File name:

main.exe

Full analysis: https://app.any.run/tasks/51f85495-4490-4e35-9a22-d0f09eb3d539
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: June 30, 2025, 21:46:47
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
loader
possible-phishing
github
remcos
rat
auto
generic
amadey
remote
botnet
metasploit
backdoor
meterpreter
payload
miner
masslogger
stealer
coinminer
lumma
nanocore
phishing
clickfix
dcrat
networm
amus
wannacry
ransomware
aurotunstealer
njrat
redline
resolverrat
formbook
asyncrat
koiloader
agenttesla
metastealer
pyinstaller
evasion
phorpiex
snake
keylogger
screenconnect
rmm-tool
rdp
bladabindi
telegram
modiloader
neshta
younglotus
storm1747
tycoon
vidar
arechclient2
loki
clipper
diamotrix
purelogs
aurotun
quasar
sliver
auto-sch-xml
koistealer
koi
pastebin
ftp
exfiltration
xloader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 7 sections
MD5:

C942A56638772644D847709D906FA23D

SHA1:

12D6B77FEC2244CDC4050A083AA741185CC48010

SHA256:

56A28391D309102557FCF9BC34351A50B49054282F2007851DCBC4E825E7C37A

SSDEEP:

98304:R/0Cg6brcfRkzKVfq7AnYRO4Y6ZhkDQet54netUjZUj0vNQLFZfQpyJoic3yjHFD:ivfkEwE1MUQ881mw02/ki+BIsG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • Amus.exe (PID: 13568)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
    • REMCOS has been found (auto)

      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • e.exe (PID: 7752)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
    • Changes powershell execution policy (Bypass)

      • main.exe (PID: 3788)
      • cmd.exe (PID: 5352)
      • powershell.exe (PID: 8424)
      • conhost.exe (PID: 15488)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 6304)
      • powershell.exe (PID: 8424)
      • powershell.exe (PID: 9188)
      • powershell.exe (PID: 9952)
      • powershell.exe (PID: 9816)
      • powershell.exe (PID: 11060)
      • powershell.exe (PID: 11024)
      • powershell.exe (PID: 11172)
      • powershell.exe (PID: 10724)
      • powershell.exe (PID: 10976)
      • powershell.exe (PID: 11536)
      • powershell.exe (PID: 12760)
      • powershell.exe (PID: 12928)
      • powershell.exe (PID: 13536)
      • powershell.exe (PID: 14012)
      • powershell.exe (PID: 14004)
      • powershell.exe (PID: 14080)
      • powershell.exe (PID: 14144)
      • powershell.exe (PID: 14228)
      • powershell.exe (PID: 14160)
      • powershell.exe (PID: 14236)
      • powershell.exe (PID: 14268)
      • powershell.exe (PID: 9552)
      • powershell.exe (PID: 16580)
      • powershell.exe (PID: 6380)
      • powershell.exe (PID: 7908)
    • LUMMA has been found (auto)

      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • varen.exe (PID: 9920)
      • powershell.exe (PID: 8516)
      • powershell.exe (PID: 8320)
      • powershell.exe (PID: 8380)
      • powershell.exe (PID: 7836)
      • powershell.exe (PID: 3620)
      • powershell.exe (PID: 8552)
      • powershell.exe (PID: 8308)
      • powershell.exe (PID: 8488)
      • powershell.exe (PID: 8544)
      • powershell.exe (PID: 13608)
      • powershell.exe (PID: 8632)
    • AMADEY has been found (auto)

      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • donie30.exe (PID: 7544)
      • bravo29.exe (PID: 8292)
      • amnew.exe (PID: 14136)
      • dumer.exe (PID: 13432)
    • Application was injected by another process

      • explorer.exe (PID: 4772)
    • Runs injected code in another process

      • 1.exe (PID: 7600)
    • Changes the autorun value in the registry

      • 1.exe (PID: 7600)
      • e.exe (PID: 7752)
      • syspool.exe (PID: 9924)
      • explorer.exe (PID: 11328)
      • klass.exe (PID: 12148)
      • ls.exe (PID: 3844)
      • msconfig.exe (PID: 12024)
      • loader.exe (PID: 14104)
      • WannaCry.exe (PID: 14292)
      • winsvchost.exe (PID: 14048)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 14604)
      • Adobe.exe (PID: 11696)
      • remcos.exe (PID: 13016)
      • Axam.a.exe (PID: 13528)
      • explorer.exe (PID: 4772)
      • Amus.exe (PID: 13568)
      • AdobeART.exe (PID: 17828)
      • Bloxflip%20Predictor.exe (PID: 12624)
      • Axam.exe (PID: 19048)
      • AdobeART.exe (PID: 7620)
      • Axam.exe (PID: 8008)
      • Axam.exe (PID: 8496)
      • Axam.exe (PID: 8088)
      • Axam.exe (PID: 7968)
      • Axam.exe (PID: 8580)
      • Axam.exe (PID: 9004)
      • Axam.exe (PID: 8952)
      • quasarat.exe (PID: 14276)
      • Axam.exe (PID: 10600)
      • Axam.exe (PID: 10612)
      • Axam.exe (PID: 3756)
      • server.exe (PID: 11192)
      • Axam.exe (PID: 10744)
      • Axam.exe (PID: 5416)
      • Axam.exe (PID: 17348)
      • Axam.exe (PID: 14828)
      • Axam.exe (PID: 17272)
      • Axam.exe (PID: 5424)
      • Axam.exe (PID: 14984)
      • Axam.exe (PID: 16892)
      • Axam.exe (PID: 16908)
      • Axam.exe (PID: 12044)
      • Axam.exe (PID: 13464)
      • Axam.exe (PID: 13668)
      • Axam.exe (PID: 3724)
      • Axam.exe (PID: 17740)
      • Axam.exe (PID: 18076)
      • Axam.exe (PID: 13164)
      • Axam.exe (PID: 12500)
      • Axam.exe (PID: 15024)
      • Axam.exe (PID: 9240)
      • Axam.exe (PID: 16444)
      • Axam.exe (PID: 4560)
      • Axam.exe (PID: 10584)
      • Axam.exe (PID: 4820)
      • Axam.exe (PID: 18880)
      • Axam.exe (PID: 1520)
      • Axam.exe (PID: 9868)
      • Axam.exe (PID: 17512)
      • Axam.exe (PID: 17896)
      • Axam.exe (PID: 18988)
      • Axam.exe (PID: 7320)
      • Axam.exe (PID: 11628)
      • Axam.exe (PID: 4120)
      • dumer.exe (PID: 13432)
      • Axam.exe (PID: 18264)
      • Axam.exe (PID: 12124)
      • Axam.exe (PID: 17984)
      • Axam.exe (PID: 16408)
      • Axam.exe (PID: 1068)
      • Axam.exe (PID: 17472)
      • Axam.exe (PID: 11092)
      • Axam.exe (PID: 12720)
      • Axam.exe (PID: 16064)
      • Axam.exe (PID: 13664)
      • Axam.exe (PID: 11136)
      • Axam.exe (PID: 7868)
      • Axam.exe (PID: 8888)
      • Axam.exe (PID: 6388)
    • AMADEY mutex has been found

      • donie30.exe (PID: 7544)
      • amnew.exe (PID: 14136)
      • dumer.exe (PID: 18156)
      • varen.exe (PID: 9920)
      • dumer.exe (PID: 13432)
    • REMCOS mutex has been found

      • e.exe (PID: 7752)
      • K.exe (PID: 7704)
      • remcos.exe (PID: 13016)
    • REMCOS has been detected

      • e.exe (PID: 7752)
      • K.exe (PID: 7704)
      • remcos.exe (PID: 13016)
      • remcos.exe (PID: 13016)
    • RESOLVERRAT has been found (auto)

      • main.exe (PID: 3788)
    • REDLINE has been found (auto)

      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
    • NJRAT has been found (auto)

      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
      • your_app.exe (PID: 11208)
      • Bloxflip%20Predictor.exe (PID: 12624)
    • FORMBOOK has been found (auto)

      • main.exe (PID: 3788)
    • AGENTTESLA has been found (auto)

      • main.exe (PID: 3788)
    • YOUNGLOTUS has been found (auto)

      • main.exe (PID: 3788)
    • METASPLOIT has been found (auto)

      • main.exe (PID: 3788)
    • REMCOS has been detected (SURICATA)

      • K.exe (PID: 7704)
      • remcos.exe (PID: 13016)
    • METASPLOIT has been detected (SURICATA)

      • main.exe (PID: 3788)
    • METERPRETER has been detected (SURICATA)

      • main.exe (PID: 3788)
    • Create files in the Startup directory

      • explorer.exe (PID: 11328)
      • trails.exe (PID: 7796)
      • bot.exe (PID: 2216)
      • Axam.a.exe (PID: 13528)
      • Bloxflip%20Predictor.exe (PID: 12624)
      • Setup.exe (PID: 10952)
    • SCREENCONNECT has been found (auto)

      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
    • Registers / Runs the DLL via REGSVR32.EXE

      • loader.exe (PID: 14104)
    • CLICKFIX has been detected (SURICATA)

      • svchost.exe (PID: 2200)
      • main.exe (PID: 3788)
    • PHISHING has been detected (SURICATA)

      • svchost.exe (PID: 2200)
    • PHORPIEX has been found (auto)

      • kajmak.exe (PID: 14064)
    • WANNACRY mutex has been found

      • WannaCry.exe (PID: 14292)
    • NETWORM mutex has been found

      • Amus.exe (PID: 13568)
    • ARECHCLIENT2 has been found (auto)

      • main.exe (PID: 3788)
    • DCRAT mutex has been found

      • startud.exe (PID: 9168)
    • ASYNCRAT has been detected (SURICATA)

      • trails.exe (PID: 7796)
      • foncar.exe (PID: 14216)
      • aspnet_compiler.exe (PID: 14796)
    • Connects to the CnC server

      • remcos.exe (PID: 13016)
      • cc.exe (PID: 11080)
      • svchost.exe (PID: 2200)
      • powershell.exe (PID: 12928)
      • varen.exe (PID: 9920)
      • dumer.exe (PID: 13432)
      • Crypt.exe (PID: 8480)
      • explorer.exe (PID: 4772)
    • PURELOGS has been found (auto)

      • main.exe (PID: 3788)
    • FORMBOOK has been detected

      • cmmon32.exe (PID: 10680)
      • explorer.exe (PID: 4772)
    • REDLINE has been detected (SURICATA)

      • cc.exe (PID: 11080)
    • METASTEALER has been detected (SURICATA)

      • cc.exe (PID: 11080)
    • DCRAT has been found (auto)

      • main.exe (PID: 3788)
      • main.exe (PID: 3788)
    • ASYNCRAT has been found (auto)

      • main.exe (PID: 3788)
    • COINMINER has been found (auto)

      • main.exe (PID: 3788)
      • varen.exe (PID: 9920)
    • NJRAT mutex has been found

      • Bloxflip%20Predictor.exe (PID: 12624)
    • SNAKEKEYLOGGER has been detected (SURICATA)

      • mexx.exe (PID: 7692)
      • RegSvcs.exe (PID: 1164)
    • MODILOADER mutex has been found

      • AdobeART.exe (PID: 17828)
      • AdobeART.exe (PID: 7620)
    • NESHTA mutex has been found

      • Setup.exe (PID: 10988)
      • Setup.exe (PID: 10952)
      • svchost.com (PID: 18808)
      • quasarat.exe (PID: 10420)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2200)
      • MSBuild.exe (PID: 16660)
    • Adds path to the Windows Defender exclusion list

      • Crypt.exe (PID: 8480)
      • ap.exe (PID: 9344)
    • DIAMOTRIX has been detected (SURICATA)

      • explorer.exe (PID: 4772)
    • Changes Windows Defender settings

      • Crypt.exe (PID: 8480)
    • Steals credentials from Web Browsers

      • mexx.exe (PID: 7692)
      • cc.exe (PID: 11080)
      • Jay.exe (PID: 13408)
      • F.exe (PID: 12576)
      • RegSvcs.exe (PID: 1164)
    • Actions looks like stealing of personal data

      • mexx.exe (PID: 7692)
      • cc.exe (PID: 11080)
      • Jay.exe (PID: 13408)
      • F.exe (PID: 12576)
      • aspnet_compiler.exe (PID: 14796)
      • RegSvcs.exe (PID: 1164)
      • Vb5HUIU.exe (PID: 7612)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 6380)
      • powershell.exe (PID: 7908)
    • AUROTUN mutex has been found

      • Crypt.exe (PID: 8480)
    • QUASAR mutex has been found

      • Client-built.exe (PID: 13256)
      • quasarat.exe (PID: 14276)
    • Uses AES cipher (POWERSHELL)

      • powershell.exe (PID: 6304)
      • powershell.exe (PID: 10976)
      • powershell.exe (PID: 12760)
      • powershell.exe (PID: 14004)
    • Dynamically loads an assembly (POWERSHELL)

      • powershell.exe (PID: 10724)
      • powershell.exe (PID: 14004)
    • Uses Task Scheduler to autorun other applications

      • quasarat.exe (PID: 14276)
    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 9952)
      • powershell.exe (PID: 12928)
      • powershell.exe (PID: 8632)
      • powershell.exe (PID: 3620)
      • powershell.exe (PID: 7836)
      • powershell.exe (PID: 13608)
      • powershell.exe (PID: 8380)
      • powershell.exe (PID: 8544)
      • powershell.exe (PID: 8308)
      • powershell.exe (PID: 8320)
      • powershell.exe (PID: 8488)
      • powershell.exe (PID: 8552)
      • powershell.exe (PID: 8516)
      • powershell.exe (PID: 13536)
    • LUMMA mutex has been found

      • MSBuild.exe (PID: 12004)
      • MSBuild.exe (PID: 16660)
    • AMADEY has been detected (SURICATA)

      • gaved.exe (PID: 10776)
      • dumer.exe (PID: 13432)
      • varen.exe (PID: 9920)
    • KOI has been detected (SURICATA)

      • powershell.exe (PID: 12928)
    • Execute application with conhost.exe as parent process

      • powershell.exe (PID: 7908)
    • WannaCry Ransomware is detected

      • WannaCry.exe (PID: 14292)
    • NjRAT is detected

      • server.exe (PID: 11192)
    • QUASAR has been detected (SURICATA)

      • Client-built.exe (PID: 13256)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 7836)
      • powershell.exe (PID: 8380)
      • powershell.exe (PID: 8516)
      • powershell.exe (PID: 8320)
      • powershell.exe (PID: 3620)
      • powershell.exe (PID: 8308)
      • powershell.exe (PID: 8552)
      • powershell.exe (PID: 8544)
      • powershell.exe (PID: 13608)
      • powershell.exe (PID: 8488)
      • powershell.exe (PID: 8632)
      • powershell.exe (PID: 14228)
      • powershell.exe (PID: 14144)
    • AGENTTESLA has been detected (SURICATA)

      • Jay.exe (PID: 13408)
      • F.exe (PID: 12576)
    • Writes a file to the Word startup folder

      • WannaCry.exe (PID: 14292)
    • RANSOMWARE has been detected

      • WannaCry.exe (PID: 14292)
    • Modifies files in the Chrome extension folder

      • WannaCry.exe (PID: 14292)
    • FORMBOOK has been detected (SURICATA)

      • explorer.exe (PID: 4772)
    • Uses Task Scheduler to run other applications

      • powershell.exe (PID: 14228)
  • SUSPICIOUS

    • Loads Python modules

      • main.exe (PID: 3788)
    • Executable content was dropped or overwritten

      • main.exe (PID: 2076)
      • main.exe (PID: 3788)
      • 1.exe (PID: 7600)
      • e.exe (PID: 7752)
      • syspool.exe (PID: 9924)
      • test1.exe (PID: 9988)
      • lol.exe (PID: 10664)
      • Ganja90.exe (PID: 11184)
      • Ganja180.exe (PID: 10744)
      • explorer.exe (PID: 11328)
      • Setup.exe (PID: 10952)
      • Ganja39.exe (PID: 11160)
      • Setup.exe (PID: 10988)
      • Ganja199.exe (PID: 11916)
      • Ganja195.exe (PID: 10916)
      • Prolin.exe (PID: 10876)
      • loader.exe (PID: 14104)
      • WannaCry.exe (PID: 14292)
      • kajmak.exe (PID: 14064)
      • porn.exe (PID: 10788)
      • CryptoLocker.exe (PID: 14088)
      • swagggg.exe (PID: 7192)
      • donie30.exe (PID: 7544)
      • bot.exe (PID: 2216)
      • your_app.exe (PID: 11208)
      • Axam.a.exe (PID: 13528)
      • bravo29.exe (PID: 8292)
      • G7_Update.exe (PID: 14300)
      • 123.exe (PID: 14096)
      • Amus.exe (PID: 13568)
      • Bloxflip%20Predictor.exe (PID: 12624)
      • 4De3.exe (PID: 17212)
      • Crypt.exe (PID: 8480)
      • amnew.exe (PID: 14136)
      • Ganja128.exe (PID: 10760)
      • powershell.exe (PID: 6304)
      • Vb5HUIU.exe (PID: 7612)
      • powershell.exe (PID: 10976)
      • powershell.exe (PID: 12760)
      • csc.exe (PID: 10632)
      • csc.exe (PID: 10508)
      • varen.exe (PID: 9920)
      • dumer.exe (PID: 13432)
      • ap.exe (PID: 9344)
      • csc.exe (PID: 16960)
      • svchost.com (PID: 18808)
      • powershell.exe (PID: 7836)
      • powershell.exe (PID: 8516)
      • powershell.exe (PID: 8552)
      • powershell.exe (PID: 3620)
      • powershell.exe (PID: 8380)
      • powershell.exe (PID: 8320)
      • powershell.exe (PID: 8308)
      • powershell.exe (PID: 8488)
      • powershell.exe (PID: 8632)
      • powershell.exe (PID: 13608)
      • powershell.exe (PID: 8544)
      • quasarat.exe (PID: 10420)
      • csc.exe (PID: 6152)
      • powershell.exe (PID: 14228)
      • csc.exe (PID: 9784)
    • Process drops python dynamic module

      • main.exe (PID: 2076)
    • Process drops legitimate windows executable

      • main.exe (PID: 2076)
      • main.exe (PID: 3788)
      • WannaCry.exe (PID: 14292)
      • varen.exe (PID: 9920)
      • powershell.exe (PID: 8516)
      • powershell.exe (PID: 8320)
      • powershell.exe (PID: 8380)
      • powershell.exe (PID: 7836)
      • powershell.exe (PID: 8552)
      • powershell.exe (PID: 3620)
      • powershell.exe (PID: 8488)
      • powershell.exe (PID: 13608)
      • powershell.exe (PID: 8308)
      • powershell.exe (PID: 8544)
      • powershell.exe (PID: 8632)
    • Application launched itself

      • main.exe (PID: 2076)
      • 90.exe (PID: 10888)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 14604)
      • AdobeART.exe (PID: 17596)
      • powershell.exe (PID: 8424)
      • AdobeART.exe (PID: 19332)
    • Starts CMD.EXE for commands execution

      • main.exe (PID: 3788)
      • Bugsoft.exe (PID: 13584)
      • WannaCry.exe (PID: 14292)
      • winxclient.exe (PID: 12508)
      • esp.exe (PID: 14192)
      • cmmon32.exe (PID: 10680)
      • G7_Update.exe (PID: 14300)
      • quasarat.exe (PID: 14276)
      • pe2shc.exe (PID: 13576)
    • Reads security settings of Internet Explorer

      • sFFG7Wg.exe (PID: 2388)
      • build.exe (PID: 5348)
      • TempSpoofer.exe (PID: 7224)
      • Helper.exe (PID: 7176)
      • Monotone.exe (PID: 7208)
      • Monotone.exe (PID: 2708)
      • TempSpoofer.exe (PID: 7496)
      • TempSpoofer.exe (PID: 7232)
      • Monotone.exe (PID: 7184)
      • TempSpoofer.exe (PID: 7296)
      • TempSpoofer.exe (PID: 7396)
      • TempSpoofer.exe (PID: 7664)
      • TempSpoofer.exe (PID: 7636)
      • game3.exe (PID: 7588)
      • TempSpoofer.exe (PID: 7648)
      • UniversalSpoofer.exe (PID: 8620)
      • e.exe (PID: 7752)
      • test1.exe (PID: 9988)
      • LOIC.exe (PID: 9864)
      • Amus.exe (PID: 13568)
      • donie30.exe (PID: 7544)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 14604)
      • cabal.exe (PID: 14200)
      • lol.exe (PID: 10664)
      • bravo29.exe (PID: 8292)
      • Setup.exe (PID: 10988)
      • 90.exe (PID: 12400)
      • Setup.exe (PID: 10952)
      • Bloxflip%20Predictor.exe (PID: 12624)
      • L2.exe (PID: 14152)
      • your_app.exe (PID: 11208)
      • G7_Update.exe (PID: 14300)
      • 123.exe (PID: 14096)
      • amnew.exe (PID: 14136)
      • 4De3.exe (PID: 17212)
      • ap.exe (PID: 9344)
      • Ganja128.exe (PID: 10760)
      • Vb5HUIU.exe (PID: 7612)
      • quasarat.exe (PID: 14276)
      • varen.exe (PID: 9920)
      • gaved.exe (PID: 10776)
      • dumer.exe (PID: 13432)
      • !WannaDecryptor!.exe (PID: 7000)
      • quasarat.exe (PID: 10420)
      • ShellExperienceHost.exe (PID: 15736)
    • The process drops C-runtime libraries

      • main.exe (PID: 2076)
      • main.exe (PID: 3788)
    • Executing commands from a ".bat" file

      • main.exe (PID: 3788)
      • Bugsoft.exe (PID: 13584)
      • WannaCry.exe (PID: 14292)
      • G7_Update.exe (PID: 14300)
      • quasarat.exe (PID: 14276)
    • The process checks if it is being run in the virtual environment

      • main.exe (PID: 3788)
      • Vb5HUIU.exe (PID: 7612)
    • Suspicious files were dropped or overwritten

      • main.exe (PID: 3788)
    • Starts POWERSHELL.EXE for commands execution

      • main.exe (PID: 3788)
      • cmd.exe (PID: 5352)
      • Crypt.exe (PID: 8480)
      • powershell.exe (PID: 8424)
      • TempSpoofer.exe (PID: 7648)
      • TempSpoofer.exe (PID: 7496)
      • UniversalSpoofer.exe (PID: 8620)
      • Monotone.exe (PID: 2708)
      • Monotone.exe (PID: 7208)
      • TempSpoofer.exe (PID: 7636)
      • TempSpoofer.exe (PID: 7232)
      • TempSpoofer.exe (PID: 7664)
      • TempSpoofer.exe (PID: 7396)
      • TempSpoofer.exe (PID: 7296)
      • Monotone.exe (PID: 7184)
      • TempSpoofer.exe (PID: 7224)
      • conhost.exe (PID: 15488)
    • Connects to the server without a host name

      • main.exe (PID: 3788)
      • syspool.exe (PID: 9924)
      • VXHDH.exe (PID: 4044)
      • cabal.exe (PID: 14200)
      • trip.exe (PID: 11032)
      • explorer.exe (PID: 4772)
      • powershell.exe (PID: 9952)
      • varen.exe (PID: 9920)
      • gaved.exe (PID: 10776)
      • dumer.exe (PID: 13432)
      • powershell.exe (PID: 12928)
      • powershell.exe (PID: 14228)
      • esp32.exe (PID: 13552)
    • Executing commands from ".cmd" file

      • main.exe (PID: 3788)
    • The process executes Powershell scripts

      • main.exe (PID: 3788)
      • cmd.exe (PID: 5352)
    • Process requests binary or script from the Internet

      • main.exe (PID: 3788)
      • dumer.exe (PID: 13432)
      • varen.exe (PID: 9920)
      • powershell.exe (PID: 14228)
    • Potential Corporate Privacy Violation

      • main.exe (PID: 3788)
      • dumer.exe (PID: 13432)
      • varen.exe (PID: 9920)
      • powershell.exe (PID: 14228)
    • Connects to unusual port

      • main.exe (PID: 3788)
      • K.exe (PID: 7704)
      • tcp_windows_amd64.exe (PID: 9440)
      • Worldofficee.exe (PID: 8132)
      • Worldoffice.exe (PID: 10960)
      • winxclient.exe (PID: 12508)
      • winsvchost.exe (PID: 14048)
      • my%20file.exe (PID: 7564)
      • XClient.exe (PID: 8568)
      • trails.exe (PID: 7796)
      • remcos.exe (PID: 13016)
      • https.exe (PID: 11124)
      • esp.exe (PID: 14192)
      • march.exe (PID: 11052)
      • demon.exe (PID: 11072)
      • Adobe.exe (PID: 11696)
      • cc.exe (PID: 11080)
      • startud.exe (PID: 9168)
      • Clien123.exe (PID: 14252)
      • foncar.exe (PID: 14216)
      • svchost.exe (PID: 13124)
      • c2_payload_aes.exe (PID: 13196)
      • esp32.exe (PID: 13552)
      • AdobeART.exe (PID: 17828)
      • Crypt.exe (PID: 8480)
      • Client-built.exe (PID: 13256)
      • build.exe (PID: 5348)
      • Jay.exe (PID: 13408)
      • F.exe (PID: 12576)
      • svchost.exe (PID: 13844)
      • installs.exe (PID: 8560)
      • aspnet_compiler.exe (PID: 14796)
    • Reads the date of Windows installation

      • 1.exe (PID: 7600)
      • 123.exe (PID: 14096)
      • Ganja128.exe (PID: 10760)
      • Helper.exe (PID: 7176)
    • The process creates files with name similar to system file names

      • main.exe (PID: 3788)
      • kajmak.exe (PID: 14064)
      • loader.exe (PID: 14104)
      • 4De3.exe (PID: 17212)
      • WerFault.exe (PID: 15416)
      • WannaCry.exe (PID: 14292)
    • Working with threads in the GNU C Compiler (GCC) libraries related mutex has been found

      • porn.exe (PID: 10788)
    • Contacting a server suspected of hosting an Exploit Kit

      • main.exe (PID: 3788)
    • Contacting a server suspected of hosting an CnC

      • K.exe (PID: 7704)
      • remcos.exe (PID: 13016)
      • trails.exe (PID: 7796)
      • foncar.exe (PID: 14216)
      • svchost.exe (PID: 2200)
      • MSBuild.exe (PID: 16660)
      • gaved.exe (PID: 10776)
      • dumer.exe (PID: 13432)
      • varen.exe (PID: 9920)
      • Client-built.exe (PID: 13256)
      • aspnet_compiler.exe (PID: 14796)
      • explorer.exe (PID: 4772)
    • Starts itself from another location

      • Ganja180.exe (PID: 10744)
      • Ganja90.exe (PID: 11184)
      • Ganja39.exe (PID: 11160)
      • Ganja199.exe (PID: 11916)
      • Ganja195.exe (PID: 10916)
      • kajmak.exe (PID: 14064)
      • CryptoLocker.exe (PID: 14088)
      • test1.exe (PID: 9988)
      • e.exe (PID: 7752)
      • donie30.exe (PID: 7544)
      • 90.exe (PID: 12400)
    • Creates file in the systems drive root

      • Prolin.exe (PID: 10876)
      • Axam.a.exe (PID: 13528)
      • Amus.exe (PID: 13568)
      • 4De3.exe (PID: 17212)
      • Setup.exe (PID: 10988)
      • Setup.exe (PID: 10952)
      • Axam.exe (PID: 19048)
      • Axam.exe (PID: 10744)
      • Axam.exe (PID: 8008)
      • Axam.exe (PID: 8088)
      • Axam.exe (PID: 8496)
      • Axam.exe (PID: 7968)
      • Axam.exe (PID: 8580)
      • Axam.exe (PID: 9004)
      • Axam.exe (PID: 8952)
      • attrib.exe (PID: 9376)
      • Axam.exe (PID: 10600)
      • cmd.exe (PID: 12880)
      • Axam.exe (PID: 10612)
      • explorer.exe (PID: 4772)
      • svchost.com (PID: 18808)
      • Axam.exe (PID: 3756)
      • attrib.exe (PID: 16512)
      • Axam.exe (PID: 5416)
      • Axam.exe (PID: 17348)
      • Axam.exe (PID: 14828)
      • Axam.exe (PID: 17272)
      • Axam.exe (PID: 5424)
      • Axam.exe (PID: 14984)
      • Axam.exe (PID: 16908)
      • Axam.exe (PID: 12044)
      • Axam.exe (PID: 16892)
      • Axam.exe (PID: 13668)
      • Axam.exe (PID: 13464)
      • Axam.exe (PID: 17740)
      • Axam.exe (PID: 3724)
      • Axam.exe (PID: 18076)
      • Axam.exe (PID: 13164)
      • Axam.exe (PID: 15024)
      • Axam.exe (PID: 9240)
      • Axam.exe (PID: 12500)
      • Axam.exe (PID: 4560)
      • Axam.exe (PID: 9868)
      • Axam.exe (PID: 16444)
      • Axam.exe (PID: 4820)
      • Axam.exe (PID: 1520)
      • Axam.exe (PID: 18880)
      • Axam.exe (PID: 10584)
      • Axam.exe (PID: 7320)
      • Axam.exe (PID: 11628)
      • Axam.exe (PID: 17896)
      • Axam.exe (PID: 17512)
      • Axam.exe (PID: 4120)
      • Axam.exe (PID: 18264)
      • Axam.exe (PID: 18988)
      • Axam.exe (PID: 12124)
      • Axam.exe (PID: 17984)
      • Axam.exe (PID: 1068)
      • Axam.exe (PID: 16408)
      • Axam.exe (PID: 17472)
      • WannaCry.exe (PID: 14292)
      • Axam.exe (PID: 7868)
      • Axam.exe (PID: 6388)
      • Axam.exe (PID: 8888)
    • Crypto Currency Mining Activity Detected

      • main.exe (PID: 3788)
      • powershell.exe (PID: 14228)
    • Starts a Microsoft application from unusual location

      • WannaCry.exe (PID: 14292)
      • cron123123213.exe (PID: 13316)
      • !WannaDecryptor!.exe (PID: 7000)
    • Possible Social Engineering Attempted

      • svchost.exe (PID: 2200)
    • Block-list domains

      • main.exe (PID: 3788)
    • Executes application which crashes

      • PluGman23333%20233.exe (PID: 7628)
      • kj.exe (PID: 6836)
      • cabal.exe (PID: 14200)
      • powershell.exe (PID: 14268)
    • Checks for external IP

      • svchost.exe (PID: 2200)
      • mexx.exe (PID: 7692)
      • Vb5HUIU.exe (PID: 7612)
      • svchost.exe (PID: 13844)
      • Client-built.exe (PID: 13256)
      • quasarat.exe (PID: 14276)
      • Crypt.exe (PID: 8480)
      • Jay.exe (PID: 13408)
      • F.exe (PID: 12576)
      • build.exe (PID: 5348)
      • installs.exe (PID: 8560)
      • RegSvcs.exe (PID: 1164)
      • powershell.exe (PID: 10724)
    • Mutex name with non-standard characters

      • Setup.exe (PID: 10988)
      • Setup.exe (PID: 10952)
      • svchost.com (PID: 18808)
      • quasarat.exe (PID: 10420)
    • Script adds exclusion path to Windows Defender

      • Crypt.exe (PID: 8480)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • mexx.exe (PID: 7692)
      • build.exe (PID: 5348)
      • RegSvcs.exe (PID: 1164)
    • The process verifies whether the antivirus software is installed

      • cmd.exe (PID: 10012)
      • mexx.exe (PID: 7692)
      • RegSvcs.exe (PID: 1164)
      • Vb5HUIU.exe (PID: 7612)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 6304)
      • Helper.exe (PID: 7176)
      • powershell.exe (PID: 9188)
      • powershell.exe (PID: 10976)
      • powershell.exe (PID: 12760)
      • powershell.exe (PID: 10724)
      • powershell.exe (PID: 14004)
    • Uses ATTRIB.EXE to modify file attributes

      • Bloxflip%20Predictor.exe (PID: 12624)
      • cmd.exe (PID: 12880)
    • Starts application with an unusual extension

      • your_app.exe (PID: 11208)
      • cmd.exe (PID: 11344)
    • The process executes VB scripts

      • cmd.exe (PID: 12144)
    • Executes script without checking the security policy

      • powershell.exe (PID: 6380)
    • Potential TCP-based PowerShell reverse shell connection

      • powershell.exe (PID: 8424)
    • The process bypasses the loading of PowerShell profile settings

      • powershell.exe (PID: 8424)
    • Possibly malicious use of IEX has been detected

      • powershell.exe (PID: 8424)
    • Found IP address in command line

      • powershell.exe (PID: 6380)
    • The process hide an interactive prompt from the user

      • powershell.exe (PID: 8424)
    • Uses sleep to delay execution (POWERSHELL)

      • Helper.exe (PID: 7176)
    • Starts a new process with hidden mode (POWERSHELL)

      • Helper.exe (PID: 7176)
    • Base64-obfuscated command line is found

      • UniversalSpoofer.exe (PID: 8620)
      • TempSpoofer.exe (PID: 7648)
      • TempSpoofer.exe (PID: 7496)
      • Monotone.exe (PID: 2708)
      • Monotone.exe (PID: 7208)
      • TempSpoofer.exe (PID: 7636)
      • TempSpoofer.exe (PID: 7396)
      • TempSpoofer.exe (PID: 7232)
      • TempSpoofer.exe (PID: 7664)
      • TempSpoofer.exe (PID: 7296)
      • Monotone.exe (PID: 7184)
      • TempSpoofer.exe (PID: 7224)
    • BASE64 encoded PowerShell command has been detected

      • UniversalSpoofer.exe (PID: 8620)
      • TempSpoofer.exe (PID: 7648)
      • TempSpoofer.exe (PID: 7496)
      • Monotone.exe (PID: 2708)
      • Monotone.exe (PID: 7208)
      • TempSpoofer.exe (PID: 7636)
      • TempSpoofer.exe (PID: 7396)
      • TempSpoofer.exe (PID: 7664)
      • TempSpoofer.exe (PID: 7232)
      • TempSpoofer.exe (PID: 7296)
      • Monotone.exe (PID: 7184)
      • TempSpoofer.exe (PID: 7224)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 10724)
    • Checks a user's role membership (POWERSHELL)

      • Helper.exe (PID: 7176)
      • powershell.exe (PID: 10724)
    • Gets path to any of the special folders (POWERSHELL)

      • powershell.exe (PID: 14080)
    • Creates new GUID (POWERSHELL)

      • powershell.exe (PID: 14080)
      • powershell.exe (PID: 10724)
    • Writes data into a file (POWERSHELL)

      • powershell.exe (PID: 6304)
      • powershell.exe (PID: 10976)
      • powershell.exe (PID: 12760)
    • Changes AMSI initialization state that disables detection systems (POWERSHELL)

      • powershell.exe (PID: 10724)
    • The process executes via Task Scheduler

      • gaved.exe (PID: 10776)
      • varen.exe (PID: 9920)
      • dumer.exe (PID: 13432)
    • Adds/modifies Windows certificates

      • certutil.exe (PID: 5368)
    • Uses WMIC.EXE to obtain computer system information

      • trails.exe (PID: 7796)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 10632)
      • csc.exe (PID: 10508)
      • csc.exe (PID: 16960)
      • csc.exe (PID: 6152)
      • csc.exe (PID: 9784)
    • Searches for installed software

      • MSBuild.exe (PID: 12004)
      • MSBuild.exe (PID: 16660)
      • Vb5HUIU.exe (PID: 7612)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • server.exe (PID: 11192)
    • Process uses IPCONFIG to clear DNS cache

      • Vb5HUIU.exe (PID: 7612)
      • Helper.exe (PID: 7176)
    • Modifies hosts file to alter network resolution

      • Vb5HUIU.exe (PID: 7612)
    • Uses TASKKILL.EXE to kill process

      • WannaCry.exe (PID: 14292)
      • cmd.exe (PID: 11156)
    • Gets file extension (POWERSHELL)

      • powershell.exe (PID: 14080)
    • Accesses domain name via WMI (SCRIPT)

      • WMIC.exe (PID: 13744)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 11344)
    • Connects to FTP

      • F.exe (PID: 12576)
      • Jay.exe (PID: 13408)
    • Deletes system .NET executable

      • Client-built.exe (PID: 13256)
    • Reverses array data (POWERSHELL)

      • powershell.exe (PID: 14004)
    • Executes as Windows Service

      • WmiApSrv.exe (PID: 14668)
    • Converts a string into array of characters (POWERSHELL)

      • powershell.exe (PID: 14004)
    • Loads DLL from Mozilla Firefox

      • Vb5HUIU.exe (PID: 7612)
    • Process copies executable file

      • powershell.exe (PID: 14228)
  • INFO

    • Create files in a temporary directory

      • main.exe (PID: 2076)
      • build.exe (PID: 5348)
      • catqw.exe (PID: 7216)
      • TempSpoofer.exe (PID: 7224)
      • Monotone.exe (PID: 7208)
      • Helper.exe (PID: 7176)
      • TempSpoofer.exe (PID: 7496)
      • Monotone.exe (PID: 2708)
      • TempSpoofer.exe (PID: 7296)
      • TempSpoofer.exe (PID: 7396)
      • TempSpoofer.exe (PID: 7232)
      • Monotone.exe (PID: 7184)
      • kj.exe (PID: 6836)
      • TempSpoofer.exe (PID: 7664)
      • TempSpoofer.exe (PID: 7636)
      • TempSpoofer.exe (PID: 7648)
      • UniversalSpoofer.exe (PID: 8620)
      • Setup.exe (PID: 10988)
      • Setup.exe (PID: 10952)
      • Prolin.exe (PID: 10876)
      • Amus.exe (PID: 13568)
      • Bugsoft.exe (PID: 13584)
      • Axam.a.exe (PID: 13528)
      • PluGman23333%20233.exe (PID: 7628)
      • donie30.exe (PID: 7544)
      • msconfig.exe (PID: 12024)
      • your_app.exe (PID: 11208)
      • bravo29.exe (PID: 8292)
      • cabal.exe (PID: 14200)
      • 4De3.exe (PID: 17212)
      • Axam.exe (PID: 19048)
      • amnew.exe (PID: 14136)
      • Axam.exe (PID: 10744)
      • Axam.exe (PID: 8496)
      • Axam.exe (PID: 8008)
      • Axam.exe (PID: 8088)
      • Axam.exe (PID: 7968)
      • ap.exe (PID: 9344)
      • Axam.exe (PID: 9004)
      • Axam.exe (PID: 8580)
      • Axam.exe (PID: 8952)
      • Vb5HUIU.exe (PID: 7612)
      • Axam.exe (PID: 10600)
      • quasarat.exe (PID: 14276)
      • Axam.exe (PID: 10612)
      • csc.exe (PID: 10632)
      • cvtres.exe (PID: 16968)
      • csc.exe (PID: 10508)
      • Axam.exe (PID: 3756)
      • cvtres.exe (PID: 12824)
      • dumer.exe (PID: 13432)
      • varen.exe (PID: 9920)
      • Axam.exe (PID: 17348)
      • Axam.exe (PID: 5416)
      • Axam.exe (PID: 17272)
      • Axam.exe (PID: 14828)
      • Axam.exe (PID: 16892)
      • Axam.exe (PID: 14984)
      • Axam.exe (PID: 5424)
      • Axam.exe (PID: 16908)
      • Axam.exe (PID: 13464)
      • Axam.exe (PID: 3724)
      • Axam.exe (PID: 13668)
      • Axam.exe (PID: 12044)
      • Axam.exe (PID: 17740)
      • Axam.exe (PID: 18076)
      • cvtres.exe (PID: 8084)
      • Axam.exe (PID: 13164)
      • Axam.exe (PID: 12500)
      • csc.exe (PID: 16960)
      • Axam.exe (PID: 15024)
      • Axam.exe (PID: 9240)
      • Axam.exe (PID: 4560)
      • WannaCry.exe (PID: 14292)
      • Axam.exe (PID: 17512)
      • Axam.exe (PID: 16444)
      • Axam.exe (PID: 4820)
      • Axam.exe (PID: 18880)
      • Axam.exe (PID: 9868)
      • Axam.exe (PID: 10584)
      • Axam.exe (PID: 1520)
      • Axam.exe (PID: 7320)
      • Axam.exe (PID: 17896)
      • Axam.exe (PID: 11628)
      • Axam.exe (PID: 18988)
      • Axam.exe (PID: 4120)
      • Axam.exe (PID: 12124)
      • Axam.exe (PID: 18264)
      • Axam.exe (PID: 16408)
      • quasarat.exe (PID: 10420)
      • Axam.exe (PID: 1068)
      • Axam.exe (PID: 17984)
      • Axam.exe (PID: 17472)
      • Axam.exe (PID: 11092)
      • Axam.exe (PID: 12720)
      • Axam.exe (PID: 16064)
      • Axam.exe (PID: 7868)
    • Reads the computer name

      • main.exe (PID: 2076)
      • main.exe (PID: 3788)
      • sFFG7Wg.exe (PID: 2388)
      • build.exe (PID: 5348)
      • swagggg.exe (PID: 7192)
      • Helper.exe (PID: 7176)
      • TempSpoofer.exe (PID: 7224)
      • Monotone.exe (PID: 7208)
      • TempSpoofer.exe (PID: 7232)
      • TempSpoofer.exe (PID: 7296)
      • VXHDH.exe (PID: 4044)
      • TempSpoofer.exe (PID: 7396)
      • Monotone.exe (PID: 7184)
      • Monotone.exe (PID: 2708)
      • TempSpoofer.exe (PID: 7496)
      • 1.exe (PID: 7600)
      • Vb5HUIU.exe (PID: 7612)
      • donie30.exe (PID: 7544)
      • TempSpoofer.exe (PID: 7664)
      • TempSpoofer.exe (PID: 7648)
      • trails.exe (PID: 7796)
      • installs.exe (PID: 8560)
      • bravo29.exe (PID: 8292)
      • tcp_windows_amd64.exe (PID: 9440)
      • K.exe (PID: 7704)
      • TempSpoofer.exe (PID: 7636)
      • Crypt.exe (PID: 8480)
      • e.exe (PID: 7752)
      • UniversalSpoofer.exe (PID: 8620)
      • XClient.exe (PID: 8568)
      • startud.exe (PID: 9168)
      • game3.exe (PID: 7588)
      • T.exe (PID: 8248)
      • LOIC.exe (PID: 9864)
      • syspool.exe (PID: 9924)
      • mexx.exe (PID: 7692)
      • demonx64.exe (PID: 11140)
      • demon.exe (PID: 11072)
      • march.exe (PID: 11052)
      • porn.exe (PID: 10788)
      • Ganja39.exe (PID: 11160)
      • ap.exe (PID: 9344)
      • 90.exe (PID: 10888)
      • test1.exe (PID: 9988)
      • Ganja90.exe (PID: 11184)
      • Ganja195.exe (PID: 10916)
      • Ganja199.exe (PID: 11916)
      • https.exe (PID: 11124)
      • baboon.exe (PID: 11112)
      • ls.exe (PID: 3844)
      • trip.exe (PID: 11032)
      • klass.exe (PID: 12148)
      • WxWorkMultiOpen.exe (PID: 10008)
      • WxWorkMultiOpen.exe (PID: 9936)
      • Prolin.exe (PID: 10876)
      • Ganja128.exe (PID: 10760)
      • cc.exe (PID: 11080)
      • WxWorkMultiOpen.exe (PID: 9900)
      • ls.exe (PID: 12592)
      • klass.exe (PID: 12528)
      • msconfig.exe (PID: 12024)
      • WxWorkMultiOpen.exe (PID: 9964)
      • WxWorkMultiOpen.exe (PID: 10340)
      • WxWorkMultiOpen.exe (PID: 9880)
      • WxWorkMultiOpen.exe (PID: 10020)
      • WxWorkMultiOpen.exe (PID: 9892)
      • Setup.exe (PID: 10988)
      • Ganja165.exe (PID: 12676)
      • lol.exe (PID: 10664)
      • Ganja99.exe (PID: 12688)
      • WxWorkMultiOpen.exe (PID: 10308)
      • WxWorkMultiOpen.exe (PID: 10680)
      • WxWorkMultiOpen.exe (PID: 10032)
      • svchost.exe (PID: 13124)
      • Ganja35.exe (PID: 13156)
      • WxWorkMultiOpen.exe (PID: 9912)
      • WxWorkMultiOpen.exe (PID: 10672)
      • WxWorkMultiOpen.exe (PID: 9996)
      • ganja5.exe (PID: 10712)
      • Ganja174.exe (PID: 13248)
      • WxWorkMultiOpen.exe (PID: 9976)
      • WxWorkMultiOpen.exe (PID: 10688)
      • WxWorkMultiOpen.exe (PID: 10056)
      • WxWorkMultiOpen.exe (PID: 10656)
      • WxWorkMultiOpen.exe (PID: 10048)
      • Ganja190.exe (PID: 13176)
      • Client-built.exe (PID: 13256)
      • Ganja20.exe (PID: 13264)
      • Doppelganger.exe (PID: 10924)
      • my%20file.exe (PID: 7564)
      • Ganja36.exe (PID: 14208)
      • 2.exe (PID: 14284)
      • Ganja45.exe (PID: 12352)
      • WxWorkMultiOpen.exe (PID: 10696)
      • kajmak.exe (PID: 14064)
      • Ganja176.exe (PID: 14056)
      • javaw.exe (PID: 13100)
      • Ganja3.exe (PID: 14072)
      • Ganja153.exe (PID: 14112)
      • Ganja49.exe (PID: 14260)
      • Ganja85.exe (PID: 14176)
      • Ganja13.exe (PID: 11252)
      • quasarat.exe (PID: 14276)
      • Ganja66.exe (PID: 14168)
      • amnew.exe (PID: 14136)
      • Ganja172.exe (PID: 11436)
      • Bloxflip%20Predictor.exe (PID: 12624)
      • DumpAADUserPRT.exe (PID: 10704)
      • cabal.exe (PID: 14200)
      • foncar.exe (PID: 14216)
      • Whisker.exe (PID: 10996)
      • CryptoLocker.exe (PID: 14088)
      • Bugsoft.exe (PID: 13584)
      • F.exe (PID: 12576)
      • Clien123.exe (PID: 14252)
      • WannaCry.exe (PID: 14292)
      • Setup.exe (PID: 10952)
      • Ganja151.exe (PID: 13544)
      • Amus.exe (PID: 13568)
      • winsvchost.exe (PID: 14048)
      • Ganja61.exe (PID: 14120)
      • nbin22.exe (PID: 14128)
      • Jay.exe (PID: 13408)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 14604)
      • MSBuild.exe (PID: 12004)
      • 90.exe (PID: 12400)
      • Adobe.exe (PID: 11696)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 15216)
      • crimkm.exe (PID: 7200)
      • 123.exe (PID: 14096)
      • remcos.exe (PID: 13016)
      • bot.exe (PID: 2216)
      • your_app.exe (PID: 11208)
      • c2_payload_aes.exe (PID: 13196)
      • Axam.a.exe (PID: 13528)
      • MSBuild.exe (PID: 6256)
      • G7_Update.exe (PID: 14300)
      • Anap.a.exe (PID: 9272)
      • RegAsm.exe (PID: 16616)
      • MSBuild.exe (PID: 16660)
      • 4De3.exe (PID: 17212)
      • AdobeART.exe (PID: 17596)
      • AdobeART.exe (PID: 17828)
      • AdobeART.exe (PID: 19332)
      • Axam.exe (PID: 19048)
      • Axam.exe (PID: 10744)
      • Axam.exe (PID: 8008)
      • Axam.exe (PID: 8088)
      • Axam.exe (PID: 8496)
      • Axam.exe (PID: 7968)
      • varen.exe (PID: 9920)
      • gaved.exe (PID: 10776)
      • Axam.exe (PID: 8580)
      • dumer.exe (PID: 13432)
      • Axam.exe (PID: 9004)
      • Axam.exe (PID: 8952)
      • Axam.exe (PID: 10600)
      • Axam.exe (PID: 10612)
      • Axam.exe (PID: 3756)
      • !WannaDecryptor!.exe (PID: 7000)
      • server.exe (PID: 11192)
      • Axam.exe (PID: 17348)
      • Axam.exe (PID: 17272)
      • Axam.exe (PID: 5416)
      • Axam.exe (PID: 14828)
      • Axam.exe (PID: 5424)
      • Axam.exe (PID: 14984)
      • Axam.exe (PID: 12044)
      • Axam.exe (PID: 16908)
      • Axam.exe (PID: 16892)
      • Axam.exe (PID: 13668)
      • Axam.exe (PID: 13464)
      • Axam.exe (PID: 17740)
      • Axam.exe (PID: 3724)
      • Axam.exe (PID: 18076)
      • Axam.exe (PID: 13164)
      • Axam.exe (PID: 12500)
      • Axam.exe (PID: 15024)
      • Axam.exe (PID: 9240)
      • aspnet_compiler.exe (PID: 14796)
      • RegSvcs.exe (PID: 1164)
      • Axam.exe (PID: 16444)
      • Axam.exe (PID: 10584)
      • Axam.exe (PID: 17512)
      • Axam.exe (PID: 18880)
      • Axam.exe (PID: 17896)
      • Axam.exe (PID: 9868)
      • Axam.exe (PID: 4560)
      • Axam.exe (PID: 4820)
      • Axam.exe (PID: 11628)
      • Axam.exe (PID: 1520)
      • Axam.exe (PID: 7320)
      • Axam.exe (PID: 18988)
      • Axam.exe (PID: 4120)
      • Axam.exe (PID: 18264)
      • Axam.exe (PID: 12124)
      • Axam.exe (PID: 16408)
      • quasarat.exe (PID: 10420)
      • Axam.exe (PID: 17984)
      • Axam.exe (PID: 1068)
      • Axam.exe (PID: 17472)
      • Axam.exe (PID: 11092)
      • Axam.exe (PID: 12720)
      • ShellExperienceHost.exe (PID: 15736)
      • Axam.exe (PID: 16064)
      • Axam.exe (PID: 13664)
      • Axam.exe (PID: 7868)
      • Axam.exe (PID: 11136)
      • Axam.exe (PID: 6388)
      • Axam.exe (PID: 8888)
    • The sample compiled with english language support

      • main.exe (PID: 2076)
      • main.exe (PID: 3788)
      • Setup.exe (PID: 10988)
      • Setup.exe (PID: 10952)
      • Prolin.exe (PID: 10876)
      • WannaCry.exe (PID: 14292)
      • Axam.a.exe (PID: 13528)
      • 123.exe (PID: 14096)
      • Amus.exe (PID: 13568)
      • varen.exe (PID: 9920)
      • powershell.exe (PID: 8516)
      • powershell.exe (PID: 8320)
      • powershell.exe (PID: 8380)
      • powershell.exe (PID: 7836)
      • powershell.exe (PID: 3620)
      • powershell.exe (PID: 8552)
      • powershell.exe (PID: 8308)
      • powershell.exe (PID: 8488)
      • powershell.exe (PID: 13608)
      • powershell.exe (PID: 8544)
      • powershell.exe (PID: 8632)
      • dumer.exe (PID: 13432)
      • powershell.exe (PID: 14144)
    • Checks supported languages

      • main.exe (PID: 2076)
      • build.exe (PID: 5348)
      • sFFG7Wg.exe (PID: 2388)
      • TempSpoofer.exe (PID: 7224)
      • TempSpoofer.exe (PID: 7232)
      • catqw.exe (PID: 7216)
      • swagggg.exe (PID: 7192)
      • kj.exe (PID: 6836)
      • Helper.exe (PID: 7176)
      • crimkm.exe (PID: 7200)
      • Monotone.exe (PID: 7208)
      • TempSpoofer.exe (PID: 7296)
      • Monotone.exe (PID: 2708)
      • VXHDH.exe (PID: 4044)
      • TempSpoofer.exe (PID: 7396)
      • Monotone.exe (PID: 7184)
      • TempSpoofer.exe (PID: 7496)
      • main.exe (PID: 3788)
      • my%20file.exe (PID: 7564)
      • donie30.exe (PID: 7544)
      • 1.exe (PID: 7600)
      • Vb5HUIU.exe (PID: 7612)
      • trails.exe (PID: 7796)
      • mexx.exe (PID: 7692)
      • TempSpoofer.exe (PID: 7664)
      • TempSpoofer.exe (PID: 7648)
      • TempSpoofer.exe (PID: 7636)
      • PluGman23333%20233.exe (PID: 7628)
      • bravo29.exe (PID: 8292)
      • Crypt.exe (PID: 8480)
      • game3.exe (PID: 7588)
      • installs.exe (PID: 8560)
      • T.exe (PID: 8248)
      • K.exe (PID: 7704)
      • XClient.exe (PID: 8568)
      • UniversalSpoofer.exe (PID: 8620)
      • lollo.exe (PID: 9060)
      • startud.exe (PID: 9168)
      • ap.exe (PID: 9344)
      • tcp_windows_amd64.exe (PID: 9440)
      • Worldofficee.exe (PID: 8132)
      • LOIC.exe (PID: 9864)
      • syspool.exe (PID: 9924)
      • CryptoWall.exe (PID: 10264)
      • test1.exe (PID: 9988)
      • Ganja128.exe (PID: 10760)
      • ganja5.exe (PID: 10712)
      • lol.exe (PID: 10664)
      • Ganja180.exe (PID: 10744)
      • porn.exe (PID: 10788)
      • Prolin.exe (PID: 10876)
      • demonx64.exe (PID: 11140)
      • march.exe (PID: 11052)
      • 90.exe (PID: 10888)
      • cc.exe (PID: 11080)
      • demon.exe (PID: 11072)
      • Ganja90.exe (PID: 11184)
      • Ganja39.exe (PID: 11160)
      • baboon.exe (PID: 11112)
      • Setup.exe (PID: 10988)
      • https.exe (PID: 11124)
      • trip.exe (PID: 11032)
      • Ganja199.exe (PID: 11916)
      • Ganja195.exe (PID: 10916)
      • msconfig.exe (PID: 12024)
      • Worldoffice.exe (PID: 10960)
      • Setup.exe (PID: 10952)
      • klass.exe (PID: 12148)
      • ls.exe (PID: 3844)
      • WxWorkMultiOpen.exe (PID: 9936)
      • klass.exe (PID: 12528)
      • e.exe (PID: 7752)
      • WxWorkMultiOpen.exe (PID: 9900)
      • WxWorkMultiOpen.exe (PID: 10008)
      • ls.exe (PID: 12592)
      • Bloxflip%20Predictor.exe (PID: 12624)
      • Ganja99.exe (PID: 12688)
      • Ganja165.exe (PID: 12676)
      • WxWorkMultiOpen.exe (PID: 10020)
      • WxWorkMultiOpen.exe (PID: 9880)
      • WxWorkMultiOpen.exe (PID: 10340)
      • WxWorkMultiOpen.exe (PID: 9892)
      • WxWorkMultiOpen.exe (PID: 9964)
      • WxWorkMultiOpen.exe (PID: 9912)
      • WxWorkMultiOpen.exe (PID: 10688)
      • WxWorkMultiOpen.exe (PID: 9996)
      • Whisker.exe (PID: 10996)
      • WxWorkMultiOpen.exe (PID: 10680)
      • WxWorkMultiOpen.exe (PID: 10308)
      • javaw.exe (PID: 13100)
      • svchost.exe (PID: 13124)
      • WxWorkMultiOpen.exe (PID: 10032)
      • Ganja35.exe (PID: 13156)
      • WxWorkMultiOpen.exe (PID: 10672)
      • DumpAADUserPRT.exe (PID: 10704)
      • Client-built.exe (PID: 13256)
      • Ganja174.exe (PID: 13248)
      • WxWorkMultiOpen.exe (PID: 9976)
      • WxWorkMultiOpen.exe (PID: 10656)
      • WxWorkMultiOpen.exe (PID: 10056)
      • WxWorkMultiOpen.exe (PID: 10048)
      • Amus.exe (PID: 13568)
      • Jay.exe (PID: 13408)
      • Ganja151.exe (PID: 13544)
      • Ganja190.exe (PID: 13176)
      • Ganja20.exe (PID: 13264)
      • Ganja176.exe (PID: 14056)
      • Doppelganger.exe (PID: 10924)
      • CryptoLocker.exe (PID: 14088)
      • kajmak.exe (PID: 14064)
      • Ganja61.exe (PID: 14120)
      • amnew.exe (PID: 14136)
      • Ganja121.exe (PID: 14184)
      • Ganja36.exe (PID: 14208)
      • L2.exe (PID: 14152)
      • 2.exe (PID: 14284)
      • Bugsoft.exe (PID: 13584)
      • bot.exe (PID: 2216)
      • F.exe (PID: 12576)
      • quasarat.exe (PID: 14276)
      • Ganja132.exe (PID: 14308)
      • Ganja45.exe (PID: 12352)
      • Ganja54.exe (PID: 12996)
      • WxWorkMultiOpen.exe (PID: 10696)
      • Ganja3.exe (PID: 14072)
      • winxclient.exe (PID: 12508)
      • Ganja153.exe (PID: 14112)
      • loader.exe (PID: 14104)
      • Ganja85.exe (PID: 14176)
      • cabal.exe (PID: 14200)
      • foncar.exe (PID: 14216)
      • Ganja49.exe (PID: 14260)
      • G7_Update.exe (PID: 14300)
      • WannaCry.exe (PID: 14292)
      • your_app.exe (PID: 11208)
      • Ganja172.exe (PID: 11436)
      • Ganja66.exe (PID: 14168)
      • Axam.a.exe (PID: 13528)
      • ganja2.exe (PID: 11892)
      • Anap.a.exe (PID: 9272)
      • Ganja13.exe (PID: 11252)
      • Clien123.exe (PID: 14252)
      • 123.exe (PID: 14096)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 14604)
      • nbin22.exe (PID: 14128)
      • winsvchost.exe (PID: 14048)
      • 90.exe (PID: 12400)
      • cron1.exe (PID: 14244)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 15216)
      • esp32.exe (PID: 13552)
      • pe2shc.exe (PID: 13576)
      • MSBuild.exe (PID: 12004)
      • agent.exe (PID: 14332)
      • Adobe.exe (PID: 11696)
      • c2_payload_aes.exe (PID: 13196)
      • rickroll.exe (PID: 13560)
      • cron123123213.exe (PID: 13316)
      • esp.exe (PID: 14192)
      • remcos.exe (PID: 13016)
      • MSBuild.exe (PID: 6256)
      • RegAsm.exe (PID: 16616)
      • test.exe (PID: 16452)
      • MSBuild.exe (PID: 16660)
      • 4De3.exe (PID: 17212)
      • AdobeART.exe (PID: 17596)
      • dumer.exe (PID: 18156)
      • Setup.exe (PID: 18148)
      • AdobeART.exe (PID: 17828)
      • Axam.exe (PID: 19048)
      • Setup.exe (PID: 18932)
      • AdobeART.exe (PID: 19332)
      • Axam.exe (PID: 10744)
      • svchost.com (PID: 18808)
      • server.exe (PID: 11192)
      • Axam.exe (PID: 8008)
      • Axam.exe (PID: 8496)
      • AdobeART.exe (PID: 7620)
      • Axam.exe (PID: 7968)
      • Axam.exe (PID: 8088)
      • Axam.exe (PID: 8580)
      • Axam.exe (PID: 9004)
      • Axam.exe (PID: 8952)
      • gaved.exe (PID: 10776)
      • varen.exe (PID: 9920)
      • dumer.exe (PID: 13432)
      • Axam.exe (PID: 10600)
      • Axam.exe (PID: 10612)
      • csc.exe (PID: 10632)
      • csc.exe (PID: 10508)
      • cvtres.exe (PID: 16968)
      • cvtres.exe (PID: 12824)
      • Axam.exe (PID: 3756)
      • !WannaDecryptor!.exe (PID: 7000)
      • Axam.exe (PID: 17348)
      • Axam.exe (PID: 5416)
      • Axam.exe (PID: 17272)
      • Axam.exe (PID: 14828)
      • chcp.com (PID: 14124)
      • Axam.exe (PID: 5424)
      • Axam.exe (PID: 16892)
      • csc.exe (PID: 16960)
      • Axam.exe (PID: 14984)
      • Axam.exe (PID: 17740)
      • Axam.exe (PID: 12044)
      • Axam.exe (PID: 13464)
      • Axam.exe (PID: 16908)
      • Axam.exe (PID: 13668)
      • Axam.exe (PID: 18076)
      • Axam.exe (PID: 12500)
      • Axam.exe (PID: 3724)
      • Axam.exe (PID: 13164)
      • cvtres.exe (PID: 8084)
      • Axam.exe (PID: 15024)
      • Axam.exe (PID: 9240)
      • aspnet_compiler.exe (PID: 14796)
      • Axam.exe (PID: 4560)
      • RegSvcs.exe (PID: 1164)
      • Axam.exe (PID: 17512)
      • Axam.exe (PID: 16444)
      • Axam.exe (PID: 9868)
      • Axam.exe (PID: 10584)
      • Axam.exe (PID: 4820)
      • Axam.exe (PID: 7320)
      • Axam.exe (PID: 11628)
      • Axam.exe (PID: 17896)
      • Axam.exe (PID: 1520)
      • Axam.exe (PID: 18880)
      • Axam.exe (PID: 4120)
      • Axam.exe (PID: 18988)
      • Axam.exe (PID: 18264)
      • Axam.exe (PID: 12124)
      • Axam.exe (PID: 17984)
      • Axam.exe (PID: 1068)
      • Axam.exe (PID: 16408)
      • quasarat.exe (PID: 10420)
      • Axam.exe (PID: 17472)
      • Axam.exe (PID: 11092)
      • Axam.exe (PID: 12720)
      • ShellExperienceHost.exe (PID: 15736)
      • cvtres.exe (PID: 9312)
      • Axam.exe (PID: 13664)
      • csc.exe (PID: 6152)
      • Axam.exe (PID: 16064)
      • Axam.exe (PID: 11136)
      • Axam.exe (PID: 7868)
      • cvtres.exe (PID: 17608)
      • csc.exe (PID: 9784)
      • Axam.exe (PID: 8888)
      • Axam.exe (PID: 6388)
    • Uses Task Scheduler to autorun other applications (AUTOMATE)

      • cmd.exe (PID: 6936)
      • swagggg.exe (PID: 7192)
    • Checks proxy server information

      • main.exe (PID: 3788)
      • sFFG7Wg.exe (PID: 2388)
      • demonx64.exe (PID: 11140)
      • demon.exe (PID: 11072)
      • march.exe (PID: 11052)
      • baboon.exe (PID: 11112)
      • mexx.exe (PID: 7692)
      • https.exe (PID: 11124)
      • Vb5HUIU.exe (PID: 7612)
      • svchost.exe (PID: 13124)
      • c2_payload_aes.exe (PID: 13196)
      • VXHDH.exe (PID: 4044)
      • trip.exe (PID: 11032)
      • cabal.exe (PID: 14200)
      • svchost.exe (PID: 13844)
      • explorer.exe (PID: 4772)
      • L2.exe (PID: 14152)
      • Ganja128.exe (PID: 10760)
      • bot.exe (PID: 2216)
      • ganja5.exe (PID: 10712)
      • Ganja61.exe (PID: 14120)
      • LOIC.exe (PID: 9864)
      • Ganja151.exe (PID: 13544)
      • Client-built.exe (PID: 13256)
      • quasarat.exe (PID: 14276)
      • powershell.exe (PID: 9816)
      • powershell.exe (PID: 9952)
      • dumer.exe (PID: 13432)
      • varen.exe (PID: 9920)
      • Jay.exe (PID: 13408)
      • gaved.exe (PID: 10776)
      • powershell.exe (PID: 13536)
      • powershell.exe (PID: 12928)
      • F.exe (PID: 12576)
      • build.exe (PID: 5348)
      • WerFault.exe (PID: 15500)
      • WerFault.exe (PID: 14440)
      • WerFault.exe (PID: 17748)
      • WerFault.exe (PID: 15416)
      • powershell.exe (PID: 8308)
      • powershell.exe (PID: 8020)
      • powershell.exe (PID: 8380)
      • powershell.exe (PID: 8632)
      • powershell.exe (PID: 8488)
      • powershell.exe (PID: 8320)
      • powershell.exe (PID: 3620)
      • powershell.exe (PID: 13608)
      • powershell.exe (PID: 8552)
      • powershell.exe (PID: 8516)
      • powershell.exe (PID: 7836)
      • powershell.exe (PID: 8544)
      • installs.exe (PID: 8560)
      • RegSvcs.exe (PID: 1164)
      • powershell.exe (PID: 10724)
      • slui.exe (PID: 3388)
      • powershell.exe (PID: 14228)
      • powershell.exe (PID: 14144)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 1052)
      • mshta.exe (PID: 1180)
      • mshta.exe (PID: 4044)
      • mshta.exe (PID: 3844)
      • mshta.exe (PID: 5496)
      • mshta.exe (PID: 1468)
      • mshta.exe (PID: 9632)
      • mshta.exe (PID: 9788)
      • mshta.exe (PID: 9272)
      • mshta.exe (PID: 9796)
    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 3820)
      • svchost.exe (PID: 13844)
      • cscript.exe (PID: 18820)
      • WMIC.exe (PID: 13744)
      • explorer.exe (PID: 4772)
    • Creates files or folders in the user directory

      • Taskmgr.exe (PID: 3820)
      • syspool.exe (PID: 9924)
      • test1.exe (PID: 9988)
      • lol.exe (PID: 10664)
      • Ganja180.exe (PID: 10744)
      • explorer.exe (PID: 11328)
      • my%20file.exe (PID: 7564)
      • sFFG7Wg.exe (PID: 2388)
      • loader.exe (PID: 14104)
      • CryptoLocker.exe (PID: 14088)
      • swagggg.exe (PID: 7192)
      • trails.exe (PID: 7796)
      • Amus.exe (PID: 13568)
      • Axam.a.exe (PID: 13528)
      • Bloxflip%20Predictor.exe (PID: 12624)
      • 123.exe (PID: 14096)
      • explorer.exe (PID: 4772)
      • ap.exe (PID: 9344)
      • Client-built.exe (PID: 13256)
      • Vb5HUIU.exe (PID: 7612)
      • dumer.exe (PID: 13432)
      • varen.exe (PID: 9920)
      • WerFault.exe (PID: 14440)
      • WannaCry.exe (PID: 14292)
      • WerFault.exe (PID: 15500)
      • WerFault.exe (PID: 17748)
      • WerFault.exe (PID: 15416)
    • Reads the machine GUID from the registry

      • build.exe (PID: 5348)
      • sFFG7Wg.exe (PID: 2388)
      • TempSpoofer.exe (PID: 7224)
      • Helper.exe (PID: 7176)
      • Monotone.exe (PID: 2708)
      • TempSpoofer.exe (PID: 7296)
      • TempSpoofer.exe (PID: 7232)
      • Monotone.exe (PID: 7208)
      • 1.exe (PID: 7600)
      • swagggg.exe (PID: 7192)
      • TempSpoofer.exe (PID: 7496)
      • TempSpoofer.exe (PID: 7396)
      • Monotone.exe (PID: 7184)
      • TempSpoofer.exe (PID: 7664)
      • TempSpoofer.exe (PID: 7636)
      • K.exe (PID: 7704)
      • trails.exe (PID: 7796)
      • TempSpoofer.exe (PID: 7648)
      • Vb5HUIU.exe (PID: 7612)
      • game3.exe (PID: 7588)
      • CryptoWall.exe (PID: 10264)
      • T.exe (PID: 8248)
      • VXHDH.exe (PID: 4044)
      • startud.exe (PID: 9168)
      • UniversalSpoofer.exe (PID: 8620)
      • LOIC.exe (PID: 9864)
      • ap.exe (PID: 9344)
      • my%20file.exe (PID: 7564)
      • mexx.exe (PID: 7692)
      • trip.exe (PID: 11032)
      • installs.exe (PID: 8560)
      • cc.exe (PID: 11080)
      • XClient.exe (PID: 8568)
      • WannaCry.exe (PID: 14292)
      • Client-built.exe (PID: 13256)
      • ganja5.exe (PID: 10712)
      • Ganja128.exe (PID: 10760)
      • javaw.exe (PID: 13100)
      • quasarat.exe (PID: 14276)
      • Jay.exe (PID: 13408)
      • cabal.exe (PID: 14200)
      • 90.exe (PID: 10888)
      • F.exe (PID: 12576)
      • Ganja61.exe (PID: 14120)
      • Ganja151.exe (PID: 13544)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 14604)
      • Amus.exe (PID: 13568)
      • foncar.exe (PID: 14216)
      • Clien123.exe (PID: 14252)
      • bot.exe (PID: 2216)
      • c2_payload_aes.exe (PID: 13196)
      • RegAsm.exe (PID: 16616)
      • MSBuild.exe (PID: 12004)
      • AdobeART.exe (PID: 17596)
      • MSBuild.exe (PID: 16660)
      • Crypt.exe (PID: 8480)
      • AdobeART.exe (PID: 19332)
      • csc.exe (PID: 10508)
      • csc.exe (PID: 10632)
      • server.exe (PID: 11192)
      • csc.exe (PID: 16960)
      • aspnet_compiler.exe (PID: 14796)
      • RegSvcs.exe (PID: 1164)
      • varen.exe (PID: 9920)
      • csc.exe (PID: 6152)
      • csc.exe (PID: 9784)
    • Reads the software policy settings

      • sFFG7Wg.exe (PID: 2388)
      • trails.exe (PID: 7796)
      • foncar.exe (PID: 14216)
      • mexx.exe (PID: 7692)
      • MSBuild.exe (PID: 12004)
      • MSBuild.exe (PID: 16660)
      • MSBuild.exe (PID: 6256)
      • Vb5HUIU.exe (PID: 7612)
      • Helper.exe (PID: 7176)
      • WerFault.exe (PID: 14440)
      • WerFault.exe (PID: 15500)
      • WerFault.exe (PID: 17748)
      • build.exe (PID: 5348)
      • WerFault.exe (PID: 15416)
      • aspnet_compiler.exe (PID: 14796)
      • RegSvcs.exe (PID: 1164)
      • slui.exe (PID: 3388)
      • varen.exe (PID: 9920)
    • Reads mouse settings

      • kj.exe (PID: 6836)
      • catqw.exe (PID: 7216)
      • PluGman23333%20233.exe (PID: 7628)
    • Reads Environment values

      • swagggg.exe (PID: 7192)
      • Vb5HUIU.exe (PID: 7612)
      • ganja5.exe (PID: 10712)
      • Ganja128.exe (PID: 10760)
      • Ganja151.exe (PID: 13544)
      • Ganja61.exe (PID: 14120)
      • TempSpoofer.exe (PID: 7296)
      • trails.exe (PID: 7796)
      • TempSpoofer.exe (PID: 7396)
      • Helper.exe (PID: 7176)
      • build.exe (PID: 5348)
      • TempSpoofer.exe (PID: 7224)
      • TempSpoofer.exe (PID: 7664)
      • TempSpoofer.exe (PID: 7232)
      • TempSpoofer.exe (PID: 7636)
      • TempSpoofer.exe (PID: 7648)
      • Monotone.exe (PID: 7184)
      • Monotone.exe (PID: 2708)
      • UniversalSpoofer.exe (PID: 8620)
      • TempSpoofer.exe (PID: 7496)
      • Monotone.exe (PID: 7208)
      • bot.exe (PID: 2216)
      • javaw.exe (PID: 13100)
      • startud.exe (PID: 9168)
      • installs.exe (PID: 8560)
    • Creates files in the program directory

      • 1.exe (PID: 7600)
      • e.exe (PID: 7752)
      • Ganja39.exe (PID: 11160)
      • Ganja90.exe (PID: 11184)
      • kajmak.exe (PID: 14064)
      • bot.exe (PID: 2216)
      • remcos.exe (PID: 13016)
      • Ganja128.exe (PID: 10760)
      • WannaCry.exe (PID: 14292)
    • Launching a file from a Registry key

      • 1.exe (PID: 7600)
      • e.exe (PID: 7752)
      • syspool.exe (PID: 9924)
      • explorer.exe (PID: 11328)
      • klass.exe (PID: 12148)
      • ls.exe (PID: 3844)
      • msconfig.exe (PID: 12024)
      • loader.exe (PID: 14104)
      • WannaCry.exe (PID: 14292)
      • winsvchost.exe (PID: 14048)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 14604)
      • Adobe.exe (PID: 11696)
      • remcos.exe (PID: 13016)
      • Axam.a.exe (PID: 13528)
      • Amus.exe (PID: 13568)
      • explorer.exe (PID: 4772)
      • AdobeART.exe (PID: 17828)
      • Bloxflip%20Predictor.exe (PID: 12624)
      • Axam.exe (PID: 19048)
      • AdobeART.exe (PID: 7620)
      • Axam.exe (PID: 10744)
      • Axam.exe (PID: 8008)
      • Axam.exe (PID: 8496)
      • Axam.exe (PID: 8088)
      • Axam.exe (PID: 7968)
      • Axam.exe (PID: 8580)
      • Axam.exe (PID: 8952)
      • Axam.exe (PID: 9004)
      • quasarat.exe (PID: 14276)
      • Axam.exe (PID: 10600)
      • Axam.exe (PID: 10612)
      • Axam.exe (PID: 3756)
      • server.exe (PID: 11192)
      • Axam.exe (PID: 17348)
      • Axam.exe (PID: 5416)
      • Axam.exe (PID: 17272)
      • Axam.exe (PID: 14828)
      • Axam.exe (PID: 5424)
      • Axam.exe (PID: 14984)
      • Axam.exe (PID: 16892)
      • Axam.exe (PID: 12044)
      • Axam.exe (PID: 16908)
      • Axam.exe (PID: 13464)
      • Axam.exe (PID: 13668)
      • Axam.exe (PID: 3724)
      • Axam.exe (PID: 17740)
      • Axam.exe (PID: 13164)
      • Axam.exe (PID: 12500)
      • Axam.exe (PID: 18076)
      • Axam.exe (PID: 15024)
      • Axam.exe (PID: 9240)
      • Axam.exe (PID: 16444)
      • Axam.exe (PID: 4560)
      • Axam.exe (PID: 9868)
      • Axam.exe (PID: 18880)
      • Axam.exe (PID: 10584)
      • Axam.exe (PID: 4820)
      • Axam.exe (PID: 1520)
      • Axam.exe (PID: 17512)
      • Axam.exe (PID: 11628)
      • Axam.exe (PID: 17896)
      • Axam.exe (PID: 18988)
      • Axam.exe (PID: 7320)
      • Axam.exe (PID: 4120)
      • dumer.exe (PID: 13432)
      • Axam.exe (PID: 18264)
      • Axam.exe (PID: 12124)
      • Axam.exe (PID: 17984)
      • Axam.exe (PID: 16408)
      • Axam.exe (PID: 1068)
      • Axam.exe (PID: 17472)
      • Axam.exe (PID: 11092)
      • Axam.exe (PID: 12720)
      • Axam.exe (PID: 16064)
      • Axam.exe (PID: 13664)
      • Axam.exe (PID: 11136)
      • Axam.exe (PID: 7868)
      • Axam.exe (PID: 6388)
      • Axam.exe (PID: 8888)
    • Disables trace logs

      • mexx.exe (PID: 7692)
      • Vb5HUIU.exe (PID: 7612)
      • Ganja128.exe (PID: 10760)
      • ganja5.exe (PID: 10712)
      • Ganja151.exe (PID: 13544)
      • Ganja61.exe (PID: 14120)
      • VXHDH.exe (PID: 4044)
      • bot.exe (PID: 2216)
      • trip.exe (PID: 11032)
      • cabal.exe (PID: 14200)
      • Client-built.exe (PID: 13256)
      • powershell.exe (PID: 9816)
      • quasarat.exe (PID: 14276)
      • powershell.exe (PID: 9952)
      • Jay.exe (PID: 13408)
      • powershell.exe (PID: 13536)
      • F.exe (PID: 12576)
      • powershell.exe (PID: 12928)
      • build.exe (PID: 5348)
      • powershell.exe (PID: 8544)
      • powershell.exe (PID: 7836)
      • powershell.exe (PID: 8380)
      • powershell.exe (PID: 8632)
      • powershell.exe (PID: 8488)
      • powershell.exe (PID: 8516)
      • powershell.exe (PID: 3620)
      • powershell.exe (PID: 8020)
      • powershell.exe (PID: 8552)
      • powershell.exe (PID: 8308)
      • powershell.exe (PID: 13608)
      • powershell.exe (PID: 8320)
      • installs.exe (PID: 8560)
      • RegSvcs.exe (PID: 1164)
      • powershell.exe (PID: 10724)
      • powershell.exe (PID: 14228)
      • powershell.exe (PID: 14144)
    • Process checks whether UAC notifications are on

      • my%20file.exe (PID: 7564)
    • Launching a file from the Startup directory

      • explorer.exe (PID: 11328)
      • trails.exe (PID: 7796)
      • bot.exe (PID: 2216)
      • Axam.a.exe (PID: 13528)
      • Bloxflip%20Predictor.exe (PID: 12624)
      • Setup.exe (PID: 10952)
    • Process checks computer location settings

      • e.exe (PID: 7752)
      • test1.exe (PID: 9988)
      • lol.exe (PID: 10664)
      • donie30.exe (PID: 7544)
      • Setup.exe (PID: 10988)
      • bravo29.exe (PID: 8292)
      • Setup.exe (PID: 10952)
      • 90.exe (PID: 12400)
      • Bloxflip%20Predictor.exe (PID: 12624)
      • your_app.exe (PID: 11208)
      • G7_Update.exe (PID: 14300)
      • 123.exe (PID: 14096)
      • Crypt.exe (PID: 8480)
      • amnew.exe (PID: 14136)
      • 4De3.exe (PID: 17212)
      • ap.exe (PID: 9344)
      • Ganja128.exe (PID: 10760)
      • quasarat.exe (PID: 14276)
      • varen.exe (PID: 9920)
      • dumer.exe (PID: 13432)
      • quasarat.exe (PID: 10420)
      • Helper.exe (PID: 7176)
    • PyInstaller has been detected (YARA)

      • main.exe (PID: 2076)
    • The sample compiled with chinese language support

      • main.exe (PID: 3788)
    • Manual execution by a user

      • cmmon32.exe (PID: 10680)
    • The sample compiled with Italian language support

      • main.exe (PID: 3788)
    • The sample compiled with korean language support

      • G7_Update.exe (PID: 14300)
      • main.exe (PID: 3788)
    • The sample compiled with turkish language support

      • main.exe (PID: 3788)
    • The sample compiled with polish language support

      • main.exe (PID: 3788)
    • Attempting to use instant messaging service

      • svchost.exe (PID: 2200)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 6304)
      • powershell.exe (PID: 10976)
      • powershell.exe (PID: 12760)
      • powershell.exe (PID: 12928)
      • powershell.exe (PID: 14268)
      • build.exe (PID: 5348)
      • powershell.exe (PID: 7836)
      • powershell.exe (PID: 8308)
      • powershell.exe (PID: 3620)
      • powershell.exe (PID: 8380)
      • powershell.exe (PID: 14144)
      • powershell.exe (PID: 13608)
      • powershell.exe (PID: 8632)
      • powershell.exe (PID: 8552)
      • powershell.exe (PID: 8516)
      • powershell.exe (PID: 8320)
      • powershell.exe (PID: 8488)
      • powershell.exe (PID: 14004)
      • powershell.exe (PID: 9952)
      • powershell.exe (PID: 8544)
    • Checks whether the specified file exists (POWERSHELL)

      • Helper.exe (PID: 7176)
      • powershell.exe (PID: 14080)
    • Reads CPU info

      • Ganja128.exe (PID: 10760)
      • ganja5.exe (PID: 10712)
      • Ganja61.exe (PID: 14120)
      • Ganja151.exe (PID: 13544)
      • Vb5HUIU.exe (PID: 7612)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 11172)
      • powershell.exe (PID: 9816)
      • powershell.exe (PID: 14228)
      • powershell.exe (PID: 13536)
      • powershell.exe (PID: 12928)
      • powershell.exe (PID: 18472)
      • powershell.exe (PID: 6380)
      • powershell.exe (PID: 8544)
      • powershell.exe (PID: 3620)
      • powershell.exe (PID: 13608)
      • powershell.exe (PID: 8308)
      • powershell.exe (PID: 7836)
      • powershell.exe (PID: 8380)
      • powershell.exe (PID: 8020)
      • powershell.exe (PID: 8320)
      • powershell.exe (PID: 8552)
      • powershell.exe (PID: 8632)
      • powershell.exe (PID: 8488)
      • powershell.exe (PID: 8516)
      • powershell.exe (PID: 9188)
      • powershell.exe (PID: 14144)
      • powershell.exe (PID: 14004)
      • powershell.exe (PID: 9952)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 10724)
    • The executable file from the user directory is run by the Powershell process

      • Axam.exe (PID: 10600)
      • Axam.exe (PID: 10612)
      • Axam.exe (PID: 3756)
      • Axam.exe (PID: 5416)
      • Axam.exe (PID: 14828)
      • Axam.exe (PID: 14984)
      • Axam.exe (PID: 12044)
      • Axam.exe (PID: 13464)
      • Axam.exe (PID: 16908)
      • Axam.exe (PID: 17740)
      • Axam.exe (PID: 13668)
      • Axam.exe (PID: 3724)
      • Axam.exe (PID: 18076)
      • Axam.exe (PID: 13164)
      • Axam.exe (PID: 12500)
      • Axam.exe (PID: 18988)
      • Axam.exe (PID: 17512)
      • Axam.exe (PID: 9868)
      • Axam.exe (PID: 10584)
      • Axam.exe (PID: 4820)
      • Axam.exe (PID: 1520)
      • Axam.exe (PID: 18880)
      • Axam.exe (PID: 11628)
      • Axam.exe (PID: 17896)
      • Axam.exe (PID: 7320)
      • Axam.exe (PID: 4120)
      • Axam.exe (PID: 8888)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 10724)
      • powershell.exe (PID: 9188)
      • Helper.exe (PID: 7176)
      • powershell.exe (PID: 3620)
      • powershell.exe (PID: 8308)
      • powershell.exe (PID: 13608)
      • powershell.exe (PID: 7836)
      • powershell.exe (PID: 8544)
      • powershell.exe (PID: 8380)
      • powershell.exe (PID: 8020)
      • powershell.exe (PID: 8632)
      • powershell.exe (PID: 8488)
      • powershell.exe (PID: 14080)
      • powershell.exe (PID: 8552)
      • powershell.exe (PID: 8320)
      • powershell.exe (PID: 8516)
      • powershell.exe (PID: 7908)
    • Uses string split method (POWERSHELL)

      • powershell.exe (PID: 12928)
      • powershell.exe (PID: 9816)
    • Changes the display of characters in the console

      • cmd.exe (PID: 11344)
    • Remote server returned an error (POWERSHELL)

      • powershell.exe (PID: 8020)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 9816)
    • Reads Windows Product ID

      • powershell.exe (PID: 10724)
    • Reads the time zone

      • Vb5HUIU.exe (PID: 7612)
    • Launching a file from Task Scheduler

      • powershell.exe (PID: 14228)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:19 18:59:12+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 178688
InitializedDataSize: 154624
UninitializedDataSize: -
EntryPoint: 0xc380
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
591
Monitored processes
450
Malicious processes
97
Suspicious processes
87

Behavior graph

Click at the process to see the details
start main.exe conhost.exe no specs #GENERIC main.exe cmd.exe schtasks.exe no specs cmd.exe no specs taskmgr.exe no specs mshta.exe no specs #CLICKFIX svchost.exe mshta.exe no specs mshta.exe no specs cmd.exe no specs build.exe conhost.exe no specs mshta.exe no specs sffg7wg.exe cmd.exe no specs conhost.exe no specs mshta.exe no specs mshta.exe no specs cmd.exe no specs powershell.exe conhost.exe no specs conhost.exe no specs kj.exe vxhdh.exe monotone.exe no specs helper.exe no specs monotone.exe no specs swagggg.exe crimkm.exe no specs monotone.exe no specs catqw.exe no specs tempspoofer.exe no specs tempspoofer.exe no specs tempspoofer.exe no specs tempspoofer.exe no specs tempspoofer.exe no specs #AMADEY donie30.exe my%20file.exe game3.exe no specs 1.exe vb5huiu.exe plugman23333%20233.exe tempspoofer.exe no specs tempspoofer.exe no specs tempspoofer.exe no specs #SNAKEKEYLOGGER mexx.exe #REMCOS k.exe #REMCOS e.exe #ASYNCRAT trails.exe t.exe no specs #AMADEY bravo29.exe powershell.exe no specs #AUROTUN crypt.exe installs.exe xclient.exe universalspoofer.exe no specs lollo2.exe conhost.exe no specs lollo.exe #DCRAT startud.exe powershell.exe no specs worldofficee.exe mshta.exe no specs ap.exe tcp_windows_amd64.exe conhost.exe no specs mshta.exe no specs cmd.exe no specs mshta.exe no specs mshta.exe no specs powershell.exe loic.exe no specs wxworkmultiopen.exe no specs wxworkmultiopen.exe no specs wxworkmultiopen.exe no specs wxworkmultiopen.exe no specs syspool.exe wxworkmultiopen.exe no specs powershell.exe wxworkmultiopen.exe no specs wxworkmultiopen.exe no specs test1.exe wxworkmultiopen.exe no specs wxworkmultiopen.exe no specs wxworkmultiopen.exe no specs wxworkmultiopen.exe no specs wxworkmultiopen.exe no specs wxworkmultiopen.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs cryptowall.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs wxworkmultiopen.exe no specs conhost.exe no specs wxworkmultiopen.exe no specs conhost.exe no specs wxworkmultiopen.exe no specs lol.exe wxworkmultiopen.exe no specs wxworkmultiopen.exe no specs wxworkmultiopen.exe no specs wxworkmultiopen.exe no specs dumpaaduserprt.exe no specs ganja5.exe no specs powershell.exe ganja180.exe ganja128.exe porn.exe prolin.exe 90.exe no specs ganja195.exe doppelganger.exe no specs #NESHTA setup.exe worldoffice.exe powershell.exe #NESHTA setup.exe whisker.exe no specs powershell.exe no specs trip.exe march.exe powershell.exe no specs demon.exe #REDLINE cc.exe baboon.exe https.exe demonx64.exe ganja39.exe powershell.exe no specs ganja90.exe conhost.exe no specs explorer.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs svchost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs ganja199.exe #LUMMA msbuild.exe msconfig.exe klass.exe ls.exe klass.exe no specs ls.exe no specs #NJRAT bloxflip%20predictor.exe ganja165.exe no specs ganja99.exe no specs powershell.exe cmd.exe no specs #KOI powershell.exe javaw.exe no specs svchost.exe ganja35.exe no specs ganja190.exe no specs c2_payload_aes.exe ganja174.exe no specs #QUASAR client-built.exe ganja20.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs #AGENTTESLA jay.exe axam.a.exe powershell.exe ganja151.exe no specs esp32.exe rickroll.exe no specs #NETWORM amus.exe pe2shc.exe no specs bugsoft.exe no specs svchost.exe powershell.exe no specs powershell.exe no specs brontok.exe no specs ganja176.exe no specs #PHORPIEX kajmak.exe ganja3.exe no specs powershell.exe no specs cryptolocker.exe 123.exe loader.exe ganja153.exe no specs ganja61.exe no specs nbin22.exe no specs #AMADEY amnew.exe powershell.exe l2.exe no specs powershell.exe no specs ganja66.exe no specs ganja85.exe no specs ganja121.exe no specs esp.exe cabal.exe ganja36.exe no specs #ASYNCRAT foncar.exe powershell.exe powershell.exe no specs cron1.exe no specs clien123.exe ganja49.exe no specs powershell.exe #QUASAR quasarat.exe 2.exe no specs #WANNACRY wannacry.exe g7_update.exe ganja132.exe no specs agent.exe ganja172.exe no specs ganja2.exe no specs winxclient.exe #AGENTTESLA f.exe anap.a.exe no specs powershell.exe no specs #NJRAT your_app.exe bot.exe ganja54.exe no specs cron123123213.exe no specs ganja13.exe no specs ganja45.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs regsvr32.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs winsvchost.exe {34184a33-0407-212e-3300-09040709e2c2}.exe cmd.exe no specs 90.exe no specs conhost.exe no specs schtasks.exe no specs regsvr32.exe no specs regsvcs.exe no specs {34184a33-0407-212e-3300-09040709e2c2}.exe no specs werfault.exe #FORMBOOK cmmon32.exe no specs adobe.exe #REMCOS remcos.exe cmd.exe no specs werfault.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs msbuild.exe cmd.exe no specs cmd.exe no specs outlook.exe conhost.exe no specs test.exe powershell.exe no specs regasm.exe no specs #LUMMA msbuild.exe 4de3.exe adobeart.exe no specs setup.exe no specs dumer.exe no specs #MODILOADER adobeart.exe werfault.exe powershell.exe no specs #DIAMOTRIX explorer.exe conhost.exe no specs setup.exe no specs axam.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs adobeart.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs axam.exe slui.exe attrib.exe no specs #NESHTA svchost.com cscript.exe no specs conhost.exe no specs #NJRAT server.exe powershell.exe no specs cmd.exe no specs axam.exe #LUMMA powershell.exe #LUMMA powershell.exe conhost.exe no specs powershell.exe axam.exe #LUMMA powershell.exe axam.exe #MODILOADER adobeart.exe axam.exe conhost.exe no specs #LUMMA powershell.exe #LUMMA powershell.exe #LUMMA powershell.exe #LUMMA powershell.exe axam.exe #LUMMA powershell.exe #LUMMA powershell.exe #LUMMA powershell.exe #LUMMA powershell.exe axam.exe certutil.exe no specs attrib.exe no specs axam.exe #AMADEY gaved.exe #AMADEY varen.exe #AMADEY dumer.exe schtasks.exe no specs conhost.exe no specs axam.exe wmic.exe no specs conhost.exe no specs csc.exe axam.exe csc.exe cmd.exe no specs cmd.exe no specs cvtres.exe no specs cvtres.exe no specs conhost.exe no specs axam.exe werfault.exe attrib.exe no specs conhost.exe no specs powershell.exe no specs netsh.exe no specs ipconfig.exe no specs conhost.exe no specs !wannadecryptor!.exe no specs conhost.exe no specs axam.exe axam.exe axam.exe chcp.com no specs axam.exe axam.exe csc.exe taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs axam.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe cvtres.exe no specs axam.exe axam.exe #ASYNCRAT aspnet_compiler.exe ping.exe no specs taskkill.exe no specs axam.exe #SNAKEKEYLOGGER regsvcs.exe axam.exe axam.exe axam.exe ipconfig.exe no specs conhost.exe no specs axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe axam.exe #NESHTA quasarat.exe axam.exe ipconfig.exe no specs axam.exe ipconfig.exe no specs conhost.exe no specs shellexperiencehost.exe no specs axam.exe axam.exe axam.exe csc.exe ipconfig.exe no specs conhost.exe no specs cvtres.exe no specs axam.exe axam.exe wmiapsrv.exe no specs axam.exe xcopy.exe no specs csc.exe cvtres.exe no specs schtasks.exe no specs axam.exe axam.exe main.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1052mshta.exe bestdreamchaningwithbetterpower.htaC:\Windows\System32\mshta.exemain.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1068"C:\Users\admin\AppData\Roaming\Axam.exe" "C:\Users\admin\AppData\Local\Temp\3582-490\quasarat.exe" C:\Users\admin\AppData\Roaming\Axam.exe
quasarat.exe
User:
admin
Integrity Level:
HIGH
Version:
1.00
Modules
Images
c:\users\admin\appdata\roaming\axam.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
1100\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemain.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1164catqw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
catqw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft .NET Services Installation Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1180mshta.exe weneedgreatattitudewithbestthinkingsforme.htaC:\Windows\System32\mshta.exemain.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1192\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1468mshta.exe supergoodthingswithbestfriendthingsbetterforme.htaC:\Windows\System32\mshta.exemain.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1520"C:\Users\admin\AppData\Roaming\Axam.exe" "C:\Users\admin\AppData\Roaming\4rpscvg5.ler0.exe" C:\Users\admin\AppData\Roaming\Axam.exe
powershell.exe
User:
admin
Integrity Level:
HIGH
Version:
1.00
Modules
Images
c:\users\admin\appdata\roaming\axam.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvbvm60.dll
c:\windows\syswow64\user32.dll
1612\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1636"ipconfig" /flushdnsC:\Windows\System32\ipconfig.exeVb5HUIU.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ipconfig.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
Total events
406 319
Read events
404 661
Write events
1 571
Delete events
87

Modification events

(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000090230
Operation:writeName:VirtualDesktop
Value:
10000000303044563096AFED4A643448A750FA41CFC7F708
(PID) Process:(3820) Taskmgr.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager
Operation:delete valueName:Preferences
Value:
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000001102BA
Operation:writeName:VirtualDesktop
Value:
10000000303044563096AFED4A643448A750FA41CFC7F708
(PID) Process:(2388) sFFG7Wg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2388) sFFG7Wg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2388) sFFG7Wg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconLayouts
Value:
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
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconNameVersion
Value:
1
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000801F4
Operation:writeName:VirtualDesktop
Value:
10000000303044563096AFED4A643448A750FA41CFC7F708
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000801F4
Operation:delete keyName:(default)
Value:
Executable files
813
Suspicious files
561
Text files
378
Unknown types
97

Dropped files

PID
Process
Filename
Type
2076main.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\_bz2.pydexecutable
MD5:684D656AADA9F7D74F5A5BDCF16D0EDB
SHA256:A5DFB4A663DEF3D2276B88866F6D220F6D30CC777B5D841CF6DBB15C6858017C
2076main.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\_asyncio.pydexecutable
MD5:56F958EEBBC62305B4BF690D61C78E28
SHA256:50631361EF074BE42D788818AF91D0301D22FA24A970F41F496D8272B92CFE31
2076main.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\VCRUNTIME140.dllexecutable
MD5:32DA96115C9D783A0769312C0482A62D
SHA256:8B10C53241726B0ACC9F513157E67FCB01C166FEC69E5E38CA6AADA8F9A3619F
2076main.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:FC009A82F0FAB71E2C8ADF7F60F489C8
SHA256:D2ADD358A45999E95F67D923F1B4F5A27F5A1A895225121909D716EDF5AE13E7
2076main.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-fibers-l1-1-0.dllexecutable
MD5:774133EFCABBCDD10DF784BB26804290
SHA256:B82B2D8E62011F2530F9B3FDEC55CF2869E4FB4133BDB6238BC0EA23FAE72661
4772explorer.exeC:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.datbinary
MD5:E49C56350AEDF784BFE00E444B879672
SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E
2076main.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\_overlapped.pydexecutable
MD5:363409FBACB1867F2CE45E3C6922DDB4
SHA256:F154AC9D5CA0646D18F6197C0406F7541B6E0752B2D82A330036C1E39D3A49E7
2076main.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\_cffi_backend.cp313-win_amd64.pydexecutable
MD5:5CBA92E7C00D09A55F5CBADC8D16CD26
SHA256:0E3D149B91FC7DC3367AB94620A5E13AF6E419F423B31D4800C381468CB8AD85
2076main.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\_lzma.pydexecutable
MD5:D63E2E743EA103626D33B3C1D882F419
SHA256:7C2D2030D5D246739C5D85F087FCF404BC36E1815E69A8AC7C9541267734FC28
2076main.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\_decimal.pydexecutable
MD5:21FCB8E3D4310346A5DC1A216E7E23CA
SHA256:9A0E05274CAD8D90F6BA6BC594261B36BFBDDF4F5CA6846B6367FE6A4E2FDCE4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
573
TCP/UDP connections
8 493
DNS requests
330
Threats
2 398

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3788
main.exe
GET
200
172.245.95.29:80
http://172.245.95.29/86/weseethebestthingswithbetterfuturegoodfor.hta
unknown
malicious
3788
main.exe
GET
185.156.72.61:80
http://185.156.72.61/inc/miromangos.exe
unknown
malicious
3788
main.exe
GET
185.156.72.2:80
http://185.156.72.2/files/978980897/Vb5HUIU.exe
unknown
unknown
3788
main.exe
GET
200
107.173.9.87:80
http://107.173.9.87/90/weneedgreatattitudewithbestthinkingsforme.hta
unknown
malicious
3788
main.exe
GET
200
8.137.98.198:8082
http://8.137.98.198:8082/02.08.2022.exe
unknown
unknown
3788
main.exe
GET
200
47.122.1.243:8000
http://47.122.1.243:8000/02.08.2022.exe
unknown
unknown
3788
main.exe
GET
185.156.72.2:80
http://185.156.72.2/files/6053747383/O1sOUoo.exe
unknown
unknown
3788
main.exe
GET
200
109.120.137.172:80
http://109.120.137.172/Crypt.exe
unknown
unknown
3788
main.exe
GET
185.156.72.2:80
http://185.156.72.2/files/8052963817/ku56mNL.exe
unknown
unknown
3788
main.exe
GET
185.156.72.2:80
http://185.156.72.2/files/6299414420/sFFG7Wg.exe
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3688
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3788
main.exe
151.101.2.49:443
urlhaus.abuse.ch
FASTLY
US
whitelisted
3788
main.exe
66.63.187.170:80
QUADRANET-INTERNET-SERVICES
US
unknown
3788
main.exe
185.156.72.2:80
Tov Vaiz Partner
RU
unknown
3788
main.exe
77.90.153.74:80
K&K Kommunikationssysteme GmbH
GB
unknown
3788
main.exe
107.173.9.87:80
AS-COLOCROSSING
US
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
google.com
  • 142.250.184.238
whitelisted
urlhaus.abuse.ch
  • 151.101.2.49
  • 151.101.194.49
  • 151.101.66.49
  • 151.101.130.49
whitelisted
pub-75d9e09aa5304a0f9b7cd6c04c01b53e.r2.dev
  • 162.159.140.237
  • 172.66.0.235
unknown
hbws.cc
  • 185.208.158.17
unknown
file.tuff.cat
  • 89.213.174.56
unknown
cptchvrf.com
  • 185.156.72.25
unknown
github.com
  • 140.82.121.3
  • 140.82.121.4
whitelisted
bitbucket.org
  • 185.166.143.48
  • 185.166.143.49
  • 185.166.143.50
whitelisted
raw.githubusercontent.com
  • 185.199.109.133
  • 185.199.108.133
  • 185.199.110.133
  • 185.199.111.133
whitelisted

Threats

PID
Process
Class
Message
3788
main.exe
Misc activity
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
2200
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] CloudFlare Public R2.dev Bucket
3788
main.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Python Suspicious User Agent
3788
main.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
2200
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
3788
main.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 60
2200
svchost.exe
A Network Trojan was detected
ET INFO Observed DNS Query to Cloudflare R2 Public Bucket (r2 .dev) Domain
3788
main.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 36
3788
main.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
3788
main.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 8
No debug info