File name:

4363463463464363463463463.exe

Full analysis: https://app.any.run/tasks/fac90953-da61-410d-8101-ec35330b24d7
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: May 16, 2025, 08:54:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
github
loader
evasion
auto
formbook
stealer
asyncrat
rat
hausbomber
xworm
mirai
botnet
quasarrat
vidar
quasar
adware
generic
delphi
inno
installer
lumma
njrat
remcos
teamviewer
tvrat
remote
nanocore
redline
phantomstealer
mimikatz
tools
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

2A94F3960C58C6E70826495F76D00B85

SHA1:

E2A1A5641295F5EBF01A37AC1C170AC0814BB71A

SHA256:

2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE

SSDEEP:

192:2we8sGKE6MqyG7c20L7BIW12n/ePSmzkTInu8stYcFwVc03KY:9e8sGKfMqyGg20PKn/cRaInuptYcFwVY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • STEALER has been found (auto)

      • 4363463463464363463463463.exe (PID: 2336)
      • svchost.exe (PID: 2612)
      • 4363463463464363463463463.exe (PID: 2336)
      • 4363463463464363463463463.exe (PID: 2336)
    • Changes the autorun value in the registry

      • svchost.exe (PID: 2612)
      • XClient.exe (PID: 3108)
      • MSystem32.exe (PID: 3712)
    • Create files in the Startup directory

      • svchost.exe (PID: 2612)
      • XClient.exe (PID: 3108)
      • IDriverT.exe (PID: 3400)
    • ASYNCRAT has been found (auto)

      • 4363463463464363463463463.exe (PID: 2336)
      • image%20logger.exe (PID: 3116)
    • XWORM has been detected

      • svchost.exe (PID: 2612)
    • Adds path to the Windows Defender exclusion list

      • XClient.exe (PID: 3108)
    • Changes powershell execution policy (Bypass)

      • XClient.exe (PID: 3108)
    • ASYNCRAT has been detected (MUTEX)

      • image%20logger.exe (PID: 3116)
      • syteam.exe (PID: 3352)
      • Solara_Protect.exe (PID: 448)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 676)
      • powershell.exe (PID: 3260)
      • powershell.exe (PID: 3712)
      • powershell.exe (PID: 3756)
    • Changes Windows Defender settings

      • XClient.exe (PID: 3108)
    • BOTNET has been found (auto)

      • 4363463463464363463463463.exe (PID: 2336)
    • Uses Task Scheduler to autorun other applications

      • cmd.exe (PID: 2952)
      • JJSPLOIT.V2.exe (PID: 3636)
      • CleanerV2.exe (PID: 3292)
      • windows 3543.exe (PID: 2776)
      • JUSCHED.EXE (PID: 1408)
      • jusched.exe (PID: 2476)
      • Client.exe (PID: 2940)
      • windows 3543.exe (PID: 3648)
      • Client.exe (PID: 2600)
      • Client-built4.exe (PID: 3664)
      • defender64.exe (PID: 892)
      • svhost.exe (PID: 2072)
      • defenderx64.exe (PID: 3188)
      • svhost.exe (PID: 2744)
      • PerfWatson1.exe (PID: 3860)
      • Client-built.exe (PID: 2316)
      • WenzCord.exe (PID: 4980)
      • WenzCord.exe (PID: 5060)
      • cmd.exe (PID: 5180)
    • QUASARRAT has been found (auto)

      • 4363463463464363463463463.exe (PID: 2336)
      • CleanerV2.exe (PID: 3292)
      • svhost.exe (PID: 2072)
      • defender64.exe (PID: 892)
      • 4363463463464363463463463.exe (PID: 2336)
      • Client-built.exe (PID: 2316)
      • WenzCord.exe (PID: 4980)
      • RuntimeBroker.exe (PID: 5352)
    • Adds process to the Windows Defender exclusion list

      • XClient.exe (PID: 3108)
    • HAUSBOMBER has been detected (YARA)

      • 4363463463464363463463463.exe (PID: 2336)
    • VIDAR has been found (auto)

      • 4363463463464363463463463.exe (PID: 2336)
    • XWORM has been detected (YARA)

      • XClient.exe (PID: 3108)
    • QUASAR has been detected (YARA)

      • windows 3543.exe (PID: 2776)
      • asdasdasdasdasd.exe (PID: 2564)
      • Client.exe (PID: 2940)
      • windows 3543.exe (PID: 3648)
      • Neverlose%20Loader.exe (PID: 856)
      • Client.exe (PID: 2600)
      • svhost.exe (PID: 2744)
      • jusched.exe (PID: 2476)
    • GENERIC has been found (auto)

      • 4363463463464363463463463.exe (PID: 2336)
      • 4363463463464363463463463.exe (PID: 2336)
      • 4363463463464363463463463.exe (PID: 2336)
      • 4363463463464363463463463.exe (PID: 2336)
    • Connects to the CnC server

      • 4363463463464363463463463.exe (PID: 2336)
      • svchost.exe (PID: 1080)
    • ASYNCRAT has been detected (YARA)

      • syteam.exe (PID: 3352)
    • Uses Task Scheduler to run other applications

      • XClient.exe (PID: 3108)
      • MSystem32.exe (PID: 3712)
    • Executing a file with an untrusted certificate

      • 3911_wz.exe (PID: 3692)
    • NJRAT has been found (auto)

      • Client.exe (PID: 3700)
    • NANOCORE has been detected (YARA)

      • MSystem32.exe (PID: 3712)
    • RAT has been found (auto)

      • ApiUpdater.exe (PID: 2584)
      • 4363463463464363463463463.exe (PID: 2336)
      • 4363463463464363463463463.exe (PID: 2336)
    • Antivirus name has been found in the command line (generic signature)

      • cmd.exe (PID: 3656)
      • $77-Bitdefender.exe (PID: 3748)
    • Starts CMD.EXE for commands execution

      • iexplore.exe (PID: 2084)
    • TEAMVIEWER has been detected (SURICATA)

      • svchost.exe (PID: 1080)
      • TeamViewer.exe (PID: 576)
    • NJRAT has been detected (YARA)

      • testme.exe (PID: 932)
    • MIMIKATZ has been detected (YARA)

      • Mizedo.exe (PID: 1404)
    • LUMMA has been found (auto)

      • 4363463463464363463463463.exe (PID: 2336)
    • Stealers network behavior

      • svchost.exe (PID: 1080)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 1080)
  • SUSPICIOUS

    • Reads settings of System Certificates

      • 4363463463464363463463463.exe (PID: 2336)
    • Reads the Internet Settings

      • 4363463463464363463463463.exe (PID: 2336)
      • svchost.exe (PID: 2612)
      • XClient.exe (PID: 3108)
      • image%20logger.exe (PID: 3116)
      • powershell.exe (PID: 676)
      • powershell.exe (PID: 3712)
      • powershell.exe (PID: 3260)
      • powershell.exe (PID: 3756)
      • XW_XXGL.exe (PID: 1808)
      • CritScript.exe (PID: 1496)
      • windows 3543.exe (PID: 2776)
      • hydkj.exe (PID: 3420)
      • rardkj.exe (PID: 3228)
      • 3911_wz.exe (PID: 3692)
      • defenderx64.exe (PID: 3188)
      • Client.exe (PID: 3700)
    • Connects to the server without a host name

      • 4363463463464363463463463.exe (PID: 2336)
      • VXCX.exe (PID: 5784)
    • Process requests binary or script from the Internet

      • 4363463463464363463463463.exe (PID: 2336)
      • 3911_wz.exe (PID: 3692)
    • The process creates files with name similar to system file names

      • 4363463463464363463463463.exe (PID: 2336)
      • svchost.exe (PID: 2612)
      • maza-0.16.3-win32-setup-unsigned.exe (PID: 2712)
      • svhost.exe (PID: 2072)
      • Client.exe (PID: 3700)
    • Adds/modifies Windows certificates

      • 4363463463464363463463463.exe (PID: 2336)
      • msiexec.exe (PID: 3424)
    • Executable content was dropped or overwritten

      • 4363463463464363463463463.exe (PID: 2336)
      • random.exe (PID: 2304)
      • svchost.exe (PID: 2612)
      • image%20logger.exe (PID: 3116)
      • JJSPLOIT.V2.exe (PID: 3636)
      • CleanerV2.exe (PID: 3292)
      • XClient.exe (PID: 3108)
      • CritScript.exe (PID: 1496)
      • JUSCHED.EXE (PID: 1408)
      • hydkj.exe (PID: 3420)
      • Client-built4.exe (PID: 3664)
      • MSystem32.exe (PID: 3712)
      • FiddlerSetup.exe (PID: 3616)
      • maza-0.16.3-win32-setup-unsigned.exe (PID: 2712)
      • svhost.exe (PID: 2072)
      • defender64.exe (PID: 892)
      • Client.exe (PID: 3700)
      • ApiUpdater.exe (PID: 2584)
      • Client-built.exe (PID: 2316)
      • viewpoint_support.exe (PID: 2436)
      • WenzCord.exe (PID: 4980)
      • dxwebsetup.exe (PID: 4672)
      • dxwsetup.exe (PID: 4712)
      • cabal.exe (PID: 4812)
      • RuntimeBroker.exe (PID: 5352)
      • Cloudy.exe (PID: 5884)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 896)
      • update.exe (PID: 5376)
      • HDDrive1095_XinAnPlug3030_20230619_inno.exe (PID: 2096)
      • services.exe (PID: 5556)
      • explorer.exe (PID: 2052)
      • UpAgent.exe (PID: 3924)
      • ZubovLekciya.exe (PID: 3020)
    • Reads security settings of Internet Explorer

      • 4363463463464363463463463.exe (PID: 2336)
      • XClient.exe (PID: 3108)
      • image%20logger.exe (PID: 3116)
      • XW_XXGL.exe (PID: 1808)
      • CritScript.exe (PID: 1496)
      • windows 3543.exe (PID: 2776)
      • rardkj.exe (PID: 3228)
      • hydkj.exe (PID: 3420)
      • 3911_wz.exe (PID: 3692)
      • defenderx64.exe (PID: 3188)
      • Client.exe (PID: 3700)
    • Potential Corporate Privacy Violation

      • 4363463463464363463463463.exe (PID: 2336)
      • svchost.exe (PID: 1080)
      • TeamViewer.exe (PID: 576)
    • Checks for external IP

      • svchost.exe (PID: 1080)
      • svchost.exe (PID: 2612)
      • XClient.exe (PID: 3108)
      • Cloudy.exe (PID: 5884)
      • svchost.exe (PID: 5316)
    • Connects to unusual port

      • asdasdasdasdasd.exe (PID: 2564)
      • svchost.exe (PID: 2612)
      • 4363463463464363463463463.exe (PID: 2336)
      • windows 3543.exe (PID: 2776)
      • XW_XXGL.exe (PID: 1808)
      • jusched.exe (PID: 2476)
      • windows 3543.exe (PID: 3648)
      • Client.exe (PID: 2600)
      • MSystem32.exe (PID: 3712)
      • svhost.exe (PID: 2744)
      • TeamViewer.exe (PID: 576)
      • benpolatalemdar.exe (PID: 3272)
      • systempreter.exe (PID: 5096)
      • services.exe (PID: 5556)
      • Cloudy.exe (PID: 5884)
      • powershell.exe (PID: 4920)
    • Starts POWERSHELL.EXE for commands execution

      • XClient.exe (PID: 3108)
      • cmd.exe (PID: 1800)
    • Script adds exclusion path to Windows Defender

      • XClient.exe (PID: 3108)
    • Starts CMD.EXE for commands execution

      • image%20logger.exe (PID: 3116)
      • windows 3543.exe (PID: 2776)
      • defenderx64.exe (PID: 3188)
      • ApiUpdater.exe (PID: 2584)
      • wscript.exe (PID: 3928)
      • windows 3543.exe (PID: 3648)
      • PerfWatson1.exe (PID: 3860)
      • $77-Bitdefender.exe (PID: 3748)
      • WenzCord.exe (PID: 5060)
      • RuntimeBroker.exe (PID: 5496)
      • pornhub_downloader.exe (PID: 4032)
      • pornhub_downloader.exe (PID: 2980)
      • Terminal_9235.exe (PID: 4596)
      • cmd.exe (PID: 1800)
    • Executing commands from a ".bat" file

      • image%20logger.exe (PID: 3116)
      • windows 3543.exe (PID: 2776)
      • defenderx64.exe (PID: 3188)
      • windows 3543.exe (PID: 3648)
      • PerfWatson1.exe (PID: 3860)
      • WenzCord.exe (PID: 5060)
      • RuntimeBroker.exe (PID: 5496)
      • pornhub_downloader.exe (PID: 2980)
      • pornhub_downloader.exe (PID: 4032)
      • Terminal_9235.exe (PID: 4596)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 2544)
      • cmd.exe (PID: 5280)
    • Using PowerShell to operate with local accounts

      • powershell.exe (PID: 676)
      • powershell.exe (PID: 3712)
      • powershell.exe (PID: 3260)
      • powershell.exe (PID: 3756)
    • Script adds exclusion process to Windows Defender

      • XClient.exe (PID: 3108)
    • Probably fake Windows Update

      • schtasks.exe (PID: 3196)
      • windows 3543.exe (PID: 2776)
      • schtasks.exe (PID: 4020)
      • windows 3543.exe (PID: 3648)
      • schtasks.exe (PID: 3656)
    • Starts itself from another location

      • JJSPLOIT.V2.exe (PID: 3636)
      • CleanerV2.exe (PID: 3292)
      • JUSCHED.EXE (PID: 1408)
      • Client-built4.exe (PID: 3664)
      • defender64.exe (PID: 892)
      • svhost.exe (PID: 2072)
      • Client.exe (PID: 3700)
      • Client-built.exe (PID: 2316)
      • WenzCord.exe (PID: 4980)
      • RuntimeBroker.exe (PID: 5352)
      • UpAgent.exe (PID: 3924)
    • Probably fake Windows Update file has been dropped

      • JJSPLOIT.V2.exe (PID: 3636)
    • The executable file from the user directory is run by the CMD process

      • syteam.exe (PID: 3352)
      • windows 3543.exe (PID: 3648)
    • Creates file in the systems drive root

      • ntvdm.exe (PID: 348)
    • The process executes via Task Scheduler

      • XClient.exe (PID: 756)
      • XClient.exe (PID: 3092)
      • XClient.exe (PID: 2388)
      • XClient.exe (PID: 4568)
      • XClient.exe (PID: 1400)
    • There is functionality for taking screenshot (YARA)

      • windows 3543.exe (PID: 2776)
      • asdasdasdasdasd.exe (PID: 2564)
      • Client.exe (PID: 2940)
      • windows 3543.exe (PID: 3648)
      • Neverlose%20Loader.exe (PID: 856)
      • Client.exe (PID: 2600)
      • svhost.exe (PID: 2744)
      • IDriver.exe (PID: 904)
      • jusched.exe (PID: 2476)
      • TeamViewer.exe (PID: 576)
    • Process drops legitimate windows executable

      • 4363463463464363463463463.exe (PID: 2336)
      • hydkj.exe (PID: 3420)
      • dxwsetup.exe (PID: 4712)
      • dxwebsetup.exe (PID: 4672)
      • RuntimeBroker.exe (PID: 5352)
      • update.exe (PID: 5376)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 896)
      • services.exe (PID: 5556)
    • Access to an unwanted program domain was detected

      • XW_XXGL.exe (PID: 1808)
    • Contacting a server suspected of hosting an CnC

      • 4363463463464363463463463.exe (PID: 2336)
      • svchost.exe (PID: 1080)
    • Starts application with an unusual extension

      • cmd.exe (PID: 3244)
      • cmd.exe (PID: 3420)
      • cmd.exe (PID: 1812)
      • cmd.exe (PID: 2392)
      • cmd.exe (PID: 5200)
      • cmd.exe (PID: 5664)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 3244)
      • cmd.exe (PID: 3420)
      • cmd.exe (PID: 1812)
      • cmd.exe (PID: 2392)
      • cmd.exe (PID: 5200)
      • cmd.exe (PID: 5664)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 3424)
      • IDriver.exe (PID: 904)
    • Creates/Modifies COM task schedule object

      • msiexec.exe (PID: 3424)
    • Application launched itself

      • msiexec.exe (PID: 3424)
      • lkkkkk.exe (PID: 5264)
      • alex1213321.exe (PID: 3548)
      • cmd.exe (PID: 1800)
    • Executes as Windows Service

      • IDriverT.exe (PID: 3400)
    • Write to the desktop.ini file (may be used to cloak folders)

      • IDriverT.exe (PID: 3400)
    • Searches for installed software

      • IDriver.exe (PID: 904)
    • Reads Microsoft Outlook installation path

      • 3911_wz.exe (PID: 3692)
    • Reads Internet Explorer settings

      • 3911_wz.exe (PID: 3692)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • testme.exe (PID: 932)
      • WindowsServices.exe (PID: 3904)
      • mos%20ssssttttt.exe (PID: 3696)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • maza-0.16.3-win32-setup-unsigned.exe (PID: 2712)
      • viewpoint_support.exe (PID: 2436)
    • The process executes VB scripts

      • ApiUpdater.exe (PID: 2584)
      • taskmoder.exe (PID: 2112)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 1196)
      • cmd.exe (PID: 3644)
      • cmd.exe (PID: 1864)
      • cmd.exe (PID: 1800)
    • Found strings related to reading or modifying Windows Defender settings

      • wscript.exe (PID: 3928)
    • Uses NETSH.EXE to delete a firewall rule or allowed programs

      • mos%20ssssttttt.exe (PID: 3696)
    • Uses TASKKILL.EXE to kill process

      • wscript.exe (PID: 4004)
    • Drops 7-zip archiver for unpacking

      • viewpoint_support.exe (PID: 2436)
    • Starts a Microsoft application from unusual location

      • dxwsetup.exe (PID: 4712)
      • cleanup_tool.exe (PID: 4784)
      • dxwebsetup.exe (PID: 4672)
      • RuntimeBroker.exe (PID: 5352)
      • RuntimeBroker.exe (PID: 5496)
      • services.exe (PID: 5556)
    • Found IP address in command line

      • powershell.exe (PID: 4920)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 1800)
    • Downloads file from URI via Powershell

      • powershell.exe (PID: 4920)
  • INFO

    • Reads the computer name

      • 4363463463464363463463463.exe (PID: 2336)
      • svchost.exe (PID: 2612)
      • random.tmp (PID: 3168)
      • random.exe (PID: 2304)
      • asdasdasdasdasd.exe (PID: 2564)
      • image%20logger.exe (PID: 3116)
      • XClient.exe (PID: 3108)
      • JJSPLOIT.V2.exe (PID: 3636)
      • CleanerV2.exe (PID: 3292)
      • windows 3543.exe (PID: 2776)
      • syteam.exe (PID: 3352)
      • Client.exe (PID: 2940)
      • XClient.exe (PID: 756)
      • XW_XXGL.exe (PID: 1808)
      • Solara_Protect.exe (PID: 448)
      • CritScript.exe (PID: 1496)
      • Neverlose%20Loader.exe (PID: 856)
      • JUSCHED.EXE (PID: 1408)
      • ProctorU.1.30.win.07.exe (PID: 1760)
      • jusched.exe (PID: 2476)
      • VB.NET%20CRYPTER%20V2.exe (PID: 1380)
      • Mizedo.exe (PID: 1404)
      • hydkj.exe (PID: 3420)
      • windows 3543.exe (PID: 3648)
      • rardkj.exe (PID: 3228)
      • Client-built4.exe (PID: 3664)
      • Client.exe (PID: 2600)
      • XClient.exe (PID: 3092)
      • setup.exe (PID: 3636)
      • 5c8b08b37a426.exe (PID: 3644)
      • msiexec.exe (PID: 3424)
      • msiexec.exe (PID: 3152)
      • IDriverT.exe (PID: 3400)
      • IDriver.exe (PID: 904)
      • MSystem32.exe (PID: 3712)
      • 3911_wz.exe (PID: 3692)
      • FiddlerSetup.exe (PID: 3616)
      • testme.exe (PID: 932)
      • FiddlerSetup.exe (PID: 1948)
      • maza-0.16.3-win32-setup-unsigned.exe (PID: 2712)
      • defender64.exe (PID: 892)
      • svhost.exe (PID: 2072)
      • defenderx64.exe (PID: 3188)
      • svhost.exe (PID: 2744)
      • Client.exe (PID: 3700)
    • Disables trace logs

      • 4363463463464363463463463.exe (PID: 2336)
      • svchost.exe (PID: 2612)
      • XClient.exe (PID: 3108)
    • Reads the machine GUID from the registry

      • 4363463463464363463463463.exe (PID: 2336)
      • svchost.exe (PID: 2612)
      • XClient.exe (PID: 3108)
      • asdasdasdasdasd.exe (PID: 2564)
      • image%20logger.exe (PID: 3116)
      • JJSPLOIT.V2.exe (PID: 3636)
      • windows 3543.exe (PID: 2776)
      • CleanerV2.exe (PID: 3292)
      • Client.exe (PID: 2940)
      • XClient.exe (PID: 756)
      • XW_XXGL.exe (PID: 1808)
      • Neverlose%20Loader.exe (PID: 856)
      • jusched.exe (PID: 2476)
      • Solara_Protect.exe (PID: 448)
      • ProctorU.1.30.win.07.exe (PID: 1760)
      • JUSCHED.EXE (PID: 1408)
      • syteam.exe (PID: 3352)
      • windows 3543.exe (PID: 3648)
      • VB.NET%20CRYPTER%20V2.exe (PID: 1380)
      • Client-built4.exe (PID: 3664)
      • rardkj.exe (PID: 3228)
      • Client.exe (PID: 2600)
      • XClient.exe (PID: 3092)
      • setup.exe (PID: 3636)
      • msiexec.exe (PID: 3152)
      • msiexec.exe (PID: 3424)
      • IDriverT.exe (PID: 3400)
      • IDriver.exe (PID: 904)
      • MSystem32.exe (PID: 3712)
      • 3911_wz.exe (PID: 3692)
      • testme.exe (PID: 932)
      • defender64.exe (PID: 892)
      • defenderx64.exe (PID: 3188)
      • svhost.exe (PID: 2072)
      • svhost.exe (PID: 2744)
      • Client.exe (PID: 3700)
    • Reads Environment values

      • 4363463463464363463463463.exe (PID: 2336)
      • svchost.exe (PID: 2612)
      • asdasdasdasdasd.exe (PID: 2564)
      • XClient.exe (PID: 3108)
      • JJSPLOIT.V2.exe (PID: 3636)
      • CleanerV2.exe (PID: 3292)
      • windows 3543.exe (PID: 2776)
      • Client.exe (PID: 2940)
      • Neverlose%20Loader.exe (PID: 856)
      • JUSCHED.EXE (PID: 1408)
      • jusched.exe (PID: 2476)
      • windows 3543.exe (PID: 3648)
      • Client-built4.exe (PID: 3664)
      • Client.exe (PID: 2600)
      • MSystem32.exe (PID: 3712)
      • svhost.exe (PID: 2072)
      • defender64.exe (PID: 892)
      • testme.exe (PID: 932)
      • defenderx64.exe (PID: 3188)
      • svhost.exe (PID: 2744)
    • Reads the software policy settings

      • 4363463463464363463463463.exe (PID: 2336)
      • msiexec.exe (PID: 3424)
    • Checks supported languages

      • 4363463463464363463463463.exe (PID: 2336)
      • svchost.exe (PID: 2612)
      • random.tmp (PID: 3168)
      • random.exe (PID: 2304)
      • asdasdasdasdasd.exe (PID: 2564)
      • image%20logger.exe (PID: 3116)
      • XClient.exe (PID: 3108)
      • JJSPLOIT.V2.exe (PID: 3636)
      • CleanerV2.exe (PID: 3292)
      • windows 3543.exe (PID: 2776)
      • syteam.exe (PID: 3352)
      • Client.exe (PID: 2940)
      • XClient.exe (PID: 756)
      • XW_XXGL.exe (PID: 1808)
      • Solara_Protect.exe (PID: 448)
      • JUSCHED.EXE (PID: 1408)
      • CritScript.exe (PID: 1496)
      • Neverlose%20Loader.exe (PID: 856)
      • jusched.exe (PID: 2476)
      • ProctorU.1.30.win.07.exe (PID: 1760)
      • Mizedo.exe (PID: 1404)
      • VB.NET%20CRYPTER%20V2.exe (PID: 1380)
      • chcp.com (PID: 2764)
      • windows 3543.exe (PID: 3648)
      • hydkj.exe (PID: 3420)
      • rardkj.exe (PID: 3228)
      • setup.exe (PID: 3636)
      • Client-built4.exe (PID: 3664)
      • XClient.exe (PID: 3092)
      • 5c8b08b37a426.exe (PID: 3644)
      • Client.exe (PID: 2600)
      • msiexec.exe (PID: 3152)
      • msiexec.exe (PID: 3424)
      • IDriverT.exe (PID: 3400)
      • IDriver.exe (PID: 904)
      • MSystem32.exe (PID: 3712)
      • 3911_wz.exe (PID: 3692)
      • testme.exe (PID: 932)
      • FiddlerSetup.exe (PID: 1948)
      • FiddlerSetup.exe (PID: 3616)
      • Client.exe (PID: 3700)
      • svhost.exe (PID: 2072)
      • defender64.exe (PID: 892)
      • maza-0.16.3-win32-setup-unsigned.exe (PID: 2712)
      • defenderx64.exe (PID: 3188)
      • svhost.exe (PID: 2744)
      • %EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe (PID: 3820)
      • chcp.com (PID: 4068)
      • WindowsServices.exe (PID: 3904)
    • Create files in a temporary directory

      • random.exe (PID: 2304)
      • image%20logger.exe (PID: 3116)
      • CritScript.exe (PID: 1496)
      • windows 3543.exe (PID: 2776)
      • setup.exe (PID: 3636)
      • rardkj.exe (PID: 3228)
      • msiexec.exe (PID: 3424)
      • msiexec.exe (PID: 3152)
      • MSystem32.exe (PID: 3712)
      • FiddlerSetup.exe (PID: 3616)
      • testme.exe (PID: 932)
      • FiddlerSetup.exe (PID: 1948)
      • maza-0.16.3-win32-setup-unsigned.exe (PID: 2712)
      • defenderx64.exe (PID: 3188)
      • Client.exe (PID: 3700)
    • Creates files or folders in the user directory

      • svchost.exe (PID: 2612)
      • JJSPLOIT.V2.exe (PID: 3636)
      • CleanerV2.exe (PID: 3292)
      • JUSCHED.EXE (PID: 1408)
      • XClient.exe (PID: 3108)
      • MSystem32.exe (PID: 3712)
      • 3911_wz.exe (PID: 3692)
      • testme.exe (PID: 932)
      • svhost.exe (PID: 2072)
      • defender64.exe (PID: 892)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 676)
      • powershell.exe (PID: 3712)
      • powershell.exe (PID: 3260)
      • powershell.exe (PID: 3756)
    • The sample compiled with english language support

      • 4363463463464363463463463.exe (PID: 2336)
      • hydkj.exe (PID: 3420)
      • msiexec.exe (PID: 3424)
      • msiexec.exe (PID: 4036)
      • msiexec.exe (PID: 3152)
      • FiddlerSetup.exe (PID: 3616)
      • viewpoint_support.exe (PID: 2436)
      • dxwebsetup.exe (PID: 4672)
      • dxwsetup.exe (PID: 4712)
      • RuntimeBroker.exe (PID: 5352)
      • update.exe (PID: 5376)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 896)
      • msiexec.exe (PID: 3008)
      • UpAgent.exe (PID: 3924)
    • Detects InnoSetup installer (YARA)

      • random.exe (PID: 2304)
      • random.tmp (PID: 3168)
    • Compiled with Borland Delphi (YARA)

      • random.exe (PID: 2304)
      • random.tmp (PID: 3168)
      • windows 3543.exe (PID: 3648)
      • Neverlose%20Loader.exe (PID: 856)
      • Client.exe (PID: 2600)
      • MSystem32.exe (PID: 3712)
      • svhost.exe (PID: 2744)
      • msiexec.exe (PID: 4036)
      • VB.NET%20CRYPTER%20V2.exe (PID: 1380)
      • IDriver.exe (PID: 904)
      • TeamViewer.exe (PID: 576)
      • jusched.exe (PID: 2476)
      • %EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe (PID: 3820)
      • ntvdm.exe (PID: 3372)
      • ntvdm.exe (PID: 3236)
      • Mizedo.exe (PID: 1404)
      • cmd.exe (PID: 1812)
      • cmd.exe (PID: 1196)
      • testme.exe (PID: 932)
    • Checks proxy server information

      • XW_XXGL.exe (PID: 1808)
      • 3911_wz.exe (PID: 3692)
    • Changes the display of characters in the console

      • cmd.exe (PID: 3244)
      • cmd.exe (PID: 3420)
      • cmd.exe (PID: 1812)
      • cmd.exe (PID: 2392)
      • cmd.exe (PID: 5664)
      • cmd.exe (PID: 5200)
    • The sample compiled with chinese language support

      • hydkj.exe (PID: 3420)
      • 4363463463464363463463463.exe (PID: 2336)
      • msiexec.exe (PID: 3152)
      • HDDrive1095_XinAnPlug3030_20230619_inno.exe (PID: 2096)
    • Creates files in the program directory

      • Client-built4.exe (PID: 3664)
      • MSystem32.exe (PID: 3712)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 3424)
      • msiexec.exe (PID: 4036)
      • msiexec.exe (PID: 3152)
      • msiexec.exe (PID: 3008)
    • Process checks whether UAC notifications are on

      • MSystem32.exe (PID: 3712)
    • The sample compiled with korean language support

      • 4363463463464363463463463.exe (PID: 2336)
    • Connects to unusual port

      • iexplore.exe (PID: 2084)
    • Application launched itself

      • msedge.exe (PID: 3428)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(3108) XClient.exe
C2127.0.0.1:1504
Keys
AES123456789
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.2
Mutexp6Jc9GPiVmwSu2YD

Quasar

(PID) Process(2776) windows 3543.exe
Version1.4.1
C2 (6)192.168.50.1:4782
10.0.0.113:4782
LETSQOOO-62766.portmap.host:62766
89.10.178.51:4782
LETSQOOO-62766.portmap.host:62766
Sub_Dirwindows updater
Install_Namewindows 3543.exe
Mutex90faf922-159d-4166-b661-4ba16af8650e
Startupwindows background updater
TagROBLOX EXECUTOR
LogDirroblox executor
SignatureDowhTcCNRmPne/jP3WQ8VLNtjW2b7COPJ9f99kZ79UFTzRFEvY6/5+otwvW1Bwmg9g0QfHHt35ZhSkuKX/JTqAAzWBJF4jgN5VBXj8eypchVIP3+JtYmO932+ak0qLmQH0HXpIdH0VUJZJaxFcaI3G20cO9f5EBgxHsey09u6g7O39z3AMmFvru9wuI2/bQkFreKMve5G63LPGchmgImAWCO+i3qtDNkH/D47EjSUKhBQjEwRNXoIahVTqBJr+eIfI/o/mQV8pWk2FKc5M20xfErtWCuSzMJ0rIULHdKHXDZ...
CertificateMIIE9DCCAtygAwIBAgIQAKXago0cfl52srIGgNzsZzANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MDgyNTE2NDk0M1oYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAhErQjQ8fpDYpYN1iZUcL3evTfxYkIWCVDolaEBfQA2elEwvnikLo+0s8mPHF86S0Qr9u+daX...
(PID) Process(2564) asdasdasdasdasd.exe
Version1.4.1
C2 (2)go-dramatically.gl.at.ply.gg:2676
Sub_DirSubDir
Install_NameClient.exe
Mutexfb394b82-3336-4303-8c07-5f17c76f1d95
StartupQuasar Client Startup
TagOffice04
LogDirLogs
SignatureR5FhpSlt0QWyazUiXi7985SLTfqrsVFrbAIn7D6jQVOPmxzl10942/77cs+ZGbCCWfpqitV1LI5c5R+HnSPGVI222KxAq6QPpfL7M+9p7mZxW0CGW1FckAdMBRhF1VC/j95/uYgwOJ65MlZnJMQ2WbyowEQJdH39nR+gJeEUrz9kuesDEKDfsICI7ZBzUuS3/pVGVFOpf10UudDUeA3501/QuQZjB4PcsxBLAOGIlMioCU4H+QdtOGtjqiuqaIGeKqTIS+N3E4xUtHf8Y+jFW1PMR02Oqvq1BRCeoIwFf6uU...
CertificateMIIE9DCCAtygAwIBAgIQAMeXUwnb9yEMycM8rl/0CTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI1MDQwNTE1MjUwNFoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAu+8QadKEP51WpY7grxWqbSjXMuLHHF4unqYzNQF1Fn9xrl5NKFiy0Ss5fLfyK/NH8fZtcub/...
(PID) Process(2940) Client.exe
Version1.4.1
C2 (2)192.168.4.185:4782
Sub_DirSubDir
Install_NameClient.exe
Mutex1607a026-352e-4041-bc1f-757dd6cd2e95
StartupCleanerV2
TagCleanerV2
LogDirClean
SignatureaRogJrq9hUhroi2yRCxFCfE+mXc/GvQG7eVh7ArjCeuURH+zboKSDt31Wff+SIInkno4hIQs7tRc6uLFL+H8LqKGy5JPvKlBVH/vsLgQMz2Hri+jlAj+4J5ZX0Qs23sz7UqIoRbwMHdNzuyTEDKHt/bsObNt8K+mybe50A+4iIlVs0lofsrxI8a8dSh5IxFx4M80uR9L+SGmloN53TuHqrpUrdi65VcSjCa61BUkfKqpOiJaQqZ9zqC/rXbMAu0KTssZ9Nlucysj04DgLCV83TfJfpVpZerpVLZvUsSr/BiW...
CertificateMIIE9DCCAtygAwIBAgIQAOw5PfKqmSNRWe7n9URebzANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MDYzMDExMjUxNFoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAq68uWSLSM7tj6l08I9iy5ilFsS9PluFC5ENWxT8Kmp0gDJD1br0B0Nr+ZIofw9ykVSR9kDvk...
(PID) Process(3648) windows 3543.exe
Version1.4.1
C2 (6)192.168.50.1:4782
10.0.0.113:4782
LETSQOOO-62766.portmap.host:62766
89.10.178.51:4782
LETSQOOO-62766.portmap.host:62766
Sub_Dirwindows updater
Install_Namewindows 3543.exe
Mutex90faf922-159d-4166-b661-4ba16af8650e
Startupwindows background updater
TagROBLOX EXECUTOR
LogDirroblox executor
SignatureDowhTcCNRmPne/jP3WQ8VLNtjW2b7COPJ9f99kZ79UFTzRFEvY6/5+otwvW1Bwmg9g0QfHHt35ZhSkuKX/JTqAAzWBJF4jgN5VBXj8eypchVIP3+JtYmO932+ak0qLmQH0HXpIdH0VUJZJaxFcaI3G20cO9f5EBgxHsey09u6g7O39z3AMmFvru9wuI2/bQkFreKMve5G63LPGchmgImAWCO+i3qtDNkH/D47EjSUKhBQjEwRNXoIahVTqBJr+eIfI/o/mQV8pWk2FKc5M20xfErtWCuSzMJ0rIULHdKHXDZ...
CertificateMIIE9DCCAtygAwIBAgIQAKXago0cfl52srIGgNzsZzANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MDgyNTE2NDk0M1oYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAhErQjQ8fpDYpYN1iZUcL3evTfxYkIWCVDolaEBfQA2elEwvnikLo+0s8mPHF86S0Qr9u+daX...
(PID) Process(856) Neverlose%20Loader.exe
Version1.4.0
C2 (5)192.168.31.99:4782
2001:4bc9:1f98:a4e::676:4782
255.255.255.0:4782
fe80::cabf:4cff:fe84:9572%17:4782
Sub_DirSubDir
Install_NameNeverlose Loader.exe
Mutex1f65a787-81b8-4955-95e4-b7751e10cd50
StartupJava Updater
TagOffice04
LogDirLogs
SignatureIpoC4G3VyXpCX73v8GLDgGX/ZD0uyJLyqReXAqvKNH4BzMk3aCKHatwBDnXbtrYfH96ChJhU2qLyWTlHJUq+HoFp5tRNEGlBaYc4IVl0lEBCjQsDf3wMCaU/2Ns/z3lVzh7AYhfCMb7L/mgf/ZfDTlEJasxUBvBxHVeahyU9WD2HTH2ZyabAt3fHWrcnpoZWMA40Zn+F5whQw5O7VIRpO5BFmYGBosHkSSeFe56cyRhha4rXQLWUx6ghioEm4px39T6OhjYSHUIArYzIM7z7hcOTAbXEgoZ7o6mG/GfLaECs...
CertificateMIIE9DCCAtygAwIBAgIQALWSoR4pE9fOZHv3Ui7LYTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTIyMTEyNDEwMTk1M1oYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAhOEJcBCuOOX0MDmITV+fSJpkL4NBxf1/CNJoEpUamratcDd5r9kc9hO+9tpd7DnFmZc5JQTa...
(PID) Process(2600) Client.exe
Version1.4.1
C2 (2)0.tcp.ap.ngrok.io:11526
Sub_Dirkazeku
Install_NameClient.exe
Mutex7fb11f4b-e530-407c-a46c-8834ab5c4f45
Startupkazeku
Tagkazeku
LogDirLogs
SignatureaMYVFTI8bGBPC7PouD2vwX/brxoHYpnB+5N+J03N7p5Xs/o16IuqXSbe/TmoNMA8820i4g/yWsrVtI5tWW8PCM62pkqq2SoxkmSYh/KzjwHMMJQpiqq8e/2jFZHKsYIQfcz1hpcFmisvPeTRsEdNI3xoPyCm0182mcvoVl7KPt2/v1jKNvTCo3hibOR2NqLcXicDFcY9EfbVQ19hHHfja0j8o2IQ//59NTxPhouZF3eO1H/PaAOIgSLUYY1Jh3NvT9AS5DKwRSJw1OhWyMjIjwZFG6Mkdd2tkECKzjR4cR7h...
CertificateMIIE9DCCAtygAwIBAgIQANc8h9qchCFSUU+cYA3KWTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI1MDIyNTA3MzgyN1oYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqiYNu1Fz6WGc2+cUwJi9+hM8emrgoGRKv0eQjwodUqSQAGkyo052y+7ws3stDxX2/J8XJW0O...
(PID) Process(2744) svhost.exe
Version1.4.0
C2 (2)151.177.61.79:4782
Sub_Dirsvhost
Install_Namesvhost.exe
Mutexa148a6d8-1253-4e62-bc5f-c0242dd62e69
Startupsvhost
Tagsvhost
LogDirLogs
SignatureFiHplcBrV3S97M+7U8Wkv2OAUt8PgnZIpuptBCDmcV3pFCoNQMGru4y6fV4vlwM/qWOV6CUP402T365DHIPm+6uj+1+vgzHGFfiR7S/L+/lpirBGRMTeHcZhxJzbykEf03VPu+8sHMP4tw2JwiJxdryS9YfIuKQufusBaH0ML1oD+gCJoYiH2J1gluHBKSiZAKHI9pdYN7CJN5LNrm41d9IDcibaRPDEiB1m+MVRrQfkHuJZQmYDBxKx3tJF1EBhs5FoUNcpEcF0CWvkWO/psUToSydby8u8lhLv2k962B8w...
CertificateMIIE9DCCAtygAwIBAgIQAMlib63Pu5Cv0/jbVZpvUzANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTIwMTAwNTAyMTAzM1oYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAlo+RQClgYhgaYwiwVrdvbvyE47OD8EJLOY/MXs9Z6hD3wx89223nnET+I8zcZNGYn80cgt+q...
(PID) Process(2476) jusched.exe
Version1.4.1
C2 (2)193.161.193.99:32471
Sub_DirJava
Install_Namejusched.exe
Mutex807f3187-d087-4fff-beff-e73293a32af8
StartupJava Update Scheduler
TagDDNS
LogDirCachedLogs
SignaturesBocLBRxMUw3To7ZzewZ3YsrO0Z+fc3KsRzMzv9mfbF5sJ1MJ+tSUeK3n4v0qA9CdzuiNoXDrsMLx0lNGdFJEPGAtWXTb1QPmup0gzzxZYzgUjbW3K6OUlQnrnCRJ5B/gVJhvjpeytHJcJXoVVThOCBhfRHkUdKjWvea5McjXDhUWz1Xu7FF9MqOxPols3wY2Arj/mHwFcuAzhnR5Fg27eVVh2bANkzob/YNZrH+PoUvxMthySf1+JI28o0Nzl9a/PDUUuq4nPq78M0M4glGmHqp4kgCf57NRQhEjF8nTyIm...
CertificateMIIE9DCCAtygAwIBAgIQAKdj9OEEtK/PmVn/2IlEdTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MTExMjA2MTQxN1oYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAt79yvi82zMkZkRdUuCBbnaQ9a7fqidLALKNd/BEjRKS1OWiYAzTf9ZzAK1K+kOAeePTlezhU...

AsyncRat

(PID) Process(3352) syteam.exe
C2 (1)18.141.204.5
Ports (1)80
Version0.5.7B
BotnetDefault
Options
AutoRuntrue
MutexAsyncMutex_6SI8OkPnk
InstallFolder%Temp%
BSoDfalse
AntiVMfalse
Certificates
Cert1MIIE8jCCAtqgAwIBAgIQAIQIWleL0frBIeSQnuAJuTANBgkqhkiG9w0BAQ0FADAaMRgwFgYDVQQDDA9Bc3luY1JBVCBTZXJ2ZXIwIBcNMjMwMzIyMDMyODIxWhgPOTk5OTEyMzEyMzU5NTlaMBoxGDAWBgNVBAMMD0FzeW5jUkFUIFNlcnZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKX5mwRbyfv2cMBQSb31Ov/ZLK9YMWp68guIQ9AGKqyfGCo0xK9xsD4RQYo8ukDIvCwxawZHu/j4...
Server_SignatureSlw1S0CB1MQ0Vr7eeR5UA3J0XHOjJfspjFdk9C6rTOXRPzGxJH9uSNOY0Ql6J2roa9jMR/bJB/E/i8GIoDD7e//tlmVxAGgqJ8fn3DRgSNMnXjztqGPEKSPRVKbTzOIbMV0KnS5/cT9+Qf69BLeEpIEuljR+S5KIvCYMorbzyFu+5p3mwc9iZ+1WmC5qCncICclFsrnOVGu1Aqc2FuRKtRIWBfJtszgh5m5zKgCJzFL6jpOifEdmqY/uzB1/lkug0Iwc9e/YN3Q0xCmXM+mO5FeoC9MJGXNYzRFbagGG/bNA...
Keys
AESf2b2168fe19a40d2a006ef4a806ae1da93537f874c52238edc371debd2b651da
Saltbfeb1e56fbcd973bb219022430a57843003d5644d21e62b9d4f180e7e6c33941

Nanocore

(PID) Process(3712) MSystem32.exe
KeyboardLoggingTrue
BuildTime2023-08-28 20:06:58.286896
Version1.2.2.0
Mutex27f61c82-a893-4fbd-9acd-5df9ed98d52d
DefaultGroupCustomRPC
PrimaryConnectionHostsulfux.ddns.net
BackupConnectionHost90.113.178.145
ConnectionPort9033
RunOnStartupTrue
RequestElevationFalse
BypassUserAccountControlTrue
ClearZoneIdentifierTrue
ClearAccessControlFalse
SetCriticalProcessFalse
PreventSystemSleepTrue
ActivateAwayModeFalse
EnableDebugModeFalse
RunDelay0
ConnectDelay4000
RestartDelay5000
TimeoutInterval5000
KeepAliveTimeout30000
MutexTimeout5000
LanTimeout2500
WanTimeout8000
BufferSize65535
MaxPacketSize10485760
GCThreshold10485760
UseCustomDnsServerTrue
PrimaryDnsServer8.8.8.8
BackupDnsServer8.8.4.4

NjRat

(PID) Process(932) testme.exe
C2127.0.0.1
Ports8080
BotnetHacked!
Options
Auto-run registry keySoftware\Microsoft\Windows\CurrentVersion\Run\94fd569ecca6fc088d293c04362d882f
Splitter|'|'|
Version0.7d
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:12:22 08:29:10+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 80
CodeSize: 5632
InitializedDataSize: 4608
UninitializedDataSize: -
EntryPoint: 0x3552
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 0.0.0.0
InternalName: 4363463463464363463463463.exe
LegalCopyright:
OriginalFileName: 4363463463464363463463463.exe
ProductVersion: 0.0.0.0
AssemblyVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
315
Monitored processes
200
Malicious processes
43
Suspicious processes
16

Behavior graph

Click at the process to see the details
start #STEALER 4363463463464363463463463.exe #STEALER svchost.exe random.exe random.tmp no specs #QUASAR asdasdasdasdasd.exe #ASYNCRAT image%20logger.exe #XWORM xclient.exe #TEAMVIEWER svchost.exe powershell.exe no specs cmd.exe cmd.exe no specs schtasks.exe no specs timeout.exe no specs jjsploit.v2.exe powershell.exe no specs powershell.exe no specs schtasks.exe no specs #QUASARRAT cleanerv2.exe #QUASAR windows 3543.exe #ASYNCRAT syteam.exe powershell.exe no specs ntvdm.exe no specs schtasks.exe no specs schtasks.exe no specs #QUASAR client.exe schtasks.exe no specs schtasks.exe no specs xclient.exe no specs xw_xxgl.exe #ASYNCRAT solara_protect.exe no specs critscript.exe #QUASAR neverlose%20loader.exe no specs jusched.exe schtasks.exe no specs #QUASAR jusched.exe proctoru.1.30.win.07.exe no specs schtasks.exe no specs #MIMIKATZ mizedo.exe no specs cmd.exe no specs chcp.com no specs ping.exe no specs vb.net%20crypter%20v2.exe no specs #QUASAR windows 3543.exe schtasks.exe no specs hydkj.exe client-built4.exe rardkj.exe no specs setup.exe no specs schtasks.exe no specs #QUASAR client.exe xclient.exe no specs 5c8b08b37a426.exe no specs schtasks.exe no specs msiexec.exe msiexec.exe msiexec.exe idrivert.exe ntvdm.exe no specs idriver.exe no specs #NANOCORE msystem32.exe 3911_wz.exe schtasks.exe no specs schtasks.exe no specs fiddlersetup.exe #NJRAT testme.exe no specs fiddlersetup.exe no specs netsh.exe no specs maza-0.16.3-win32-setup-unsigned.exe #NJRAT client.exe #QUASARRAT defender64.exe #QUASARRAT svhost.exe schtasks.exe no specs defenderx64.exe schtasks.exe no specs #QUASAR svhost.exe %ec%9d%b8%ed%84%b0%eb%84%b7_%ec%a2%85%eb%9f%89%ec%a0%9c_%ed%85%8c%ec%8a%a4%ed%8a%b8-cksal16.exe schtasks.exe no specs schtasks.exe no specs cmd.exe no specs windowsservices.exe no specs chcp.com no specs ping.exe no specs netsh.exe no specs fmt_02.exe no specs ntvdm.exe no specs cmd.exe no specs chcp.com no specs ping.exe no specs #QUASARRAT client-built.exe #RAT apiupdater.exe cmd.exe no specs reg.exe no specs wscript.exe no specs cmd.exe no specs $77-bitdefender.exe no specs cmd.exe no specs reg.exe no specs iexplore.exe schtasks.exe no specs cmd.exe no specs svchost.exe no specs reg.exe no specs perfwatson1.exe hdtune.exe no specs schtasks.exe no specs cmd.exe no specs chcp.com no specs ping.exe no specs viewpoint_support.exe mos%20ssssttttt.exe no specs testmemtest11.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs upm2008.exe no specs taskmoder.exe wscript.exe no specs taskkill.exe no specs explorer.exe no specs explorer.exe no specs crazycoach.exe no specs benpolatalemdar.exe xclient.exe no specs #TEAMVIEWER teamviewer.exe tv_w32.exe 24321.exe redlinestealer.exe guardservice.exe no specs xclient.exe no specs 386.exe no specs dxwebsetup.exe ntvdm.exe dxwsetup.exe client-built8.exe no specs cleanup_tool.exe no specs cabal.exe jd144.exe #QUASARRAT wenzcord.exe schtasks.exe no specs wenzcord.exe systempreter.exe schtasks.exe no specs cmd.exe no specs chcp.com no specs ping.exe no specs lkkkkk.exe no specs lkkkkk.exe #QUASARRAT runtimebroker.exe update.exe testmemtest10.exe no specs runtimebroker.exe no specs services.exe ntvdm.exe no specs cmd.exe no specs chcp.com no specs ping.exe no specs testingfile.exe no specs lminput_service.exe no specs vxcx.exe cloudy.exe regasm.exe no specs regasm.exe no specs regasm.exe no specs ipscan.exe no specs xclient.exe no specs hddrive1095_xinanplug3030_20230619_inno.exe hddrive1095_xinanplug3030_20230619_inno.tmp upagent.exe upagent.exe no specs alex1213321.exe alex1213321.exe msiexec.exe msiexec.exe no specs pornhub_downloader.exe no specs ntvdm.exe no specs cmd.exe no specs mshta.exe no specs terminal_9235.exe no specs pornhub_downloader.exe no specs cryptowall.exe no specs cmd.exe no specs explorer.exe reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs msedge.exe no specs attrib.exe no specs zubovlekciya.exe powershell.exe wscript.exe no specs shtrayeasy.exe no specs msedge.exe no specs cmd.exe schtasks.exe no specs cmd.exe no specs timeout.exe no specs svchost.exe 4363463463464363463463463.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
120"C:\Users\admin\Desktop\Files\CrazyCoach.exe" C:\Users\admin\Desktop\Files\CrazyCoach.exe4363463463464363463463463.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\files\crazycoach.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winmm.dll
184C:\Windows\system32\MsiExec.exe -Embedding D9D03342560EB2C07D3202207DC7DC7D CC:\Windows\System32\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
348"C:\Windows\system32\ntvdm.exe" -i1 C:\Windows\System32\ntvdm.exe4363463463464363463463463.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
NTVDM.EXE
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntvdm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
448"C:\Users\admin\Desktop\Files\Solara_Protect.exe" C:\Users\admin\Desktop\Files\Solara_Protect.exe
4363463463464363463463463.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\files\solara_protect.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
576"schtasks" /create /tn "Java Update Scheduler" /sc ONLOGON /tr "C:\Users\admin\AppData\Roaming\Java\jusched.exe" /rl HIGHEST /fC:\Windows\System32\schtasks.exejusched.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
576"C:\Users\admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe" C:\Users\admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe
viewpoint_support.exe
User:
admin
Company:
TeamViewer Germany GmbH
Integrity Level:
HIGH
Description:
TeamViewer 11
Version:
11.3.62585.0
Modules
Images
c:\users\admin\appdata\local\temp\teamviewer\teamviewer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
676"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\admin\Desktop\Files\XClient.exe'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeXClient.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
756C:\Users\admin\AppData\Roaming\XClient.exe C:\Users\admin\AppData\Roaming\XClient.exetaskeng.exe
User:
admin
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\xclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
848"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\admin\AppData\Roaming\svhost\svhost.exe" /rl HIGHEST /fC:\Windows\System32\schtasks.exesvhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
856"C:\Users\admin\Desktop\Files\Neverlose%20Loader.exe" C:\Users\admin\Desktop\Files\Neverlose%20Loader.exe
4363463463464363463463463.exe
User:
admin
Integrity Level:
HIGH
Description:
Quasar Client
Version:
1.4.0
Modules
Images
c:\users\admin\desktop\files\neverlose%20loader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Quasar
(PID) Process(856) Neverlose%20Loader.exe
Version1.4.0
C2 (5)192.168.31.99:4782
2001:4bc9:1f98:a4e::676:4782
255.255.255.0:4782
fe80::cabf:4cff:fe84:9572%17:4782
Sub_DirSubDir
Install_NameNeverlose Loader.exe
Mutex1f65a787-81b8-4955-95e4-b7751e10cd50
StartupJava Updater
TagOffice04
LogDirLogs
SignatureIpoC4G3VyXpCX73v8GLDgGX/ZD0uyJLyqReXAqvKNH4BzMk3aCKHatwBDnXbtrYfH96ChJhU2qLyWTlHJUq+HoFp5tRNEGlBaYc4IVl0lEBCjQsDf3wMCaU/2Ns/z3lVzh7AYhfCMb7L/mgf/ZfDTlEJasxUBvBxHVeahyU9WD2HTH2ZyabAt3fHWrcnpoZWMA40Zn+F5whQw5O7VIRpO5BFmYGBosHkSSeFe56cyRhha4rXQLWUx6ghioEm4px39T6OhjYSHUIArYzIM7z7hcOTAbXEgoZ7o6mG/GfLaECs...
CertificateMIIE9DCCAtygAwIBAgIQALWSoR4pE9fOZHv3Ui7LYTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTIyMTEyNDEwMTk1M1oYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAhOEJcBCuOOX0MDmITV+fSJpkL4NBxf1/CNJoEpUamratcDd5r9kc9hO+9tpd7DnFmZc5JQTa...
Total events
89 258
Read events
87 515
Write events
1 662
Delete events
81

Modification events

(PID) Process:(2336) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2336) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2336) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2336) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2336) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2336) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2336) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2336) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2336) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2336) 4363463463464363463463463.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
Executable files
197
Suspicious files
60
Text files
101
Unknown types
0

Dropped files

PID
Process
Filename
Type
23364363463463464363463463463.exeC:\Users\admin\Desktop\Files\svchost.exeexecutable
MD5:1ECE670AAA09AC9E02AE27B7678B167C
SHA256:B88C6884675CDB358F46C1FBFEDDF24AF749372A6C14C1C4A2757D7BDE3FBC39
23364363463463464363463463463.exeC:\Users\admin\Desktop\Files\random.exeexecutable
MD5:DCBFAB753554CD4CD7372AFB49FB0EE1
SHA256:A6E46CC6EA6BB54C37B6846E77047932BC3C871D7363A9114A916EB44702A039
2304random.exeC:\Users\admin\AppData\Local\Temp\is-19HSF.tmp\random.tmpexecutable
MD5:E4C43138CCB8240276872FD1AEC369BE
SHA256:46BE5E3F28A5E4ED63D66B901D927C25944B4DA36EFFEA9C97FB05994360EDF5
676powershell.exeC:\Users\admin\AppData\Local\Temp\es5v111u.iww.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
23364363463463464363463463463.exeC:\Users\admin\Desktop\Files\XClient.exeexecutable
MD5:63384BF1D08B472B5C594F4AAC46F950
SHA256:CEBAF3C3A4D1A842C50DAA423F1E81A9D067AEC9CDA327F745A50D8636EC9352
23364363463463464363463463463.exeC:\Users\admin\Desktop\Files\image%20logger.exeexecutable
MD5:520E6035E15A9422E1C4CBADA69263AA
SHA256:99A06D8A9EDA7BA2D19DA54C2759A783E20922A73A4893CACCC220CDAA27A883
3116image%20logger.exeC:\Users\admin\AppData\Local\Temp\syteam.exeexecutable
MD5:520E6035E15A9422E1C4CBADA69263AA
SHA256:99A06D8A9EDA7BA2D19DA54C2759A783E20922A73A4893CACCC220CDAA27A883
2612svchost.exeC:\Users\admin\AppData\Roaming\svchost.exeexecutable
MD5:1ECE670AAA09AC9E02AE27B7678B167C
SHA256:B88C6884675CDB358F46C1FBFEDDF24AF749372A6C14C1C4A2757D7BDE3FBC39
2612svchost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnkbinary
MD5:43427FFEC2BBB4EB29304E03651B37B7
SHA256:3E0F5DBE8115AB5410304F6578B0B34204B114F4688C7DCCC07750824799BE2D
23364363463463464363463463463.exeC:\Users\admin\Desktop\Files\xmrig.exeexecutable
MD5:CB166D49CE846727ED70134B589B0142
SHA256:49DA580656E51214D59702A1D983EFF143AF3560A344F524FE86326C53FB5DDB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
69
TCP/UDP connections
561
DNS requests
87
Threats
175

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2336
4363463463464363463463463.exe
GET
200
185.156.72.2:80
http://185.156.72.2/files/unique1/random.exe
unknown
unknown
2336
4363463463464363463463463.exe
GET
47.98.177.117:8888
http://47.98.177.117:8888/supershell/compile/download/1.exe
unknown
malicious
2336
4363463463464363463463463.exe
GET
301
140.82.121.4:80
http://github.com/sfyklight/VB-KasperSky-Undetectedtable-Crypter/raw/refs/heads/main/VB.NET%20CRYPTER%20V2.exe
unknown
whitelisted
1808
XW_XXGL.exe
GET
200
112.5.156.15:20006
http://data.yhydl.com:20006/file/XWGL/aa.inf
unknown
malicious
2336
4363463463464363463463463.exe
GET
103.216.119.164:80
http://quanlyphongnet.com/net/Coc%20Coc.exe
unknown
unknown
2336
4363463463464363463463463.exe
GET
200
60.191.208.187:820
http://ftp.ywxww.net:820/hydkj.exe
unknown
unknown
2336
4363463463464363463463463.exe
GET
200
202.97.231.78:80
http://src1.minibai.com/uploads/thirdupload/5c8b08b37a426.exe
unknown
malicious
2336
4363463463464363463463463.exe
GET
200
120.26.3.86:80
http://wz.3911.com/3911_wz.exe
unknown
unknown
2336
4363463463464363463463463.exe
GET
193.123.237.45:80
http://193.123.237.45/FiddlerSetup.exe
unknown
unknown
3692
3911_wz.exe
GET
301
120.26.3.86:80
http://wz.btyou.com/client.html
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
2336
4363463463464363463463463.exe
151.101.194.49:443
urlhaus.abuse.ch
FASTLY
US
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
2336
4363463463464363463463463.exe
185.199.108.133:443
raw.githubusercontent.com
FASTLY
US
whitelisted
4
System
192.168.100.255:138
whitelisted
2336
4363463463464363463463463.exe
185.156.72.2:80
Tov Vaiz Partner
RU
unknown
2336
4363463463464363463463463.exe
140.82.121.4:443
github.com
GITHUB
US
whitelisted
2612
svchost.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
whitelisted
2564
asdasdasdasdasd.exe
147.185.221.27:2676
go-dramatically.gl.at.ply.gg
PLAYIT-GG
US
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.46
whitelisted
urlhaus.abuse.ch
  • 151.101.194.49
  • 151.101.66.49
  • 151.101.2.49
  • 151.101.130.49
whitelisted
raw.githubusercontent.com
  • 185.199.108.133
  • 185.199.110.133
  • 185.199.109.133
  • 185.199.111.133
whitelisted
github.com
  • 140.82.121.4
  • 140.82.121.3
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
go-dramatically.gl.at.ply.gg
  • 147.185.221.27
malicious
objects.githubusercontent.com
  • 185.199.109.133
  • 185.199.110.133
  • 185.199.108.133
  • 185.199.111.133
whitelisted
data.yhydl.com
  • 112.5.156.15
malicious
LETSQOOO-62766.portmap.host
malicious
ftp.ywxww.net
  • 60.191.208.187
unknown

Threats

PID
Process
Class
Message
2336
4363463463464363463463463.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
2336
4363463463464363463463463.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 34
1080
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
2336
4363463463464363463463463.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
2336
4363463463464363463463463.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
2336
4363463463464363463463463.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
1080
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
1080
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
2612
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
2612
svchost.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
Process
Message
4363463463464363463463463.exe
The specified executable is not a valid application for this OS platform.
4363463463464363463463463.exe
The specified executable is not a valid application for this OS platform.
4363463463464363463463463.exe
The specified executable is not a valid application for this OS platform.
CritScript.exe
C:\Users\admin\AppData\Local\Temp\JUSCHED.EXE
4363463463464363463463463.exe
An exception occurred during a WebClient request.
CritScript.exe
C:\Users\admin\AppData\Local\Temp\ZOMBIES.AHK
4363463463464363463463463.exe
The specified executable is not a valid application for this OS platform.
4363463463464363463463463.exe
The specified executable is not a valid application for this OS platform.
4363463463464363463463463.exe
The specified executable is not a valid application for this OS platform.
4363463463464363463463463.exe
The specified executable is not a valid application for this OS platform.