 1932)
      • 4363463463464363463463463.exe (PID: 6956)
      • 4363463463464363463463463.exe (PID: 1652)
      • 4363463463464363463463463.exe (PID: 4688)
      • 3e3ev3.exe (PID: 7228)
      • 4363463463464363463463463.exe (PID: 7336)
      • 4363463463464363463463463.exe (PID: 7664)
      • explorer.exe (PID: 4772)
      • WerFault.exe (PID: 7832)
      • Phantom.exe (PID: 8972)
      • MSBuild.exe (PID: 10216)
      • dfsvc.exe (PID: 10016)
      • RegSvcs.exe (PID: 11644)
      • WerFault.exe (PID: 8876)
    • Create files in a temporary directory

      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 6344)
      • CritScript.exe (PID: 4680)
      • main.exe (PID: 6172)
      • MS14-068.exe (PID: 7060)
      • main.exe (PID: 6756)
      • 3e3ev3.exe (PID: 7228)
      • Built.exe (PID: 7400)
      • Built.exe (PID: 7900)
      • pornhub_downloader.exe (PID: 7800)
      • set-2%20firmware%204.01.exe (PID: 8236)
      • SLoader.exe (PID: 8528)
      • jtEmt5nxbRnq5jC.exe (PID: 9252)
      • Axam.a.exe (PID: 9412)
      • TestMemTest35.exe (PID: 9404)
      • Synaptics.exe (PID: 9556)
      • Axam.exe (PID: 5248)
      • Axam.exe (PID: 10456)
      • Axam.exe (PID: 10600)
      • Terminal_9235.exe (PID: 2388)
      • Axam.exe (PID: 10736)
      • Axam.exe (PID: 10856)
      • Axam.exe (PID: 10888)
      • Axam.exe (PID: 10764)
      • Axam.exe (PID: 11012)
      • dfsvc.exe (PID: 10016)
      • Axam.exe (PID: 10444)
      • Axam.exe (PID: 10508)
      • Axam.exe (PID: 10080)
      • Axam.exe (PID: 8620)
      • Axam.exe (PID: 10496)
      • Axam.exe (PID: 8768)
      • Axam.exe (PID: 10904)
      • Axam.exe (PID: 8692)
      • Axam.exe (PID: 10896)
      • Axam.exe (PID: 10044)
      • Axam.exe (PID: 1056)
      • Axam.exe (PID: 9496)
      • Axam.exe (PID: 11148)
      • Axam.exe (PID: 9444)
      • Axam.exe (PID: 8880)
      • Axam.exe (PID: 9372)
      • Axam.exe (PID: 2632)
      • Axam.exe (PID: 11192)
      • Axam.exe (PID: 3644)
      • Axam.exe (PID: 10464)
      • Axam.exe (PID: 8212)
      • Axam.exe (PID: 7956)
      • cvtres.exe (PID: 11308)
      • Axam.exe (PID: 11336)
      • Axam.exe (PID: 8868)
      • csc.exe (PID: 4816)
      • Axam.exe (PID: 11516)
      • Axam.exe (PID: 11448)
      • Axam.exe (PID: 11668)
      • Axam.exe (PID: 12096)
      • Axam.exe (PID: 12164)
      • Axam.exe (PID: 12116)
      • Axam.exe (PID: 12204)
      • Axam.exe (PID: 12212)
      • Axam.exe (PID: 12148)
      • Axam.exe (PID: 12252)
      • Axam.exe (PID: 8712)
      • Axam.exe (PID: 7516)
      • Axam.exe (PID: 9472)
      • MpCmdRun.exe (PID: 10208)
      • Axam.exe (PID: 8732)
      • Axam.exe (PID: 10248)
      • Axam.exe (PID: 11132)
      • Axam.exe (PID: 8816)
      • Axam.exe (PID: 7524)
      • Axam.exe (PID: 11184)
      • Axam.exe (PID: 11544)
      • Axam.exe (PID: 11532)
      • Axam.exe (PID: 11464)
      • Axam.exe (PID: 756)
      • Axam.exe (PID: 8992)
      • Axam.exe (PID: 10328)
      • Axam.exe (PID: 10936)
      • Axam.exe (PID: 10876)
      • Axam.exe (PID: 11660)
      • Axam.exe (PID: 8968)
      • Axam.exe (PID: 8056)
      • Axam.exe (PID: 12044)
      • Axam.exe (PID: 10992)
      • Axam.exe (PID: 5896)
      • Axam.exe (PID: 10320)
      • Axam.exe (PID: 11368)
      • Axam.exe (PID: 10312)
      • Axam.exe (PID: 10164)
      • Axam.exe (PID: 8952)
      • Axam.exe (PID: 9004)
      • Axam.exe (PID: 3760)
      • Axam.exe (PID: 8208)
      • Axam.exe (PID: 10172)
      • Axam.exe (PID: 9072)
      • Axam.exe (PID: 3740)
      • Axam.exe (PID: 3748)
      • Axam.exe (PID: 8896)
      • Axam.exe (PID: 8204)
      • Axam.exe (PID: 10440)
      • Axam.exe (PID: 8036)
      • Axam.exe (PID: 10632)
      • Axam.exe (PID: 3956)
      • Axam.exe (PID: 7748)
      • Axam.exe (PID: 9960)
      • Axam.exe (PID: 10468)
      • Axam.exe (PID: 8728)
      • Axam.exe (PID: 9664)
      • Axam.exe (PID: 7460)
      • Axam.exe (PID: 8856)
      • Axam.exe (PID: 4232)
      • Axam.exe (PID: 5012)
      • Axam.exe (PID: 6900)
      • Axam.exe (PID: 6236)
      • Axam.exe (PID: 2708)
      • Axam.exe (PID: 7008)
      • Axam.exe (PID: 7812)
      • Axam.exe (PID: 7872)
      • Axam.exe (PID: 6344)
      • Axam.exe (PID: 9748)
      • Axam.exe (PID: 7640)
      • Axam.exe (PID: 8564)
      • Axam.exe (PID: 9172)
      • Axam.exe (PID: 10232)
      • Axam.exe (PID: 10316)
      • Axam.exe (PID: 9716)
      • Axam.exe (PID: 10644)
      • Axam.exe (PID: 9204)
      • Axam.exe (PID: 12312)
      • Axam.exe (PID: 10928)
      • Axam.exe (PID: 12332)
      • Axam.exe (PID: 12376)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • 3=====.exe (PID: 5620)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 4772)
      • WMIC.exe (PID: 6216)
      • WMIC.exe (PID: 5780)
      • WMIC.exe (PID: 2520)
      • WMIC.exe (PID: 7152)
      • WMIC.exe (PID: 9564)
      • WMIC.exe (PID: 8120)
      • WMIC.exe (PID: 4172)
      • WMIC.exe (PID: 8672)
    • The sample compiled with english language support

      • 4363463463464363463463463.exe (PID: 4708)
      • PCHunter64.exe (PID: 3676)
      • main.exe (PID: 6172)
      • MS14-068.exe (PID: 7060)
      • 4363463463464363463463463.exe (PID: 4060)
      • 4363463463464363463463463.exe (PID: 4844)
      • Built.exe (PID: 7400)
      • 4363463463464363463463463.exe (PID: 1932)
      • 4363463463464363463463463.exe (PID: 4688)
      • 4363463463464363463463463.exe (PID: 6956)
      • 4363463463464363463463463.exe (PID: 7664)
      • Axam.a.exe (PID: 9412)
      • macmid_sonoma_14_5.exe (PID: 9448)
      • unzip.exe (PID: 7516)
      • 4363463463464363463463463.exe (PID: 1652)
      • random.exe (PID: 8480)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 7048)
    • Reads Environment values

      • JUSCHED.EXE (PID: 5252)
      • jusched.exe (PID: 316)
      • bootstrapper.exe (PID: 6424)
      • bootstrapper.exe (PID: 6216)
      • Client-built.exe (PID: 3048)
      • 3e3ev3.exe (PID: 7228)
      • Windows Font Manager.exe (PID: 7552)
      • Client-built-Playit.exe (PID: 8108)
      • Windows%20Update.exe (PID: 8524)
      • System32.exe (PID: 9148)
      • boleto.exe (PID: 7632)
      • Client-built8.exe (PID: 10060)
      • Phantom.exe (PID: 8972)
      • dfsvc.exe (PID: 10016)
    • Creates files or folders in the user directory

      • JUSCHED.EXE (PID: 5252)
      • bootstrapper.exe (PID: 6424)
      • Client-built-Playit.exe (PID: 8108)
      • namu832.exe (PID: 7808)
      • explorer.exe (PID: 4772)
      • Axam.a.exe (PID: 9412)
      • DhlServer.exe (PID: 9308)
      • Terminal_9235.exe (PID: 2388)
      • dfsvc.exe (PID: 10016)
      • Client-built8.exe (PID: 10060)
      • WerFault.exe (PID: 7832)
      • eric.exe (PID: 8548)
      • WerFault.exe (PID: 8876)
    • Checks operating system version

      • main.exe (PID: 6756)
    • Launching a file from a Registry key

      • server.exe (PID: 4312)
      • set-2%20firmware%204.01.exe (PID: 8236)
      • es.exe (PID: 9136)
      • Axam.a.exe (PID: 9412)
      • Axam.exe (PID: 5248)
      • Axam.exe (PID: 10456)
      • Axam.exe (PID: 10600)
      • Axam.exe (PID: 10736)
      • Axam.exe (PID: 10764)
      • Axam.exe (PID: 10888)
      • Axam.exe (PID: 10856)
      • Axam.exe (PID: 11012)
      • Axam.exe (PID: 8768)
      • Axam.exe (PID: 10496)
      • Axam.exe (PID: 10080)
      • Axam.exe (PID: 8620)
      • Axam.exe (PID: 10444)
      • Axam.exe (PID: 8692)
      • Axam.exe (PID: 10904)
      • Axam.exe (PID: 10508)
      • Axam.exe (PID: 10896)
      • Axam.exe (PID: 10044)
      • Axam.exe (PID: 1056)
      • Axam.exe (PID: 9496)
      • Axam.exe (PID: 11148)
      • Axam.exe (PID: 8880)
      • Axam.exe (PID: 9444)
      • Axam.exe (PID: 2632)
      • Axam.exe (PID: 9372)
      • Axam.exe (PID: 8212)
      • Axam.exe (PID: 10464)
      • Axam.exe (PID: 11192)
      • Axam.exe (PID: 3644)
      • Axam.exe (PID: 8868)
      • Axam.exe (PID: 11336)
      • Axam.exe (PID: 7956)
      • Axam.exe (PID: 11516)
      • Axam.exe (PID: 11448)
      • Axam.exe (PID: 11668)
      • Axam.exe (PID: 12096)
      • Axam.exe (PID: 12116)
      • Axam.exe (PID: 12148)
      • Axam.exe (PID: 12164)
      • Axam.exe (PID: 12212)
      • Axam.exe (PID: 12204)
      • Axam.exe (PID: 12252)
      • Axam.exe (PID: 8712)
      • Axam.exe (PID: 7516)
      • Axam.exe (PID: 8732)
      • Axam.exe (PID: 10248)
      • Axam.exe (PID: 9472)
      • Axam.exe (PID: 11132)
      • Axam.exe (PID: 7524)
      • Axam.exe (PID: 11184)
      • Axam.exe (PID: 11544)
      • Axam.exe (PID: 8816)
      • Axam.exe (PID: 11532)
      • Axam.exe (PID: 11464)
      • Axam.exe (PID: 756)
      • Axam.exe (PID: 8992)
      • Axam.exe (PID: 10328)
      • Axam.exe (PID: 10936)
      • Axam.exe (PID: 11660)
      • Axam.exe (PID: 10876)
      • Axam.exe (PID: 8968)
      • Axam.exe (PID: 8056)
      • Axam.exe (PID: 12044)
      • Axam.exe (PID: 10992)
      • Axam.exe (PID: 5896)
      • Axam.exe (PID: 10320)
      • Axam.exe (PID: 10164)
      • Axam.exe (PID: 11368)
      • Axam.exe (PID: 10312)
      • Axam.exe (PID: 9004)
      • Axam.exe (PID: 10172)
      • Axam.exe (PID: 8208)
      • Axam.exe (PID: 3740)
      • Axam.exe (PID: 5692)
      • Axam.exe (PID: 8252)
      • Axam.exe (PID: 3748)
      • Axam.exe (PID: 8204)
      • Axam.exe (PID: 2044)
      • Axam.exe (PID: 8896)
      • Axam.exe (PID: 8036)
      • Axam.exe (PID: 3048)
      • Axam.exe (PID: 10440)
      • Axam.exe (PID: 3956)
      • Axam.exe (PID: 7748)
      • Axam.exe (PID: 8388)
      • Axam.exe (PID: 10112)
      • Axam.exe (PID: 11236)
      • Axam.exe (PID: 1984)
      • Axam.exe (PID: 8728)
      • Axam.exe (PID: 7460)
      • Axam.exe (PID: 8856)
      • Axam.exe (PID: 2708)
      • Axam.exe (PID: 6900)
      • Axam.exe (PID: 5012)
      • Axam.exe (PID: 6236)
      • Axam.exe (PID: 7008)
      • Axam.exe (PID: 7640)
      • Axam.exe (PID: 7872)
      • Axam.exe (PID: 9748)
      • Axam.exe (PID: 9172)
      • Axam.exe (PID: 8564)
      • Axam.exe (PID: 10644)
      • Axam.exe (PID: 10316)
      • Axam.exe (PID: 9716)
      • Axam.exe (PID: 10928)
      • Axam.exe (PID: 9204)
      • Axam.exe (PID: 12312)
      • Axam.exe (PID: 12332)
    • UPX packer has been detected

      • 3=====.exe (PID: 5620)
    • Manual execution by a user

      • 4363463463464363463463463.exe (PID: 4060)
      • 4363463463464363463463463.exe (PID: 5724)
      • 4363463463464363463463463.exe (PID: 3504)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 6900)
      • 4363463463464363463463463.exe (PID: 6956)
      • 4363463463464363463463463.exe (PID: 1332)
      • 4363463463464363463463463.exe (PID: 1932)
      • 4363463463464363463463463.exe (PID: 1652)
      • 4363463463464363463463463.exe (PID: 7008)
      • 4363463463464363463463463.exe (PID: 4688)
      • 4363463463464363463463463.exe (PID: 2528)
      • 4363463463464363463463463.exe (PID: 7216)
      • 4363463463464363463463463.exe (PID: 7336)
      • 4363463463464363463463463.exe (PID: 7464)
      • 4363463463464363463463463.exe (PID: 7664)
    • Application based on Golang

      • 3=====.exe (PID: 5620)
    • Uses Task Scheduler to autorun other applications (AUTOMATE)

      • bootstrapper.exe (PID: 6424)
    • Creates files in the program directory

      • BootstrapperNew.exe (PID: 5008)
      • SharpHound.exe (PID: 8044)
      • DhlServer.exe (PID: 9308)
      • es.exe (PID: 9136)
    • The sample compiled with korean language support

      • 4363463463464363463463463.exe (PID: 6956)
      • 4363463463464363463463463.exe (PID: 7336)
    • The sample compiled with french language support

      • set-2%20firmware%204.01.exe (PID: 8236)
    • The sample compiled with chinese language support

      • es.exe (PID: 9136)
      • 4363463463464363463463463.exe (PID: 7336)
      • 4363463463464363463463463.exe (PID: 1652)
      • 4363463463464363463463463.exe (PID: 4844)
      • 4363463463464363463463463.exe (PID: 4708)
      • 4363463463464363463463463.exe (PID: 4060)
      • 4363463463464363463463463.exe (PID: 4688)
      • 4363463463464363463463463.exe (PID: 6956)
    • Reads mouse settings

      • jtEmt5nxbRnq5jC.exe (PID: 9252)
    • The sample compiled with czech language support

      • 4363463463464363463463463.exe (PID: 7664)
      • DhlServer.exe (PID: 9308)
    • The Powershell gets current clipboard

      • powershell.exe (PID: 9588)
    • The sample compiled with turkish language support

      • es.exe (PID: 9136)
      • Synaptics.exe (PID: 9556)
    • Checks the directory tree

      • tree.com (PID: 9820)
      • tree.com (PID: 11244)
      • tree.com (PID: 10852)
      • tree.com (PID: 10476)
      • tree.com (PID: 11532)
      • tree.com (PID: 11648)
    • Launching a file from the Startup directory

      • Axam.a.exe (PID: 9412)
      • eric.exe (PID: 8548)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 8284)
    • Process checks whether UAC notifications are on

      • dfsvc.exe (PID: 10016)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 8604)
      • powershell.exe (PID: 8352)
      • powershell.exe (PID: 10104)
      • powershell.exe (PID: 9636)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 8604)
      • powershell.exe (PID: 8352)
      • powershell.exe (PID: 10104)
      • powershell.exe (PID: 9636)
      • powershell.exe (PID: 11092)
      • powershell.exe (PID: 7572)
    • Displays MAC addresses of computer network adapters

      • getmac.exe (PID: 11692)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

NjRat

(PID) Process(4312) server.exe
C2127.0.0.1
Ports5552
BotnetHacKed
Options
Auto-run registry keySoftware\Microsoft\Windows\CurrentVersion\Run\279f6960ed84a752570aca7fb2dc1552
Splitter|'|'|
Version0.7d

Quasar

(PID) Process(316) jusched.exe
Version1.4.1
C2 (2)193.161.193.99:32471
Sub_DirJava
Install_Namejusched.exe
Mutex807f3187-d087-4fff-beff-e73293a32af8
StartupJava Update Scheduler
TagDDNS
LogDirCachedLogs
SignaturesBocLBRxMUw3To7ZzewZ3YsrO0Z+fc3KsRzMzv9mfbF5sJ1MJ+tSUeK3n4v0qA9CdzuiNoXDrsMLx0lNGdFJEPGAtWXTb1QPmup0gzzxZYzgUjbW3K6OUlQnrnCRJ5B/gVJhvjpeytHJcJXoVVThOCBhfRHkUdKjWvea5McjXDhUWz1Xu7FF9MqOxPols3wY2Arj/mHwFcuAzhnR5Fg27eVVh2bANkzob/YNZrH+PoUvxMthySf1+JI28o0Nzl9a/PDUUuq4nPq78M0M4glGmHqp4kgCf57NRQhEjF8nTyIm...
CertificateMIIE9DCCAtygAwIBAgIQAKdj9OEEtK/PmVn/2IlEdTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MTExMjA2MTQxN1oYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAt79yvi82zMkZkRdUuCBbnaQ9a7fqidLALKNd/BEjRKS1OWiYAzTf9ZzAK1K+kOAeePTlezhU...
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:12:22 08:29:10+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 80
CodeSize: 5632
InitializedDataSize: 4608
UninitializedDataSize: -
EntryPoint: 0x3552
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 0.0.0.0
InternalName: 4363463463464363463463463.exe
LegalCopyright:
OriginalFileName: 4363463463464363463463463.exe
ProductVersion: 0.0.0.0
AssemblyVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
534
Monitored processes
382
Malicious processes
44
Suspicious processes
118

Behavior graph

Click at the process to see the details
start #HAUSBOMBER 4363463463464363463463463.exe conhost.exe no specs rundll32.exe no specs 3=====.exe no specs conhost.exe no specs 3=====.exe %d0%a4%d0%be%d1%80%d0%bc%d0%b0%203%d0%9e%d0%a8%d0%91%d0%a0.exe whoami.exe no specs conhost.exe no specs #NJRAT server.exe #PCHUNTER pchunter64.exe critscript.exe jusched.exe openwith.exe no specs schtasks.exe no specs conhost.exe no specs #QUASAR jusched.exe main.exe schtasks.exe no specs conhost.exe no specs ms14-068.exe conhost.exe no specs ms14-068.exe no specs main.exe cmd.exe no specs conhost.exe no specs netsh.exe no specs conhost.exe no specs #PHISHING svchost.exe cmd.exe no specs conhost.exe no specs wmic.exe no specs 4363463463464363463463463.exe no specs #GENERIC 4363463463464363463463463.exe conhost.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs bootstrapper.exe loader.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs schtasks.exe no specs conhost.exe no specs bootstrapper.exe schtasks.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs 4363463463464363463463463.exe no specs #QUASAR 4363463463464363463463463.exe conhost.exe no specs 4363463463464363463463463.exe no specs #ACR 4363463463464363463463463.exe conhost.exe no specs access.exe 4363463463464363463463463.exe no specs #ASYNCRAT 4363463463464363463463463.exe conhost.exe no specs 4363463463464363463463463.exe no specs #GENERIC 4363463463464363463463463.exe conhost.exe no specs #QUASAR client-built.exe bootstrappernew.exe no specs 4363463463464363463463463.exe no specs #ASYNCRAT 4363463463464363463463463.exe conhost.exe no specs asistenciaok3.exe no specs 4363463463464363463463463.exe no specs 3e3ev3.exe #COBALTSTRIKE 4363463463464363463463463.exe schtasks.exe no specs conhost.exe no specs #ASYNCRAT aaa%20(3).exe #BLANKGRABBER built.exe conhost.exe no specs 4363463463464363463463463.exe no specs windows font manager.exe boleto.exe #ASYNCRAT 4363463463464363463463463.exe conhost.exe no specs kdmapper_release.exe no specs conhost.exe no specs werfault.exe hack.exe no specs conhost.exe no specs #BLANKGRABBER built.exe esp32.exe mspaint.exe no specs conhost.exe no specs brontok.exe no specs sharphound.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs #QUASARRAT client-built-playit.exe #NOESCAPE noescape.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs pornhub_downloader.exe no specs namu832.exe wxworkmultiopen.exe no specs #ASYNCRAT terminal_9235.exe conhost.exe no specs cmd.exe no specs set-2%20firmware%204.01.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs random.exe qcoin142.exe schtasks.exe no specs sloader.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs phantom.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs #XRED es.exe system32.exe xclient.exe no specs tasklist.exe no specs windows%20update.exe no specs memz.exe no specs eric.exe fdsfsd.exe no specs jtemt5nxbrnq5jc.exe no specs dhlserver.exe celkadrobitel.exe no specs testmemtest35.exe no specs axam.a.exe conhost.exe no specs macmid_sonoma_14_5.exe schtasks.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs explorer.exe powershell.exe no specs powershell.exe no specs support.client.exe conhost.exe no specs ._cache_es.exe no specs netsh.exe no specs powershell.exe no specs systeminfo.exe no specs tree.com no specs dfsvc.exe client-built8.exe pcclear_eng_mini.exe powershell.exe no specs #LUMMA msbuild.exe mshta.exe no specs conhost.exe no specs #XRED synaptics.exe axam.exe namu832.exe no specs cmd.exe no specs axam.exe axam.exe conhost.exe no specs axam.exe axam.exe cmd.exe no specs axam.exe schtasks.exe no specs axam.exe axam.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs tree.com no specs axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe cmd.exe no specs axam.exe slui.exe no specs conhost.exe no specs cmd.exe no specs axam.exe axam.exe axam.exe axam.exe timeout.exe no specs tiworker.exe no specs tree.com no specs axam.exe unzip.exe axam.exe axam.exe axam.exe cmd.exe no specs axam.exe conhost.exe no specs cmd.exe no specs axam.exe axam.exe csc.exe axam.exe client.exe no specs tree.com no specs axam.exe axam.exe axam.exe cmd.exe no specs cvtres.exe no specs rsync.exe axam.exe conhost.exe no specs axam.exe axam.exe tree.com no specs cmd.exe no specs conhost.exe no specs tree.com no specs axam.exe rsync.exe no specs axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe mpcmdrun.exe no specs axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe cmd.exe no specs conhost.exe no specs getmac.exe no specs #SNAKEKEYLOGGER regsvcs.exe axam.exe axam.exe axam.exe axam.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs axam.exe axam.exe axam.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs axam.exe no specs axam.exe axam.exe no specs chrome.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs rar.exe no specs chrome.exe no specs msedge.exe no specs axam.exe cmd.exe no specs conhost.exe no specs axam.exe wmic.exe no specs chrome.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs chrome.exe no specs wmic.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs axam.exe no specs axam.exe werfault.exe cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe no specs axam.exe axam.exe axam.exe no specs axam.exe axam.exe axam.exe no specs axam.exe no specs axam.exe axam.exe axam.exe no specs axam.exe axam.exe axam.exe axam.exe no specs axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe no specs axam.exe axam.exe no specs axam.exe axam.exe axam.exe no specs axam.exe axam.exe no specs axam.exe no specs axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe no specs 4363463463464363463463463.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
316"C:\Users\admin\AppData\Roaming\Java\jusched.exe"C:\Users\admin\AppData\Roaming\Java\jusched.exe
JUSCHED.EXE
User:
admin
Company:
Oracle
Integrity Level:
HIGH
Description:
Java Update Scheduler
Version:
8.0.202.8
Modules
Images
c:\users\admin\appdata\roaming\java\jusched.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Quasar
(PID) Process(316) jusched.exe
Version1.4.1
C2 (2)193.161.193.99:32471
Sub_DirJava
Install_Namejusched.exe
Mutex807f3187-d087-4fff-beff-e73293a32af8
StartupJava Update Scheduler
TagDDNS
LogDirCachedLogs
SignaturesBocLBRxMUw3To7ZzewZ3YsrO0Z+fc3KsRzMzv9mfbF5sJ1MJ+tSUeK3n4v0qA9CdzuiNoXDrsMLx0lNGdFJEPGAtWXTb1QPmup0gzzxZYzgUjbW3K6OUlQnrnCRJ5B/gVJhvjpeytHJcJXoVVThOCBhfRHkUdKjWvea5McjXDhUWz1Xu7FF9MqOxPols3wY2Arj/mHwFcuAzhnR5Fg27eVVh2bANkzob/YNZrH+PoUvxMthySf1+JI28o0Nzl9a/PDUUuq4nPq78M0M4glGmHqp4kgCf57NRQhEjF8nTyIm...
CertificateMIIE9DCCAtygAwIBAgIQAKdj9OEEtK/PmVn/2IlEdTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MTExMjA2MTQxN1oYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAt79yvi82zMkZkRdUuCBbnaQ9a7fqidLALKNd/BEjRKS1OWiYAzTf9ZzAK1K+kOAeePTlezhU...
436\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
756"C:\Users\admin\AppData\Roaming\Axam.exe" "C:\Users\admin\Desktop\Files\update.exe" C:\Users\admin\AppData\Roaming\Axam.exe
4363463463464363463463463.exe
User:
admin
Integrity Level:
HIGH
Version:
1.00
Modules
Images
c:\users\admin\appdata\roaming\axam.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
856C:\WINDOWS\system32\cmd.exe /c "netsh wlan show profiles"C:\Windows\System32\cmd.exemain.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
984"schtasks" /create /tn "Windows_Host_Process" /sc ONLOGON /tr "C:\Users\admin\AppData\Roaming\RealTekAudio\bootstrapper.exe" /rl HIGHEST /fC:\Windows\System32\schtasks.exebootstrapper.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1056"C:\Users\admin\AppData\Roaming\Axam.exe" "C:\Users\admin\Desktop\Files\testingfile.exe" C:\Users\admin\AppData\Roaming\Axam.exe
4363463463464363463463463.exe
User:
admin
Integrity Level:
HIGH
Version:
1.00
Modules
Images
c:\users\admin\appdata\roaming\axam.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
1200\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1204\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1332"C:\Users\admin\Desktop\4363463463464363463463463.exe" C:\Users\admin\Desktop\4363463463464363463463463.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
3221226540
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\4363463463464363463463463.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1352\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
223 263
Read events
222 111
Write events
1 028
Delete events
124

Modification events

(PID) Process:(4708) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4708) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4708) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4708) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4708) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4708) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4708) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(4708) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4708) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4708) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
429
Suspicious files
31
Text files
115
Unknown types
37

Dropped files

PID
Process
Filename
Type
47084363463463464363463463463.exeC:\Users\admin\Desktop\Files\02.08.2022.exebinary
MD5:AF19B7B4291A9435B2D988080EB6EE9A
SHA256:FE687946C591BAE5737974781917BFA830C80CFFE7BC66096467CAF723D67BFD
3676PCHunter64.exeC:\Users\admin\Desktop\Files\zlrlltrpsnmvqiqp.sysexecutable
MD5:5EB2F44651D3E4B90664BAB3070409FF
SHA256:32726FA33BE861472D0B26286073B49500E3FD3BD1395F63BC114746A9195EFB
6344%D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exeC:\Users\admin\AppData\Local\Temp\server.exeexecutable
MD5:62635B35D2243003A86FCE6B46CB49CD
SHA256:A448DD8EBF27D88D26C09399271861D99E3A7D8B83D9FB45E168DAF2CB946352
3676PCHunter64.exeC:\Users\admin\Desktop\Files\xhufevliuygzuveyi.sysexecutable
MD5:5EB2F44651D3E4B90664BAB3070409FF
SHA256:32726FA33BE861472D0B26286073B49500E3FD3BD1395F63BC114746A9195EFB
3676PCHunter64.exeC:\Users\admin\Desktop\Files\khzbzyrbhltyjmx.sysexecutable
MD5:5EB2F44651D3E4B90664BAB3070409FF
SHA256:32726FA33BE861472D0B26286073B49500E3FD3BD1395F63BC114746A9195EFB
3676PCHunter64.exeC:\Users\admin\Desktop\Files\PCHunter64as.sysexecutable
MD5:5EB2F44651D3E4B90664BAB3070409FF
SHA256:32726FA33BE861472D0B26286073B49500E3FD3BD1395F63BC114746A9195EFB
3676PCHunter64.exeC:\Users\admin\Desktop\Files\nzzwzpfahopopm.sysexecutable
MD5:5EB2F44651D3E4B90664BAB3070409FF
SHA256:32726FA33BE861472D0B26286073B49500E3FD3BD1395F63BC114746A9195EFB
3676PCHunter64.exeC:\Users\admin\Desktop\Files\ufcmqqbvtxwkjok.sysexecutable
MD5:5EB2F44651D3E4B90664BAB3070409FF
SHA256:32726FA33BE861472D0B26286073B49500E3FD3BD1395F63BC114746A9195EFB
3676PCHunter64.exeC:\Users\admin\Desktop\Files\humnbvkpeeasbtbfp.sysexecutable
MD5:5EB2F44651D3E4B90664BAB3070409FF
SHA256:32726FA33BE861472D0B26286073B49500E3FD3BD1395F63BC114746A9195EFB
47084363463463464363463463463.exeC:\Users\admin\Desktop\Files\ayin.v0.1.0.exehtml
MD5:0CF72BFA1685C6107ABF842EBDAAC65B
SHA256:A01281DCCCBA3266C5E31B6DA5CBF85042842ACA2A319869B208B9601A27F575
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
135
TCP/UDP connections
592
DNS requests
112
Threats
441

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4708
4363463463464363463463463.exe
GET
200
47.122.20.70:9090
http://47.122.20.70:9090/02.08.2022.exe
unknown
unknown
2288
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4708
4363463463464363463463463.exe
GET
200
111.231.145.137:8888
http://111.231.145.137:8888/supershell/compile/download/3=====.exe
unknown
malicious
1268
svchost.exe
GET
200
23.55.104.172:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4708
4363463463464363463463463.exe
GET
200
211.204.100.20:1234
http://211.204.100.20:1234/NdisInstaller3.2.32.1.exe
unknown
unknown
1932
4363463463464363463463463.exe
GET
301
140.82.121.3:80
http://github.com/ronaldorsantana/ronaldo/raw/refs/heads/main/boleto.exe
unknown
whitelisted
7964
esp32.exe
GET
200
4.233.216.36:8000
http://4.233.216.36:8000/status
unknown
unknown
7664
4363463463464363463463463.exe
GET
200
211.159.155.136:8888
http://211.159.155.136:8888/WxWorkMultiOpen.exe
unknown
unknown
5328
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3956
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4708
4363463463464363463463463.exe
151.101.194.49:443
urlhaus.abuse.ch
FASTLY
US
whitelisted
4
System
192.168.100.255:138
whitelisted
4708
4363463463464363463463463.exe
47.122.20.70:9090
Hangzhou Alibaba Advertising Co.,Ltd.
CN
unknown
4708
4363463463464363463463463.exe
111.231.145.137:8888
Shenzhen Tencent Computer Systems Company Limited
CN
malicious
2336
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2288
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.142
whitelisted
urlhaus.abuse.ch
  • 151.101.194.49
  • 151.101.130.49
  • 151.101.66.49
  • 151.101.2.49
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.69
  • 20.190.159.4
  • 40.126.31.71
  • 40.126.31.3
  • 40.126.31.1
  • 40.126.31.131
  • 40.126.31.0
  • 40.126.31.129
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 2.17.190.73
whitelisted
crl.microsoft.com
  • 23.55.104.172
  • 23.55.104.190
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 23.35.229.160
whitelisted
hdgreen.org
  • 68.66.200.215
unknown
raw.githubusercontent.com
  • 185.199.108.133
  • 185.199.111.133
  • 185.199.109.133
  • 185.199.110.133
whitelisted

Threats

PID
Process
Class
Message
4708
4363463463464363463463463.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
4708
4363463463464363463463463.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
4708
4363463463464363463463463.exe
Malware Command and Control Activity Detected
ET MALWARE Supershell CnC Activity
4708
4363463463464363463463463.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
4708
4363463463464363463463463.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
4708
4363463463464363463463463.exe
Misc activity
ET INFO EXE - Served Attached HTTP
4708
4363463463464363463463463.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
4708
4363463463464363463463463.exe
Misc activity
ET INFO Packed Executable Download
2200
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
5620
3=====.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] A SSH banner has been detected on a non-standard port number
Process
Message
4363463463464363463463463.exe
The specified executable is not a valid application for this OS platform.
4363463463464363463463463.exe
The file or directory is corrupted and unreadable
CritScript.exe
C:\Users\admin\AppData\Local\Temp\JUSCHED.EXE
CritScript.exe
C:\Users\admin\AppData\Local\Temp\ZOMBIES.AHK
3e3ev3.exe
CLR: Managed code called FailFast without specifying a reason.
4363463463464363463463463.exe
The file or directory is corrupted and unreadable
4363463463464363463463463.exe
The file or directory is corrupted and unreadable
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
4363463463464363463463463.exe
An exception occurred during a WebClient request.