URL:

https://kittenscraft.com/

Full analysis: https://app.any.run/tasks/c295eb28-8a3b-404f-b886-dafba578696b
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 24, 2025, 19:03:29
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
discord
stealer
microstealer
arch-doc
anti-evasion
Indicators:
MD5:

CC8D4C040FF776122E6753ADBD8A42A0

SHA1:

A92F97A2C167CEFCEE8EF53823E0A67C3AB17C6A

SHA256:

472F0006CEB91DEBA10274F18D8AB8CE1C50740A8DAE1834DB63C63825983A3F

SSDEEP:

3:N8J3ANqRyTKn:2eNqyGn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 4744)
      • cmd.exe (PID: 6932)
      • cmd.exe (PID: 8580)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 2096)
      • powershell.exe (PID: 8568)
      • powershell.exe (PID: 4504)
    • MICROSTEALER has been detected (SURICATA)

      • swazla.exe (PID: 7524)
    • Uses Task Scheduler to autorun other applications

      • swazla.exe (PID: 7524)
    • Actions looks like stealing of personal data

      • swazla.exe (PID: 7524)
      • swazla.exe (PID: 7948)
    • Steals credentials from Web Browsers

      • swazla.exe (PID: 7524)
      • swazla.exe (PID: 7948)
    • Antivirus name has been found in the command line (generic signature)

      • taskkill.exe (PID: 3548)
      • taskkill.exe (PID: 8980)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • KittensLauncher.exe (PID: 1136)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • KittensLauncher.exe (PID: 1136)
    • Executable content was dropped or overwritten

      • KittensLauncher.exe (PID: 1136)
      • Game Launcher.exe (PID: 7316)
      • swazla.exe (PID: 7524)
      • swazla.exe (PID: 7948)
    • Starts CMD.EXE for commands execution

      • KittensLauncher.exe (PID: 1136)
      • Game Launcher.exe (PID: 8488)
      • Game Launcher.exe (PID: 4724)
      • Game Launcher.exe (PID: 3380)
    • The process executes Powershell scripts

      • cmd.exe (PID: 4744)
      • cmd.exe (PID: 6932)
      • cmd.exe (PID: 8580)
    • Get information on the list of running processes

      • cmd.exe (PID: 2740)
      • KittensLauncher.exe (PID: 1136)
      • swazla.exe (PID: 7524)
      • swazla.exe (PID: 7948)
    • Drops 7-zip archiver for unpacking

      • KittensLauncher.exe (PID: 1136)
    • Reads security settings of Internet Explorer

      • KittensLauncher.exe (PID: 1136)
    • Process drops legitimate windows executable

      • KittensLauncher.exe (PID: 1136)
      • Game Launcher.exe (PID: 7316)
    • The process hide an interactive prompt from the user

      • cmd.exe (PID: 4744)
      • cmd.exe (PID: 6932)
      • cmd.exe (PID: 8580)
    • Application launched itself

      • Game Launcher.exe (PID: 8488)
      • Game Launcher.exe (PID: 4724)
      • Game Launcher.exe (PID: 3380)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 4744)
      • cmd.exe (PID: 6932)
      • cmd.exe (PID: 8580)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 4744)
      • cmd.exe (PID: 6932)
      • cmd.exe (PID: 8580)
    • Uses WMIC.EXE to obtain Windows Installer data

      • swazla.exe (PID: 7524)
      • swazla.exe (PID: 7948)
    • Uses TASKKILL.EXE to kill process

      • swazla.exe (PID: 7524)
      • swazla.exe (PID: 7948)
    • Uses TASKKILL.EXE to kill Browsers

      • swazla.exe (PID: 7524)
      • swazla.exe (PID: 7948)
    • The process drops C-runtime libraries

      • Game Launcher.exe (PID: 7316)
    • Loads DLL from Mozilla Firefox

      • swazla.exe (PID: 7524)
      • swazla.exe (PID: 7948)
    • There is functionality for taking screenshot (YARA)

      • swazla.exe (PID: 7524)
  • INFO

    • Application launched itself

      • msedge.exe (PID: 7620)
    • Checks supported languages

      • KittensLauncher.exe (PID: 1136)
      • identity_helper.exe (PID: 5164)
      • Game Launcher.exe (PID: 8488)
      • Game Launcher.exe (PID: 7316)
      • Game Launcher.exe (PID: 7472)
      • Game Launcher.exe (PID: 1780)
      • swazla.exe (PID: 7524)
      • TextInputHost.exe (PID: 8700)
      • Game Launcher.exe (PID: 7832)
      • Game Launcher.exe (PID: 3060)
      • Game Launcher.exe (PID: 4724)
      • Game Launcher.exe (PID: 8468)
      • swazla.exe (PID: 7948)
      • Game Launcher.exe (PID: 3380)
      • Game Launcher.exe (PID: 8184)
      • Game Launcher.exe (PID: 7936)
      • Game Launcher.exe (PID: 3332)
    • Reads the computer name

      • identity_helper.exe (PID: 5164)
      • KittensLauncher.exe (PID: 1136)
      • Game Launcher.exe (PID: 8488)
      • Game Launcher.exe (PID: 1780)
      • Game Launcher.exe (PID: 7472)
      • swazla.exe (PID: 7524)
      • TextInputHost.exe (PID: 8700)
      • Game Launcher.exe (PID: 4724)
      • Game Launcher.exe (PID: 3060)
      • swazla.exe (PID: 7948)
      • Game Launcher.exe (PID: 7832)
      • Game Launcher.exe (PID: 3380)
      • Game Launcher.exe (PID: 7936)
      • Game Launcher.exe (PID: 8184)
    • Reads Environment values

      • identity_helper.exe (PID: 5164)
      • Game Launcher.exe (PID: 8488)
      • Game Launcher.exe (PID: 7316)
      • Game Launcher.exe (PID: 4724)
      • Game Launcher.exe (PID: 8468)
      • Game Launcher.exe (PID: 3380)
      • Game Launcher.exe (PID: 3332)
    • Create files in a temporary directory

      • KittensLauncher.exe (PID: 1136)
      • Game Launcher.exe (PID: 8488)
      • swazla.exe (PID: 7524)
      • Game Launcher.exe (PID: 4724)
      • swazla.exe (PID: 7948)
      • Game Launcher.exe (PID: 3380)
    • The sample compiled with english language support

      • KittensLauncher.exe (PID: 1136)
      • Game Launcher.exe (PID: 7316)
    • Reads product name

      • Game Launcher.exe (PID: 8488)
      • Game Launcher.exe (PID: 7316)
      • Game Launcher.exe (PID: 4724)
      • Game Launcher.exe (PID: 8468)
      • Game Launcher.exe (PID: 3380)
      • Game Launcher.exe (PID: 3332)
    • Creates files or folders in the user directory

      • KittensLauncher.exe (PID: 1136)
      • Game Launcher.exe (PID: 7316)
      • swazla.exe (PID: 7524)
    • Creates a software uninstall entry

      • KittensLauncher.exe (PID: 1136)
    • Manual execution by a user

      • Game Launcher.exe (PID: 8488)
      • notepad.exe (PID: 8188)
      • Game Launcher.exe (PID: 4724)
      • Game Launcher.exe (PID: 3380)
    • Process checks computer location settings

      • Game Launcher.exe (PID: 8488)
      • Game Launcher.exe (PID: 7316)
      • Game Launcher.exe (PID: 4724)
      • Game Launcher.exe (PID: 8468)
      • Game Launcher.exe (PID: 3380)
      • Game Launcher.exe (PID: 3332)
    • Reads the machine GUID from the registry

      • Game Launcher.exe (PID: 8488)
      • swazla.exe (PID: 7524)
      • Game Launcher.exe (PID: 4724)
      • swazla.exe (PID: 7948)
      • Game Launcher.exe (PID: 3380)
    • Checks proxy server information

      • Game Launcher.exe (PID: 8488)
      • slui.exe (PID: 1948)
      • Game Launcher.exe (PID: 4724)
      • Game Launcher.exe (PID: 3380)
    • The executable file from the user directory is run by the Powershell process

      • Game Launcher.exe (PID: 7316)
      • Game Launcher.exe (PID: 8468)
      • Game Launcher.exe (PID: 3332)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 9144)
      • WMIC.exe (PID: 8376)
      • WMIC.exe (PID: 1784)
      • WMIC.exe (PID: 8532)
      • WMIC.exe (PID: 8424)
      • WMIC.exe (PID: 9080)
      • WMIC.exe (PID: 8936)
      • WMIC.exe (PID: 1296)
      • WMIC.exe (PID: 2308)
      • WMIC.exe (PID: 2372)
      • WMIC.exe (PID: 8536)
      • WMIC.exe (PID: 9184)
      • WMIC.exe (PID: 5204)
      • WMIC.exe (PID: 7888)
      • WMIC.exe (PID: 7484)
      • WMIC.exe (PID: 9044)
      • WMIC.exe (PID: 8664)
      • WMIC.exe (PID: 9116)
      • WMIC.exe (PID: 7468)
      • WMIC.exe (PID: 9080)
      • WMIC.exe (PID: 3544)
      • WMIC.exe (PID: 8228)
      • WMIC.exe (PID: 8132)
      • WMIC.exe (PID: 5304)
      • WMIC.exe (PID: 8104)
      • WMIC.exe (PID: 7768)
      • WMIC.exe (PID: 5736)
      • WMIC.exe (PID: 2740)
      • WMIC.exe (PID: 4620)
      • WMIC.exe (PID: 6788)
      • WMIC.exe (PID: 1352)
      • WMIC.exe (PID: 8668)
      • WMIC.exe (PID: 7308)
      • WMIC.exe (PID: 9088)
      • WMIC.exe (PID: 424)
      • WMIC.exe (PID: 2452)
      • WMIC.exe (PID: 5732)
      • WMIC.exe (PID: 7372)
      • WMIC.exe (PID: 5168)
      • WMIC.exe (PID: 2752)
      • WMIC.exe (PID: 6792)
      • WMIC.exe (PID: 8556)
      • WMIC.exe (PID: 2096)
      • WMIC.exe (PID: 8092)
      • WMIC.exe (PID: 9012)
      • WMIC.exe (PID: 5148)
      • WMIC.exe (PID: 7304)
      • notepad.exe (PID: 8188)
      • WMIC.exe (PID: 9068)
      • WMIC.exe (PID: 8576)
      • WMIC.exe (PID: 8108)
      • WMIC.exe (PID: 1136)
      • WMIC.exe (PID: 4864)
      • WMIC.exe (PID: 1176)
      • WMIC.exe (PID: 7320)
      • WMIC.exe (PID: 5728)
      • WMIC.exe (PID: 8064)
      • WMIC.exe (PID: 5676)
      • WMIC.exe (PID: 4784)
      • WMIC.exe (PID: 3024)
      • WMIC.exe (PID: 3040)
      • WMIC.exe (PID: 3204)
      • WMIC.exe (PID: 2688)
      • WMIC.exe (PID: 8308)
      • WMIC.exe (PID: 7888)
      • WMIC.exe (PID: 8104)
      • WMIC.exe (PID: 8996)
      • WMIC.exe (PID: 8444)
      • WMIC.exe (PID: 3544)
      • WMIC.exe (PID: 8568)
      • WMIC.exe (PID: 5168)
      • WMIC.exe (PID: 7484)
      • WMIC.exe (PID: 8540)
      • WMIC.exe (PID: 4344)
      • WMIC.exe (PID: 8628)
      • WMIC.exe (PID: 6296)
      • WMIC.exe (PID: 6424)
      • WMIC.exe (PID: 5732)
      • WMIC.exe (PID: 8948)
      • WMIC.exe (PID: 6916)
      • WMIC.exe (PID: 4828)
      • WMIC.exe (PID: 8724)
      • WMIC.exe (PID: 8688)
      • WMIC.exe (PID: 1492)
      • WMIC.exe (PID: 8084)
      • WMIC.exe (PID: 8664)
      • WMIC.exe (PID: 7404)
      • WMIC.exe (PID: 1352)
      • WMIC.exe (PID: 1956)
      • WMIC.exe (PID: 8632)
      • WMIC.exe (PID: 2900)
      • WMIC.exe (PID: 7324)
    • Uses Task Scheduler to autorun other applications (AUTOMATE)

      • swazla.exe (PID: 7948)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
787
Monitored processes
630
Malicious processes
7
Suspicious processes
6

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs slui.exe kittenslauncher.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs msedge.exe no specs msedge.exe no specs game launcher.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs game launcher.exe no specs game launcher.exe no specs game launcher.exe #MICROSTEALER swazla.exe wmic.exe no specs conhost.exe no specs msedge.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs wmic.exe no specs schtasks.exe no specs conhost.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs msedge.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs msedge.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs conhost.exe no specs taskkill.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs notepad.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs textinputhost.exe no specs tasklist.exe no specs conhost.exe no specs game launcher.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs game launcher.exe no specs game launcher.exe no specs game launcher.exe swazla.exe wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs game launcher.exe no specs tasklist.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs game launcher.exe no specs game launcher.exe no specs taskkill.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs game launcher.exe wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs conhost.exe no specs conhost.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
404\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
408taskkill /F /IM opera.exeC:\Windows\System32\taskkill.exeswazla.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
424WMIC /Node:localhost /Namespace:\\root\CIMV2 Path Win32_ComputerSystemProduct Get UUID /Format:ListC:\Windows\System32\wbem\WMIC.exeswazla.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\framedynos.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
496\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
508\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetasklist.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
508\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
792\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetasklist.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
792tasklist.exeC:\Windows\System32\tasklist.exeswazla.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
948"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=5308,i,2915206367334750653,7265546354987012832,262144 --variations-seed-version --mojo-platform-channel-handle=7580 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1136"C:\Users\admin\Downloads\KittensLauncher.exe" C:\Users\admin\Downloads\KittensLauncher.exe
msedge.exe
User:
admin
Company:
Game Development Studio
Integrity Level:
MEDIUM
Description:
Game Launcher - Official Desktop Application
Exit code:
0
Version:
1.0.0
Modules
Images
c:\users\admin\downloads\kittenslauncher.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
57 923
Read events
57 910
Write events
13
Delete events
0

Modification events

(PID) Process:(1136) KittensLauncher.exeKey:HKEY_CURRENT_USER\SOFTWARE\72430ff7-002b-5043-b066-c0ae37b6d382
Operation:writeName:InstallLocation
Value:
C:\Users\admin\AppData\Local\Programs\GameLauncher
(PID) Process:(1136) KittensLauncher.exeKey:HKEY_CURRENT_USER\SOFTWARE\72430ff7-002b-5043-b066-c0ae37b6d382
Operation:writeName:KeepShortcuts
Value:
true
(PID) Process:(1136) KittensLauncher.exeKey:HKEY_CURRENT_USER\SOFTWARE\72430ff7-002b-5043-b066-c0ae37b6d382
Operation:writeName:ShortcutName
Value:
Game Launcher
(PID) Process:(1136) KittensLauncher.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\72430ff7-002b-5043-b066-c0ae37b6d382
Operation:writeName:DisplayName
Value:
Game Launcher 1.0.0
(PID) Process:(1136) KittensLauncher.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\72430ff7-002b-5043-b066-c0ae37b6d382
Operation:writeName:UninstallString
Value:
"C:\Users\admin\AppData\Local\Programs\GameLauncher\Uninstall Game Launcher.exe" /currentuser
(PID) Process:(1136) KittensLauncher.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\72430ff7-002b-5043-b066-c0ae37b6d382
Operation:writeName:QuietUninstallString
Value:
"C:\Users\admin\AppData\Local\Programs\GameLauncher\Uninstall Game Launcher.exe" /currentuser /S
(PID) Process:(1136) KittensLauncher.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\72430ff7-002b-5043-b066-c0ae37b6d382
Operation:writeName:DisplayVersion
Value:
1.0.0
(PID) Process:(1136) KittensLauncher.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\72430ff7-002b-5043-b066-c0ae37b6d382
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\AppData\Local\Programs\GameLauncher\Game Launcher.exe,0
(PID) Process:(1136) KittensLauncher.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\72430ff7-002b-5043-b066-c0ae37b6d382
Operation:writeName:Publisher
Value:
Game Development Studio
(PID) Process:(1136) KittensLauncher.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\72430ff7-002b-5043-b066-c0ae37b6d382
Operation:writeName:NoModify
Value:
1
Executable files
153
Suspicious files
242
Text files
320
Unknown types
10

Dropped files

PID
Process
Filename
Type
7620msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\ClientCertificates\LOG.old~RFfdda5.TMP
MD5:
SHA256:
7620msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\ClientCertificates\LOG.old
MD5:
SHA256:
7620msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RFfddc4.TMP
MD5:
SHA256:
7620msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RFfddc4.TMP
MD5:
SHA256:
7620msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
7620msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
7620msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RFfddc4.TMP
MD5:
SHA256:
7620msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
7620msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old~RFfddd4.TMP
MD5:
SHA256:
7620msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RFfddd4.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
129
TCP/UDP connections
108
DNS requests
82
Threats
35

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7964
msedge.exe
GET
200
188.114.96.3:443
https://kittenscraft.com/images/hellokitty.mp4
unknown
unknown
7964
msedge.exe
GET
200
150.171.28.11:80
http://edge.microsoft.com/browsernetworktime/time/1/current?cup2key=2:GApxEkG7kAh2w4T_4iLZczRcQk9OkL-0HmTlUD9R_vk&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
unknown
whitelisted
7964
msedge.exe
GET
200
150.171.22.17:443
https://config.edge.skype.com/config/v1/Edge/133.0.3065.92?clientId=4489578223053569932&agents=EdgeFirstRun%2CEdgeFirstRunConfig&osname=win&client=edge&channel=stable&scpfre=0&osarch=x86_64&osver=10.0.19045&wu=1&devicefamily=desktop&uma=0&sessionid=65&mngd=0&installdate=1661339457&edu=0&soobedate=1504771245&bphint=2&fg=1&lbfgdate=1741678270&lafgdate=0
unknown
text
768 b
whitelisted
7964
msedge.exe
GET
200
104.18.23.222:443
https://copilot.microsoft.com/c/api/user/eligibility
unknown
25 b
whitelisted
7964
msedge.exe
GET
200
188.114.96.3:443
https://kittenscraft.com/
unknown
html
34.7 Kb
unknown
7964
msedge.exe
GET
200
188.114.96.3:443
https://kittenscraft.com/style.css
unknown
text
32.8 Kb
unknown
7964
msedge.exe
GET
200
188.114.96.3:443
https://kittenscraft.com/images/logo.png
unknown
image
122 Kb
unknown
7964
msedge.exe
GET
200
188.114.96.3:443
https://kittenscraft.com/images/emoji.png
unknown
image
93.9 Kb
unknown
7964
msedge.exe
GET
200
188.114.96.3:443
https://kittenscraft.com/images/image%20(1).jpg
unknown
image
74.8 Kb
unknown
7964
msedge.exe
GET
200
188.114.96.3:443
https://kittenscraft.com/winter-images/snowflake.png
unknown
image
26.2 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
6300
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2740
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7964
msedge.exe
150.171.22.17:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
7964
msedge.exe
150.171.28.11:80
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7964
msedge.exe
150.171.28.11:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7964
msedge.exe
188.114.96.3:443
kittenscraft.com
CLOUDFLARENET
US
whitelisted
7964
msedge.exe
104.18.23.222:443
copilot.microsoft.com
CLOUDFLARENET
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.142
whitelisted
edge.microsoft.com
  • 150.171.28.11
  • 150.171.27.11
whitelisted
config.edge.skype.com
  • 150.171.22.17
whitelisted
kittenscraft.com
  • 188.114.96.3
  • 188.114.97.3
unknown
copilot.microsoft.com
  • 104.18.23.222
  • 104.18.22.222
whitelisted
www.bing.com
  • 92.123.104.58
  • 92.123.104.66
  • 92.123.104.47
  • 92.123.104.59
  • 92.123.104.62
  • 92.123.104.52
  • 92.123.104.63
  • 92.123.104.50
  • 92.123.104.67
  • 92.123.104.13
  • 92.123.104.12
  • 92.123.104.6
  • 92.123.104.17
  • 92.123.104.16
  • 92.123.104.9
  • 92.123.104.55
  • 92.123.104.45
whitelisted
cdnjs.cloudflare.com
  • 104.17.25.14
  • 104.17.24.14
whitelisted
fonts.googleapis.com
  • 142.250.186.106
whitelisted
fonts.gstatic.com
  • 142.250.186.131
whitelisted

Threats

PID
Process
Class
Message
7964
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
7964
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
7964
msedge.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
7964
msedge.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
7964
msedge.exe
Misc activity
ET INFO Discord Chat Service Domain in DNS Lookup (discord .com)
7964
msedge.exe
Misc activity
ET INFO Discord Chat Service Domain in DNS Lookup (discord .com)
7964
msedge.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
7964
msedge.exe
Misc activity
ET INFO Observed Discord Service Domain (discord .com) in TLS SNI
7964
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
7964
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
No debug info