| File name: | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | 
| Full analysis: | https://app.any.run/tasks/e4250bcd-fd51-4515-8fc6-dce0937df3a1 | 
| Verdict: | Malicious activity | 
| Threats: | A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet. | 
| Analysis date: | October 26, 2025, 17:04:00 | 
| OS: | Windows 10 Professional (build: 19044, 64 bit) | 
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable | 
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 7 sections | 
| MD5: | 52E22CCBEA5851EABC1E98EFCCBF4F47 | 
| SHA1: | 2E0438F90E5C2FF7B430DD2C254AC3EE710546AA | 
| SHA256: | 98C68F7C0C4715F6184CC5B1634ACF527DAB71A99EE371BE98FDEC37339ECF39 | 
| SSDEEP: | 98304:qCULNuAoWNHSn87+vlhdz8HC+E+PlzV0CzEtG8SSmtg3RDx6IrrLl90v+XHVFRSH:Bd3rlNP6H8PcGlNUa7E | 
| .exe | | | Win64 Executable (generic) (87.3) | 
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) | 
| .exe | | | DOS Executable Generic (6.3) | 
| MachineType: | AMD AMD64 | 
|---|---|
| TimeStamp: | 2025:08:30 18:02:02+00:00 | 
| ImageFileCharacteristics: | Executable, Large address aware | 
| PEType: | PE32+ | 
| LinkerVersion: | 14.44 | 
| CodeSize: | 179712 | 
| InitializedDataSize: | 98304 | 
| UninitializedDataSize: | - | 
| EntryPoint: | 0xda30 | 
| OSVersion: | 6 | 
| ImageVersion: | - | 
| SubsystemVersion: | 6 | 
| Subsystem: | Windows GUI | 
| FileVersionNumber: | 10.0.19041.746 | 
| ProductVersionNumber: | 10.0.19041.746 | 
| FileFlagsMask: | 0x003f | 
| FileFlags: | (none) | 
| FileOS: | Windows NT 32-bit | 
| ObjectFileType: | Dynamic link library | 
| FileSubtype: | - | 
| LanguageCode: | English (U.S.) | 
| CharacterSet: | Unicode | 
| CompanyName: | Microsoft Corporation | 
| FileDescription: | Infinity Services | 
| FileVersion: | 10.0.19041.746 (WinBuild.160101.0800) | 
| InternalName: | Exela.exe | 
| LegalCopyright: | © Microsoft Corporation. All rights reserved. | 
| OriginalFileName: | Infinity.exe | 
| ProductName: | Microsoft® Windows® Operating System | 
| ProductVersion: | 10.0.19041.746 | 
| PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 464 | route print | C:\Windows\System32\ROUTE.EXE | — | cmd.exe | |||||||||||
| User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Route Command Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
 | |||||||||||||||
| 796 | C:\WINDOWS\system32\cmd.exe /c "netsh wlan show profiles" | C:\Windows\System32\cmd.exe | — | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | |||||||||||
| User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
 | |||||||||||||||
| 1076 | netstat -ano | C:\Windows\System32\NETSTAT.EXE | — | cmd.exe | |||||||||||
| User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Netstat Command Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
 | |||||||||||||||
| 1164 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
| User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
 | |||||||||||||||
| 1264 | tasklist /FO LIST | C:\Windows\System32\tasklist.exe | — | cmd.exe | |||||||||||
| User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
 | |||||||||||||||
| 1264 | C:\WINDOWS\system32\cmd.exe /c "wmic csproduct get uuid" | C:\Windows\System32\cmd.exe | — | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | |||||||||||
| User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
 | |||||||||||||||
| 1508 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
| User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
 | |||||||||||||||
| 1928 | powershell.exe Get-Clipboard | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
| User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
 | |||||||||||||||
| 1928 | powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
| User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
 | |||||||||||||||
| 2192 | C:\WINDOWS\system32\cmd.exe /c "tasklist" | C:\Windows\System32\cmd.exe | — | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | |||||||||||
| User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
 | |||||||||||||||
| (PID) Process: | (3420) TiWorker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing | 
| Operation: | write | Name: | SessionIdHigh | 
| Value: 31213210 | |||
| (PID) Process: | (3420) TiWorker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing | 
| Operation: | write | Name: | SessionIdLow | 
| Value: | |||
| PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7600 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | C:\Users\admin\AppData\Local\Temp\_MEI76002\_cffi_backend.cp310-win_amd64.pyd | executable | |
| MD5:7727212E7BDBF63B1A39FB7FAAD24265 | SHA256:B0116303E1E903D6EB02A69D05879F38AF1640813F4B110CB733FFFF6E4E985C | |||
| 7600 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | C:\Users\admin\AppData\Local\Temp\_MEI76002\_decimal.pyd | executable | |
| MD5:B7F498DA5AEC35140A6D928A8F792911 | SHA256:B15F0DC3CE6955336162C9428077DCEDFA1C52E60296251521819F3239C26EE8 | |||
| 7600 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | C:\Users\admin\AppData\Local\Temp\_MEI76002\VCRUNTIME140.dll | executable | |
| MD5:11D9AC94E8CB17BD23DEA89F8E757F18 | SHA256:E1D6F78A72836EA120BD27A33AE89CBDC3F3CA7D9D0231AAA3AAC91996D2FA4E | |||
| 7600 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | C:\Users\admin\AppData\Local\Temp\_MEI76002\_asyncio.pyd | executable | |
| MD5:480D3F4496E16D54BB5313D206164134 | SHA256:568FB5C3D9B170CE1081AD12818B9A12F44AB1577449425A3EF30C2EFBEE613D | |||
| 7600 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | C:\Users\admin\AppData\Local\Temp\_MEI76002\_socket.pyd | executable | |
| MD5:F675CF3CDD836CACFAB9C89AB9F97108 | SHA256:BB82A23D8DC6BF4C9AEB91D3F3BEF069276AE3B14EECA100B988B85DD21E2DD3 | |||
| 7600 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | C:\Users\admin\AppData\Local\Temp\_MEI76002\_ctypes.pyd | executable | |
| MD5:B1F12F4BFC0BD49A6646A0786BC5BC00 | SHA256:1FE61645ED626FC1DEC56B2E90E8E551066A7FF86EDBD67B41CB92211358F3D7 | |||
| 7600 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | C:\Users\admin\AppData\Local\Temp\_MEI76002\_multiprocessing.pyd | executable | |
| MD5:28F6FCC0B7BB10A45FF1370C9E1B9561 | SHA256:6DD33D49554EE61490725EA2C9129C15544791AB7A65FB523CC9B4F88D38744B | |||
| 7600 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | C:\Users\admin\AppData\Local\Temp\_MEI76002\_overlapped.pyd | executable | |
| MD5:745706AB482FE9C9F92383292F121072 | SHA256:4D98E7D1B74BD209F8C66E1A276F60B470F6A5D6F519F76A91EB75BE157A903D | |||
| 7600 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | C:\Users\admin\AppData\Local\Temp\_MEI76002\_ssl.pyd | executable | |
| MD5:2EDF5C4E534A45966A68033E7395F40D | SHA256:7ABC2B326F5B7C3011827EB7A5A4D896CC6B2619246826519B3F57D2BB99D3BD | |||
| 7600 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | C:\Users\admin\AppData\Local\Temp\_MEI76002\attrs-25.3.0.dist-info\INSTALLER | text | |
| MD5:365C9BFEB7D89244F2CE01C1DE44CB85 | SHA256:CEEBAE7B8927A3227E5303CF5E0F1F7B34BB542AD7250AC03FBCDE36EC2F1508 | |||
| PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation | 
|---|---|---|---|---|---|---|---|---|---|
| 7620 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json | unknown |  —  | — | whitelisted | 
| 6980 | svchost.exe | GET | 200 | 23.63.118.230:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown |  —  | — | whitelisted | 
| 6364 | backgroundTaskHost.exe | GET | 200 | 23.63.118.230:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D | unknown |  —  | — | whitelisted | 
| 7916 | SIHClient.exe | GET | 200 | 23.59.18.102:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl | unknown |  —  | — | whitelisted | 
| 7916 | SIHClient.exe | GET | 200 | 23.59.18.102:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.3.crl | unknown |  —  | — | whitelisted | 
| 7916 | SIHClient.exe | GET | 200 | 23.59.18.102:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.3.crl | unknown |  —  | — | whitelisted | 
| PID | Process | IP | Domain | ASN | CN | Reputation | 
|---|---|---|---|---|---|---|
| — | — | 192.168.100.255:137 | — | — | — | whitelisted | 
| 6980 | svchost.exe | 40.126.31.1:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted | 
| 5596 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted | 
| 4 | System | 192.168.100.255:138 | — | — | — | whitelisted | 
| 7620 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | 208.95.112.1:80 | ip-api.com | TUT-AS | US | whitelisted | 
| 7620 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | 162.159.128.233:443 | discord.com | CLOUDFLARENET | — | whitelisted | 
| 7620 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | 162.159.137.232:443 | discord.com | CLOUDFLARENET | — | whitelisted | 
| 6980 | svchost.exe | 23.63.118.230:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted | 
| 3440 | svchost.exe | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted | 
| 7620 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | 45.112.123.126:443 | api.gofile.io | AMAZON-02 | SG | whitelisted | 
| Domain | IP | Reputation | 
|---|---|---|
| login.live.com | 
 | whitelisted | 
| settings-win.data.microsoft.com | 
 | whitelisted | 
| google.com | 
 | whitelisted | 
| ip-api.com | 
 | whitelisted | 
| discord.com | 
 | whitelisted | 
| ocsp.digicert.com | 
 | whitelisted | 
| client.wns.windows.com | 
 | whitelisted | 
| api.gofile.io | 
 | unknown | 
| store1.gofile.io | 
 | unknown | 
| arc.msn.com | 
 | whitelisted | 
| PID | Process | Class | Message | 
|---|---|---|---|
| 2276 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) | 
| 2276 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) | 
| 2276 | svchost.exe | Misc activity | ET INFO Observed Discord Domain in DNS Lookup (discord .com) | 
| 2276 | svchost.exe | Misc activity | ET INFO Discord Chat Service Domain in DNS Lookup (discord .com) | 
| 7620 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | Misc activity | ET INFO Observed Discord Domain (discord .com in TLS SNI) | 
| 7620 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | Misc activity | ET INFO Observed Discord Service Domain (discord .com) in TLS SNI | 
| 7620 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | Misc activity | ET INFO Observed Discord Service Domain (discord .com) in TLS SNI | 
| 7620 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | Misc activity | ET INFO Observed Discord Domain (discord .com in TLS SNI) | 
| 2276 | svchost.exe | Potentially Bad Traffic | ET FILE_SHARING Online File Storage Domain in DNS Lookup (gofile .io) | 
| 7620 | 98c68f7c0c4715f6184cc5b1634acf527dab71a99ee371be98fdec37339ecf39.exe | Misc activity | ET FILE_SHARING File Sharing Related Domain in TLS SNI (gofile .io) |