File name:

4363463463464363463463463.exe.zip

Full analysis: https://app.any.run/tasks/65460073-67e5-43ef-bf57-573cf2699efa
Verdict: Malicious activity
Threats:

Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.

Analysis date: June 26, 2025, 21:49:56
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
loader
github
stealc
stealer
auto
lumma
telegram
quasarrat
njrat
hausbomber
rat
bladabindi
asyncrat
rhadamanthys
metasploit
backdoor
generic
autoit
formbook
evasion
quasar
xworm
remote
irc
darkcomet
possible-phishing
pastebin
snake
keylogger
python
masslogger
coinminer
miner
xloader
reddriver
shellcode
remcos
smtp
purehvnc
netreactor
amadey
botnet
loki
ransomware
Indicators:
MIME: application/zip
File info: Zip archive data, at least v5.1 to extract, compression method=AES Encrypted
MD5:

4C712F3A263A9EABB939F27B8CCDDF6B

SHA1:

A3646B75E9F955CD0225BD5E003F9BB4AFEC4E7A

SHA256:

C49C08555180E8DD1900506836FF516E8E52185F56D7487C28B0FC9FB8282D5E

SSDEEP:

96:60OMpWP3p5peb3lugL62tDCOVUkAtQ+hEK7Jap4EYumcwKvqHW84XAsFyyOzqWnt:ejNAVuyDY4UXtQ+qQ5KvJAsFcTt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 3540)
    • LUMMA has been found (auto)

      • 4363463463464363463463463.exe (PID: 3672)
      • 4363463463464363463463463.exe (PID: 3672)
      • 4363463463464363463463463.exe (PID: 3672)
      • powershell.exe (PID: 7172)
      • powershell.exe (PID: 3564)
    • STEALER has been found (auto)

      • 4363463463464363463463463.exe (PID: 3672)
    • STEALC mutex has been found

      • vtoroy.exe (PID: 1944)
    • STEALC has been detected

      • vtoroy.exe (PID: 1944)
    • QUASARRAT has been found (auto)

      • Sentil.exe (PID: 1056)
      • RuntimeBroker.exe (PID: 7252)
      • installer.exe (PID: 7396)
      • discord.exe (PID: 7648)
    • Uses Task Scheduler to autorun other applications

      • Sentil.exe (PID: 1056)
      • Ul.pif (PID: 6348)
      • Client-built.exe (PID: 7304)
      • installer.exe (PID: 7396)
      • WindowsSecurityCheckWSC.secureapp.exe (PID: 7480)
      • Client.exe (PID: 7740)
      • Client-built2.exe (PID: 7728)
      • discord.exe (PID: 7648)
      • Client.exe (PID: 9576)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2200)
      • MSBuild.exe (PID: 2272)
      • MSBuild.exe (PID: 7460)
      • MSBuild.exe (PID: 10424)
      • ec5013ad46.exe (PID: 6496)
    • Connects to the CnC server

      • svchost.exe (PID: 2200)
      • xblkpfZ8Y4.exe (PID: 7208)
      • explorer.exe (PID: 4772)
      • dumer.exe (PID: 6304)
    • Actions looks like stealing of personal data

      • MSBuild.exe (PID: 2272)
      • bryjf.exe (PID: 2124)
      • MSBuild.exe (PID: 7460)
      • RegSvcs.exe (PID: 7764)
      • ceng.exe (PID: 7864)
      • MSBuild.exe (PID: 10424)
      • ec5013ad46.exe (PID: 6496)
    • LUMMA mutex has been found

      • MSBuild.exe (PID: 2272)
      • MSBuild.exe (PID: 7460)
      • MSBuild.exe (PID: 10424)
      • ec5013ad46.exe (PID: 6496)
    • Steals credentials from Web Browsers

      • MSBuild.exe (PID: 2272)
      • MSBuild.exe (PID: 7460)
      • RegSvcs.exe (PID: 7764)
      • MSBuild.exe (PID: 10424)
      • ec5013ad46.exe (PID: 6496)
    • HAUSBOMBER has been detected (YARA)

      • 4363463463464363463463463.exe (PID: 3672)
    • NJRAT mutex has been found

      • Fast%20Download.exe (PID: 4700)
    • QUASAR has been detected (YARA)

      • Client1.exe (PID: 4512)
    • LUMMA has been detected (YARA)

      • MSBuild.exe (PID: 2272)
    • Executing a file with an untrusted certificate

      • brbotnet.exe (PID: 1944)
      • LukeJazz.exe (PID: 6700)
      • PingInfoView.exe (PID: 9948)
      • tomcat8.exe (PID: 684)
      • 691d9b712d.exe (PID: 9056)
    • Create files in the Startup directory

      • Fast%20Download.exe (PID: 4700)
      • cmd.exe (PID: 5008)
      • svchost.exe (PID: 4040)
    • GENERIC has been found (auto)

      • 4363463463464363463463463.exe (PID: 3672)
      • 4363463463464363463463463.exe (PID: 3672)
      • Tu_Inspector32.exe (PID: 9828)
    • RAT has been found (auto)

      • 4363463463464363463463463.exe (PID: 3672)
      • windows.exe (PID: 6420)
    • ASYNCRAT has been detected (MUTEX)

      • windows.exe (PID: 6420)
      • system.exe (PID: 6516)
    • RHADAMANTHYS has been found (auto)

      • 4363463463464363463463463.exe (PID: 3672)
    • FORMBOOK has been found (auto)

      • 4363463463464363463463463.exe (PID: 3672)
    • Changes powershell execution policy (Bypass)

      • bryjf.exe (PID: 2124)
      • svchost.exe (PID: 4040)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 7156)
      • powershell.exe (PID: 6376)
      • powershell.exe (PID: 5724)
      • powershell.exe (PID: 2160)
      • powershell.exe (PID: 6700)
    • Antivirus name has been found in the command line (generic signature)

      • findstr.exe (PID: 2276)
      • findstr.exe (PID: 1356)
    • METASPLOIT has been found (auto)

      • 4363463463464363463463463.exe (PID: 3672)
    • METASPLOIT has been detected (SURICATA)

      • 4363463463464363463463463.exe (PID: 3672)
    • NJRAT has been detected (YARA)

      • Fast%20Download.exe (PID: 4700)
    • FORMBOOK has been detected

      • explorer.exe (PID: 868)
      • explorer.exe (PID: 4772)
      • explorer.exe (PID: 3936)
    • Changes Windows Defender settings

      • svchost.exe (PID: 4040)
    • Adds path to the Windows Defender exclusion list

      • svchost.exe (PID: 4040)
    • Adds process to the Windows Defender exclusion list

      • svchost.exe (PID: 4040)
    • Uses Task Scheduler to run other applications

      • svchost.exe (PID: 4040)
      • Ul.pif (PID: 6348)
    • XWORM has been detected (YARA)

      • XClient.exe (PID: 5720)
      • svchost.exe (PID: 4040)
    • Changes the autorun value in the registry

      • svchost.exe (PID: 4040)
      • Ul.pif (PID: 6348)
      • ctfmon.exe (PID: 2804)
      • Dark_Brout_ncrypt.exe (PID: 7076)
      • msdcsc.exe (PID: 2716)
      • explorer.exe (PID: 868)
      • klass.exe (PID: 9480)
      • kkm.exe (PID: 9384)
      • KKMAgent.exe (PID: 8672)
      • dumer.exe (PID: 6304)
    • XWORM has been detected

      • svchost.exe (PID: 4040)
    • ASYNCRAT has been detected (SURICATA)

      • bryjf.exe (PID: 2124)
    • IRC has been detected (SURICATA)

      • ctfmon.exe (PID: 1520)
    • Changes the login/logoff helper path in the registry

      • Dark_Brout_ncrypt.exe (PID: 7076)
    • UAC/LUA settings modification

      • msdcsc.exe (PID: 2716)
    • Disables Windows firewall

      • msdcsc.exe (PID: 2716)
    • Changes firewall settings

      • msdcsc.exe (PID: 2716)
    • DARKCOMET mutex has been found

      • msdcsc.exe (PID: 2716)
      • notepad.exe (PID: 2536)
    • Changes Security Center notification settings

      • msdcsc.exe (PID: 2716)
    • FORMBOOK has been detected (YARA)

      • explorer.exe (PID: 868)
    • RHADAMANTHYS has been detected (YARA)

      • fontdrvhost.exe (PID: 3652)
    • QUASAR has been found (auto)

      • 4363463463464363463463463.exe (PID: 3672)
      • Client-built.exe (PID: 7304)
    • PUREHVNC has been detected (YARA)

      • bryjf.exe (PID: 2124)
    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 7172)
      • powershell.exe (PID: 3564)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 7172)
      • powershell.exe (PID: 3564)
    • SNAKEKEYLOGGER has been detected (SURICATA)

      • RegSvcs.exe (PID: 7764)
    • MINER has been detected (SURICATA)

      • svchost.exe (PID: 2200)
      • xblkpfZ8Y4.exe (PID: 7208)
    • ASYNCRAT has been detected (YARA)

      • system.exe (PID: 6516)
    • METASPLOIT has been detected (YARA)

      • award.pdf.exe (PID: 6716)
    • FORMBOOK has been detected (SURICATA)

      • explorer.exe (PID: 4772)
    • Creates or modifies Windows services

      • svchocl.exe (PID: 10356)
    • REDDRIVER has been detected (SURICATA)

      • svchost.exe (PID: 10620)
    • REMCOS has been detected (SURICATA)

      • Host.exe (PID: 9252)
    • REMCOS mutex has been found

      • prueba.exe (PID: 4808)
    • REMCOS has been detected

      • prueba.exe (PID: 4808)
    • AMADEY mutex has been found

      • random.exe (PID: 11004)
      • dumer.exe (PID: 6304)
      • D87N7LBIJLVVU4R0MH.exe (PID: 8292)
      • dumer.exe (PID: 11816)
    • AMADEY has been detected (SURICATA)

      • dumer.exe (PID: 6304)
    • LOKI has been found (auto)

      • 4363463463464363463463463.exe (PID: 3672)
    • Starts Visual C# compiler

      • qwalphaqw.exe (PID: 9184)
    • Application was injected by another process

      • control.exe (PID: 9780)
      • control.exe (PID: 9684)
    • Runs injected code in another process

      • oSOnryg.exe (PID: 10328)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • 4363463463464363463463463.exe (PID: 3672)
      • RuntimeBroker.exe (PID: 7252)
      • powershell.exe (PID: 7172)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7532)
      • darts-wled.exe (PID: 7948)
      • kkm.exe (PID: 9384)
      • powershell.exe (PID: 3564)
      • dumer.exe (PID: 6304)
      • tktVLbc.tmp (PID: 7496)
      • Tu_Inspector32.exe (PID: 9572)
    • Reads security settings of Internet Explorer

      • 4363463463464363463463463.exe (PID: 3672)
      • Client1.exe (PID: 4512)
      • QQHelper_1540.exe (PID: 4156)
      • jd124.exe (PID: 7004)
      • JUpdate.exe (PID: 1212)
      • x210.exe (PID: 1156)
      • windows.exe (PID: 6420)
      • LukeJazz.exe (PID: 6700)
      • svchost.exe (PID: 4040)
      • ShellExperienceHost.exe (PID: 4580)
      • Dark_Brout_ncrypt.exe (PID: 7076)
      • Assiah.exe (PID: 6896)
      • TempSpoofer.exe (PID: 5848)
      • RuntimeBroker.exe (PID: 7344)
      • RuntimeBroker.exe (PID: 7152)
      • bmw_v1.7.exe (PID: 7300)
      • RuntimeBroker.exe (PID: 5288)
      • RuntimeBroker.exe (PID: 4808)
      • RuntimeBroker.exe (PID: 8256)
      • RuntimeBroker.exe (PID: 9512)
      • RuntimeBroker.exe (PID: 10432)
      • svchocl.exe (PID: 10356)
      • RuntimeBroker.exe (PID: 10864)
      • KKMAgent.exe (PID: 8672)
      • RuntimeBroker.exe (PID: 2292)
      • Monotone.exe (PID: 8012)
      • RuntimeBroker.exe (PID: 12216)
      • Host.exe (PID: 9252)
      • RuntimeBroker.exe (PID: 10352)
      • random.exe (PID: 11004)
      • dumer.exe (PID: 6304)
      • RuntimeBroker.exe (PID: 2140)
      • Hl2dm_Updater.exe (PID: 1588)
      • Hl2dm_Updater.exe (PID: 11908)
      • RuntimeBroker.exe (PID: 9092)
      • RuntimeBroker.exe (PID: 10220)
      • sFFG7Wg.exe (PID: 11412)
    • Windows Defender mutex has been found

      • vtoroy.exe (PID: 1944)
    • Process requests binary or script from the Internet

      • 4363463463464363463463463.exe (PID: 3672)
      • jd124.exe (PID: 7004)
      • JUpdate.exe (PID: 1212)
      • %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe (PID: 6268)
      • curl.exe (PID: 8124)
      • dumer.exe (PID: 6304)
      • Hl2dm_Updater.exe (PID: 1588)
      • Hl2dm_Updater.exe (PID: 11908)
      • ec5013ad46.exe (PID: 6496)
    • Executable content was dropped or overwritten

      • 4363463463464363463463463.exe (PID: 3672)
      • Sentil.exe (PID: 1056)
      • jd124.exe (PID: 7004)
      • JUpdate.exe (PID: 1212)
      • x210.exe (PID: 1156)
      • windows.exe (PID: 6420)
      • cmd.exe (PID: 4580)
      • Ul.pif (PID: 4216)
      • bryjf.exe (PID: 2124)
      • svchost.exe (PID: 4040)
      • Ul.pif (PID: 6348)
      • ctfmon.exe (PID: 2804)
      • Dark_Brout_ncrypt.exe (PID: 7076)
      • Client-built.exe (PID: 7304)
      • RuntimeBroker.exe (PID: 7252)
      • installer.exe (PID: 7396)
      • powershell.exe (PID: 7172)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7532)
      • HDDrive1095_XinAnPlug3030_20230619_inno.exe (PID: 32)
      • darts-wled.exe (PID: 7948)
      • Client-built2.exe (PID: 7728)
      • explorer.exe (PID: 868)
      • file.exe (PID: 8488)
      • kkm.exe (PID: 9384)
      • Ganja3.exe (PID: 9460)
      • tb.exe (PID: 9912)
      • svchocl.exe (PID: 10356)
      • discord.exe (PID: 7648)
      • powershell.exe (PID: 3564)
      • %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe (PID: 6268)
      • random.exe (PID: 11004)
      • dumer.exe (PID: 6304)
      • Hl2dm_Updater.exe (PID: 1588)
      • Hl2dm_Updater.exe (PID: 11908)
      • ec5013ad46.exe (PID: 6496)
      • tktVLbc.tmp (PID: 7496)
      • tktVLbc.exe (PID: 7872)
      • Tu_Inspector32.exe (PID: 9828)
      • Tu_Inspector32.exe (PID: 9572)
    • Connects to the server without a host name

      • 4363463463464363463463463.exe (PID: 3672)
      • dumer.exe (PID: 6304)
      • control.exe (PID: 9684)
      • ec5013ad46.exe (PID: 6496)
    • Starts itself from another location

      • Sentil.exe (PID: 1056)
      • ctfmon.exe (PID: 2804)
      • Dark_Brout_ncrypt.exe (PID: 7076)
      • RuntimeBroker.exe (PID: 7252)
      • Client-built.exe (PID: 7304)
      • installer.exe (PID: 7396)
      • Client-built2.exe (PID: 7728)
      • Ganja3.exe (PID: 9460)
      • discord.exe (PID: 7648)
      • random.exe (PID: 11004)
      • Tu_Inspector32.exe (PID: 9572)
    • Starts a Microsoft application from unusual location

      • neploskiy_crypted_LAB.exe (PID: 6472)
      • RuntimeBroker.exe (PID: 7252)
      • RuntimeBroker.exe (PID: 7344)
      • RuntimeBroker.exe (PID: 7152)
      • RuntimeBroker.exe (PID: 5288)
      • RuntimeBroker.exe (PID: 4808)
      • RuntimeBroker.exe (PID: 8256)
      • RuntimeBroker.exe (PID: 9512)
      • RuntimeBroker.exe (PID: 10432)
      • tb.exe (PID: 9912)
      • RuntimeBroker.exe (PID: 10864)
      • RuntimeBroker.exe (PID: 2292)
      • RuntimeBroker.exe (PID: 12216)
      • RuntimeBroker.exe (PID: 10352)
      • RuntimeBroker.exe (PID: 2140)
      • RuntimeBroker.exe (PID: 9092)
      • oSOnryg.exe (PID: 10328)
      • RuntimeBroker.exe (PID: 10220)
    • Potential Corporate Privacy Violation

      • 4363463463464363463463463.exe (PID: 3672)
      • jd124.exe (PID: 7004)
      • JUpdate.exe (PID: 1212)
      • ctfmon.exe (PID: 1520)
      • svchost.exe (PID: 2200)
      • xblkpfZ8Y4.exe (PID: 7208)
      • dumer.exe (PID: 6304)
      • Hl2dm_Updater.exe (PID: 1588)
      • ec5013ad46.exe (PID: 6496)
      • Hl2dm_Updater.exe (PID: 11908)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2200)
      • MSBuild.exe (PID: 2272)
      • bryjf.exe (PID: 2124)
      • MSBuild.exe (PID: 7460)
      • explorer.exe (PID: 4772)
      • Host.exe (PID: 9252)
      • MSBuild.exe (PID: 10424)
      • dumer.exe (PID: 6304)
      • ec5013ad46.exe (PID: 6496)
    • Connects to unusual port

      • Client1.exe (PID: 4512)
      • Fast%20Download.exe (PID: 4700)
      • XClient.exe (PID: 5720)
      • 4363463463464363463463463.exe (PID: 3672)
      • fontdrvhost.exe (PID: 3652)
      • bryjf.exe (PID: 2124)
      • system.exe (PID: 6516)
      • svchost.exe (PID: 4040)
      • Ul.pif (PID: 6348)
      • ctfmon.exe (PID: 1520)
      • msf.exe (PID: 5684)
      • Client.exe (PID: 7740)
      • Client.exe (PID: 7632)
      • WindowsSecurityCheckWSC.secureapp.exe (PID: 7480)
      • explorer.exe (PID: 868)
      • tb.exe (PID: 9912)
      • svchocl.exe (PID: 10356)
      • svchost.exe (PID: 10620)
      • tcp_windows_amd64.exe (PID: 7348)
      • RegAsm.exe (PID: 4052)
      • prueba.exe (PID: 4808)
      • Host.exe (PID: 9252)
      • Client.exe (PID: 9576)
      • %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe (PID: 6268)
      • curl.exe (PID: 8124)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • MSBuild.exe (PID: 2272)
      • MSBuild.exe (PID: 7460)
      • RegSvcs.exe (PID: 7764)
      • MSBuild.exe (PID: 10424)
      • MSBuild.exe (PID: 9068)
    • Creates file in the systems drive root

      • explorer.exe (PID: 4772)
    • Searches for installed software

      • MSBuild.exe (PID: 2272)
      • MSBuild.exe (PID: 7460)
      • MSBuild.exe (PID: 10424)
      • ec5013ad46.exe (PID: 6496)
    • Uses ATTRIB.EXE to modify file attributes

      • Fast%20Download.exe (PID: 4700)
      • cmd.exe (PID: 1128)
      • cmd.exe (PID: 1948)
    • There is functionality for taking screenshot (YARA)

      • MSBuild.exe (PID: 2272)
      • Client1.exe (PID: 4512)
      • explorer.exe (PID: 868)
    • Drops a system driver (possible attempt to evade defenses)

      • x210.exe (PID: 1156)
    • Starts CMD.EXE for commands execution

      • rarx210.exe (PID: 2732)
      • windows.exe (PID: 6420)
      • LukeJazz.exe (PID: 6700)
      • cmd.exe (PID: 4580)
      • explorer.exe (PID: 868)
      • explorer.exe (PID: 4772)
      • Dark_Brout_ncrypt.exe (PID: 7076)
      • RuntimeBroker.exe (PID: 7344)
      • RuntimeBroker.exe (PID: 7152)
      • RuntimeBroker.exe (PID: 5288)
      • RuntimeBroker.exe (PID: 4808)
      • RuntimeBroker.exe (PID: 8256)
      • RuntimeBroker.exe (PID: 9512)
      • tb.exe (PID: 9912)
      • RuntimeBroker.exe (PID: 10432)
      • svchocl.exe (PID: 10356)
      • RuntimeBroker.exe (PID: 10864)
      • RuntimeBroker.exe (PID: 2292)
      • RuntimeBroker.exe (PID: 12216)
      • RuntimeBroker.exe (PID: 10352)
      • RuntimeBroker.exe (PID: 2140)
      • patcher.exe (PID: 1688)
      • RuntimeBroker.exe (PID: 9092)
      • RuntimeBroker.exe (PID: 10220)
    • The process creates files with name similar to system file names

      • windows.exe (PID: 6420)
      • 4363463463464363463463463.exe (PID: 3672)
      • svchost.exe (PID: 4040)
      • ctfmon.exe (PID: 2804)
      • file.exe (PID: 8488)
    • Executing commands from a ".bat" file

      • windows.exe (PID: 6420)
      • RuntimeBroker.exe (PID: 7344)
      • RuntimeBroker.exe (PID: 7152)
      • RuntimeBroker.exe (PID: 5288)
      • RuntimeBroker.exe (PID: 4808)
      • RuntimeBroker.exe (PID: 8256)
      • RuntimeBroker.exe (PID: 9512)
      • tb.exe (PID: 9912)
      • RuntimeBroker.exe (PID: 10432)
      • RuntimeBroker.exe (PID: 10864)
      • RuntimeBroker.exe (PID: 2292)
      • RuntimeBroker.exe (PID: 12216)
      • RuntimeBroker.exe (PID: 10352)
      • RuntimeBroker.exe (PID: 2140)
      • patcher.exe (PID: 1688)
      • RuntimeBroker.exe (PID: 9092)
      • RuntimeBroker.exe (PID: 10220)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 5708)
      • cmd.exe (PID: 4580)
    • Starts POWERSHELL.EXE for commands execution

      • bryjf.exe (PID: 2124)
      • svchost.exe (PID: 4040)
      • TempSpoofer.exe (PID: 5848)
      • powershell.exe (PID: 7172)
      • Monotone.exe (PID: 8012)
      • powershell.exe (PID: 3564)
    • Executing commands from ".cmd" file

      • LukeJazz.exe (PID: 6700)
    • Base64-obfuscated command line is found

      • bryjf.exe (PID: 2124)
      • TempSpoofer.exe (PID: 5848)
      • Monotone.exe (PID: 8012)
    • The process bypasses the loading of PowerShell profile settings

      • bryjf.exe (PID: 2124)
    • BASE64 encoded PowerShell command has been detected

      • bryjf.exe (PID: 2124)
      • TempSpoofer.exe (PID: 5848)
      • Monotone.exe (PID: 8012)
    • The process checks if it is being run in the virtual environment

      • fontdrvhost.exe (PID: 3652)
    • The executable file from the user directory is run by the CMD process

      • system.exe (PID: 6516)
      • Ul.pif (PID: 4216)
      • RuntimeBroker.exe (PID: 7152)
      • RuntimeBroker.exe (PID: 5288)
      • RuntimeBroker.exe (PID: 4808)
      • RuntimeBroker.exe (PID: 8256)
      • RuntimeBroker.exe (PID: 9512)
      • RuntimeBroker.exe (PID: 10432)
      • RuntimeBroker.exe (PID: 10864)
      • RuntimeBroker.exe (PID: 2292)
      • RuntimeBroker.exe (PID: 12216)
      • RuntimeBroker.exe (PID: 10352)
      • RuntimeBroker.exe (PID: 2140)
      • RuntimeBroker.exe (PID: 9092)
      • RuntimeBroker.exe (PID: 10220)
    • Application launched itself

      • TORRENTOLD-1.exe (PID: 4216)
      • cmd.exe (PID: 4580)
      • powershell.exe (PID: 7172)
      • darts-wled.exe (PID: 7948)
      • powershell.exe (PID: 3564)
      • control.exe (PID: 9780)
    • Get information on the list of running processes

      • cmd.exe (PID: 4580)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 4580)
    • Starts application with an unusual extension

      • cmd.exe (PID: 4580)
      • explorer.exe (PID: 4772)
      • cmd.exe (PID: 7640)
      • cmd.exe (PID: 7540)
      • cmd.exe (PID: 6528)
      • cmd.exe (PID: 7792)
      • cmd.exe (PID: 8344)
      • cmd.exe (PID: 9664)
      • cmd.exe (PID: 10512)
      • cmd.exe (PID: 10968)
      • cmd.exe (PID: 7712)
      • cmd.exe (PID: 11892)
      • cmd.exe (PID: 10304)
      • cmd.exe (PID: 9220)
      • cmd.exe (PID: 8836)
      • cmd.exe (PID: 9400)
    • Drops a file with a rarely used extension (PIF)

      • cmd.exe (PID: 4580)
      • Ul.pif (PID: 4216)
    • Suspicious file concatenation

      • cmd.exe (PID: 304)
    • Reads Internet Explorer settings

      • jd124.exe (PID: 4084)
      • Hl2dm_Updater.exe (PID: 11908)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 4580)
      • explorer.exe (PID: 4772)
    • Script adds exclusion path to Windows Defender

      • svchost.exe (PID: 4040)
    • Reads the date of Windows installation

      • svchost.exe (PID: 4040)
      • RuntimeBroker.exe (PID: 7344)
      • RuntimeBroker.exe (PID: 7152)
      • RuntimeBroker.exe (PID: 5288)
      • RuntimeBroker.exe (PID: 4808)
      • RuntimeBroker.exe (PID: 8256)
      • RuntimeBroker.exe (PID: 9512)
      • svchocl.exe (PID: 10356)
      • RuntimeBroker.exe (PID: 10432)
      • RuntimeBroker.exe (PID: 10864)
      • RuntimeBroker.exe (PID: 2292)
      • RuntimeBroker.exe (PID: 12216)
      • RuntimeBroker.exe (PID: 10352)
      • RuntimeBroker.exe (PID: 2140)
      • RuntimeBroker.exe (PID: 9092)
      • RuntimeBroker.exe (PID: 10220)
    • Checks for external IP

      • svchost.exe (PID: 4040)
      • svchost.exe (PID: 2200)
      • RegSvcs.exe (PID: 7764)
    • Script adds exclusion process to Windows Defender

      • svchost.exe (PID: 4040)
    • The process executes via Task Scheduler

      • svchost.exe (PID: 2212)
      • svchost.exe (PID: 7220)
      • svchost.exe (PID: 8108)
      • svchost.exe (PID: 11372)
      • dumer.exe (PID: 11816)
    • Start notepad (likely ransomware note)

      • Dark_Brout_ncrypt.exe (PID: 7076)
      • msdcsc.exe (PID: 2716)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 7640)
      • cmd.exe (PID: 7540)
      • cmd.exe (PID: 6528)
      • cmd.exe (PID: 7792)
      • cmd.exe (PID: 8344)
      • cmd.exe (PID: 9664)
      • cmd.exe (PID: 9968)
      • cmd.exe (PID: 10512)
      • cmd.exe (PID: 10968)
      • cmd.exe (PID: 7712)
      • cmd.exe (PID: 11892)
      • cmd.exe (PID: 10304)
      • cmd.exe (PID: 9220)
      • cmd.exe (PID: 8836)
      • cmd.exe (PID: 9400)
    • Multiple wallet extension IDs have been found

      • bryjf.exe (PID: 2124)
    • Reads the Windows owner or organization settings

      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7532)
      • tktVLbc.tmp (PID: 7496)
    • Loads Python modules

      • darts-wled.exe (PID: 4880)
    • The process drops C-runtime libraries

      • darts-wled.exe (PID: 7948)
      • tktVLbc.tmp (PID: 7496)
      • Tu_Inspector32.exe (PID: 9572)
    • Process drops python dynamic module

      • darts-wled.exe (PID: 7948)
    • The process verifies whether the antivirus software is installed

      • RegSvcs.exe (PID: 7764)
    • Crypto Currency Mining Activity Detected

      • svchost.exe (PID: 2200)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • file.exe (PID: 8488)
    • Creates a software uninstall entry

      • kkm.exe (PID: 9384)
    • Executes application which crashes

      • ntladlklthawd.exe (PID: 9552)
      • RedLineStealer.exe (PID: 2128)
    • Hides command output

      • cmd.exe (PID: 10676)
    • Connects to SMTP port

      • ceng.exe (PID: 7864)
    • Reads the BIOS version

      • random.exe (PID: 11004)
      • dumer.exe (PID: 6304)
      • ec5013ad46.exe (PID: 6496)
      • dumer.exe (PID: 11816)
    • Reads Microsoft Outlook installation path

      • Hl2dm_Updater.exe (PID: 11908)
  • INFO

    • Checks supported languages

      • 4363463463464363463463463.exe (PID: 3672)
      • vtoroy.exe (PID: 1944)
      • Client1.exe (PID: 4512)
      • MSBuild.exe (PID: 2272)
      • neploskiy_crypted_LAB.exe (PID: 6472)
      • Sentil.exe (PID: 1056)
      • QQHelper_1540.exe (PID: 4156)
      • Fast%20Download.exe (PID: 4700)
      • mimilove.exe (PID: 6780)
      • brbotnet.exe (PID: 1944)
      • jd124.exe (PID: 7004)
      • XClient.exe (PID: 5720)
      • JUpdate.exe (PID: 1212)
      • windows.exe (PID: 6420)
      • x210.exe (PID: 1156)
      • jd124.exe (PID: 4084)
      • rarx210.exe (PID: 2732)
      • zeropersca.exe (PID: 5716)
      • nbin22.exe (PID: 2348)
      • LukeJazz.exe (PID: 6700)
      • bryjf.exe (PID: 2124)
      • TORRENTOLD-1.exe (PID: 4216)
      • svchost.exe (PID: 4040)
      • TORRENTOLD-1.exe (PID: 6768)
      • system.exe (PID: 6516)
      • award.pdf.exe (PID: 6716)
      • Ul.pif (PID: 4216)
      • Ul.pif (PID: 6348)
      • YHY_Setup.exe (PID: 4192)
      • ctfmon.exe (PID: 2804)
      • ShellExperienceHost.exe (PID: 4580)
      • ctfmon.exe (PID: 1520)
      • msf.exe (PID: 5684)
      • Dark_Brout_ncrypt.exe (PID: 7076)
      • svchost.exe (PID: 2212)
      • msdcsc.exe (PID: 2716)
      • nircmd.exe (PID: 6876)
      • Assiah.exe (PID: 6896)
      • rickroll.exe (PID: 4584)
      • TempSpoofer.exe (PID: 5848)
      • pm3100.exe (PID: 3588)
      • mimikatz.exe (PID: 7076)
      • RuntimeBroker.exe (PID: 7252)
      • Client-built.exe (PID: 7304)
      • RuntimeBroker.exe (PID: 7344)
      • installer.exe (PID: 7396)
      • WindowsSecurityCheckWSC.secureapp.exe (PID: 7480)
      • chcp.com (PID: 7764)
      • Client.exe (PID: 7740)
      • 4l5b2jwj.o5y0.exe (PID: 8152)
      • HDDrive1095_XinAnPlug3030_20230619_inno.exe (PID: 32)
      • MSBuild.exe (PID: 7460)
      • RuntimeBroker.exe (PID: 7152)
      • chcp.com (PID: 2168)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7532)
      • catee.exe (PID: 7772)
      • RegSvcs.exe (PID: 7764)
      • darts-wled.exe (PID: 7948)
      • RuntimeBroker.exe (PID: 5288)
      • darts-wled.exe (PID: 4880)
      • chcp.com (PID: 7060)
      • bmw_v1.7.exe (PID: 7300)
      • Client-built2.exe (PID: 7728)
      • Client.exe (PID: 7632)
      • Ganja168.exe (PID: 2276)
      • RuntimeBroker.exe (PID: 4808)
      • xblkpfZ8Y4.exe (PID: 7208)
      • chcp.com (PID: 2276)
      • identity_helper.exe (PID: 7360)
      • RuntimeBroker.exe (PID: 8256)
      • svchost.exe (PID: 7220)
      • chcp.com (PID: 8400)
      • file.exe (PID: 8488)
      • identity_helper.exe (PID: 9276)
      • kkm.exe (PID: 9384)
      • Ganja3.exe (PID: 9460)
      • klass.exe (PID: 9480)
      • RuntimeBroker.exe (PID: 9512)
      • ntladlklthawd.exe (PID: 9552)
      • chcp.com (PID: 9740)
      • PingInfoView.exe (PID: 9948)
      • svchocl.exe (PID: 10356)
      • tb.exe (PID: 9912)
      • RuntimeBroker.exe (PID: 10432)
      • chcp.com (PID: 10560)
      • RuntimeBroker.exe (PID: 10864)
      • chcp.com (PID: 11040)
      • svchost.exe (PID: 8108)
      • RuntimeBroker.exe (PID: 2292)
      • KKMAgent.exe (PID: 8672)
      • chcp.com (PID: 8284)
      • RedLineStealer.exe (PID: 2128)
      • RegAsm.exe (PID: 4052)
      • tcp_windows_amd64.exe (PID: 7348)
      • Monotone.exe (PID: 8012)
      • RuntimeBroker.exe (PID: 12216)
      • tomcat8.exe (PID: 684)
      • chcp.com (PID: 8540)
      • discord.exe (PID: 7648)
      • Host.exe (PID: 9252)
      • ceng.exe (PID: 7864)
      • prueba.exe (PID: 4808)
      • Client.exe (PID: 9576)
      • RuntimeBroker.exe (PID: 10352)
      • chcp.com (PID: 9284)
      • gsav3omg.vaj0.exe (PID: 10112)
      • xsh.exe (PID: 10180)
      • WxWorkMultiOpen.exe (PID: 10664)
      • MSBuild.exe (PID: 10424)
      • %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe (PID: 6268)
      • random.exe (PID: 11004)
      • t_vnc.exe (PID: 5268)
      • AutoRuns.exe (PID: 12112)
      • dumer.exe (PID: 6304)
      • RuntimeBroker.exe (PID: 2140)
      • patcher.exe (PID: 1688)
      • curl.exe (PID: 8124)
      • chcp.com (PID: 7196)
      • Hl2dm_Updater.exe (PID: 1588)
      • kdmapper_Release.exe (PID: 7620)
      • ec5013ad46.exe (PID: 6496)
      • Hl2dm_Updater.new.exe (PID: 3880)
      • Hl2dm_Updater.exe (PID: 11908)
      • voodyy.exe (PID: 8768)
      • qwalphaqw.exe (PID: 9184)
      • RuntimeBroker.exe (PID: 9092)
      • 691d9b712d.exe (PID: 9056)
      • chcp.com (PID: 9008)
      • MSBuild.exe (PID: 9068)
      • D87N7LBIJLVVU4R0MH.exe (PID: 8292)
      • RuntimeBroker.exe (PID: 10220)
      • chcp.com (PID: 7424)
      • tktVLbc.exe (PID: 7872)
      • tktVLbc.tmp (PID: 7496)
      • Tu_Inspector32.exe (PID: 9572)
      • Tu_Inspector32.exe (PID: 9828)
      • dumer.exe (PID: 11816)
      • svchost.exe (PID: 11372)
      • sFFG7Wg.exe (PID: 11412)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3540)
    • Manual execution by a user

      • 4363463463464363463463463.exe (PID: 4552)
      • 4363463463464363463463463.exe (PID: 3672)
      • explorer.exe (PID: 868)
      • cmd.exe (PID: 5008)
      • Ul.pif (PID: 6348)
    • Reads the computer name

      • 4363463463464363463463463.exe (PID: 3672)
      • vtoroy.exe (PID: 1944)
      • Sentil.exe (PID: 1056)
      • Client1.exe (PID: 4512)
      • MSBuild.exe (PID: 2272)
      • QQHelper_1540.exe (PID: 4156)
      • brbotnet.exe (PID: 1944)
      • Fast%20Download.exe (PID: 4700)
      • jd124.exe (PID: 7004)
      • XClient.exe (PID: 5720)
      • JUpdate.exe (PID: 1212)
      • windows.exe (PID: 6420)
      • x210.exe (PID: 1156)
      • jd124.exe (PID: 4084)
      • nbin22.exe (PID: 2348)
      • LukeJazz.exe (PID: 6700)
      • bryjf.exe (PID: 2124)
      • svchost.exe (PID: 4040)
      • TORRENTOLD-1.exe (PID: 6768)
      • system.exe (PID: 6516)
      • TORRENTOLD-1.exe (PID: 4216)
      • Ul.pif (PID: 4216)
      • Ul.pif (PID: 6348)
      • ShellExperienceHost.exe (PID: 4580)
      • YHY_Setup.exe (PID: 4192)
      • ctfmon.exe (PID: 1520)
      • svchost.exe (PID: 2212)
      • Dark_Brout_ncrypt.exe (PID: 7076)
      • ctfmon.exe (PID: 2804)
      • msdcsc.exe (PID: 2716)
      • nircmd.exe (PID: 6876)
      • Assiah.exe (PID: 6896)
      • TempSpoofer.exe (PID: 5848)
      • pm3100.exe (PID: 3588)
      • RuntimeBroker.exe (PID: 7252)
      • Client-built.exe (PID: 7304)
      • mimikatz.exe (PID: 7076)
      • RuntimeBroker.exe (PID: 7344)
      • installer.exe (PID: 7396)
      • WindowsSecurityCheckWSC.secureapp.exe (PID: 7480)
      • Client.exe (PID: 7740)
      • RuntimeBroker.exe (PID: 7152)
      • MSBuild.exe (PID: 7460)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7532)
      • RegSvcs.exe (PID: 7764)
      • RuntimeBroker.exe (PID: 5288)
      • darts-wled.exe (PID: 7948)
      • bmw_v1.7.exe (PID: 7300)
      • Client-built2.exe (PID: 7728)
      • Client.exe (PID: 7632)
      • xblkpfZ8Y4.exe (PID: 7208)
      • Ganja168.exe (PID: 2276)
      • RuntimeBroker.exe (PID: 4808)
      • msf.exe (PID: 5684)
      • award.pdf.exe (PID: 6716)
      • identity_helper.exe (PID: 7360)
      • RuntimeBroker.exe (PID: 8256)
      • svchost.exe (PID: 7220)
      • file.exe (PID: 8488)
      • identity_helper.exe (PID: 9276)
      • kkm.exe (PID: 9384)
      • Ganja3.exe (PID: 9460)
      • klass.exe (PID: 9480)
      • ntladlklthawd.exe (PID: 9552)
      • RuntimeBroker.exe (PID: 9512)
      • tb.exe (PID: 9912)
      • PingInfoView.exe (PID: 9948)
      • svchocl.exe (PID: 10356)
      • RuntimeBroker.exe (PID: 10432)
      • RuntimeBroker.exe (PID: 10864)
      • svchost.exe (PID: 8108)
      • RuntimeBroker.exe (PID: 2292)
      • KKMAgent.exe (PID: 8672)
      • RedLineStealer.exe (PID: 2128)
      • RegAsm.exe (PID: 4052)
      • tcp_windows_amd64.exe (PID: 7348)
      • RuntimeBroker.exe (PID: 12216)
      • Monotone.exe (PID: 8012)
      • discord.exe (PID: 7648)
      • ceng.exe (PID: 7864)
      • Host.exe (PID: 9252)
      • prueba.exe (PID: 4808)
      • Client.exe (PID: 9576)
      • xsh.exe (PID: 10180)
      • RuntimeBroker.exe (PID: 10352)
      • %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe (PID: 6268)
      • WxWorkMultiOpen.exe (PID: 10664)
      • MSBuild.exe (PID: 10424)
      • random.exe (PID: 11004)
      • t_vnc.exe (PID: 5268)
      • dumer.exe (PID: 6304)
      • RuntimeBroker.exe (PID: 2140)
      • AutoRuns.exe (PID: 12112)
      • Hl2dm_Updater.exe (PID: 1588)
      • Hl2dm_Updater.exe (PID: 11908)
      • ec5013ad46.exe (PID: 6496)
      • Hl2dm_Updater.new.exe (PID: 3880)
      • qwalphaqw.exe (PID: 9184)
      • 691d9b712d.exe (PID: 9056)
      • RuntimeBroker.exe (PID: 9092)
      • MSBuild.exe (PID: 9068)
      • D87N7LBIJLVVU4R0MH.exe (PID: 8292)
      • RuntimeBroker.exe (PID: 10220)
      • tktVLbc.exe (PID: 7872)
      • tktVLbc.tmp (PID: 7496)
      • Tu_Inspector32.exe (PID: 9572)
      • Tu_Inspector32.exe (PID: 9828)
      • svchost.exe (PID: 11372)
      • sFFG7Wg.exe (PID: 11412)
    • Reads the machine GUID from the registry

      • 4363463463464363463463463.exe (PID: 3672)
      • Sentil.exe (PID: 1056)
      • Client1.exe (PID: 4512)
      • MSBuild.exe (PID: 2272)
      • Fast%20Download.exe (PID: 4700)
      • brbotnet.exe (PID: 1944)
      • jd124.exe (PID: 7004)
      • XClient.exe (PID: 5720)
      • JUpdate.exe (PID: 1212)
      • windows.exe (PID: 6420)
      • jd124.exe (PID: 4084)
      • bryjf.exe (PID: 2124)
      • svchost.exe (PID: 4040)
      • TORRENTOLD-1.exe (PID: 4216)
      • system.exe (PID: 6516)
      • ShellExperienceHost.exe (PID: 4580)
      • svchost.exe (PID: 2212)
      • Assiah.exe (PID: 6896)
      • RuntimeBroker.exe (PID: 7252)
      • TempSpoofer.exe (PID: 5848)
      • Client-built.exe (PID: 7304)
      • RuntimeBroker.exe (PID: 7344)
      • WindowsSecurityCheckWSC.secureapp.exe (PID: 7480)
      • installer.exe (PID: 7396)
      • Client.exe (PID: 7740)
      • RuntimeBroker.exe (PID: 7152)
      • MSBuild.exe (PID: 7460)
      • RegSvcs.exe (PID: 7764)
      • darts-wled.exe (PID: 4880)
      • RuntimeBroker.exe (PID: 5288)
      • Client-built2.exe (PID: 7728)
      • Client.exe (PID: 7632)
      • bmw_v1.7.exe (PID: 7300)
      • RuntimeBroker.exe (PID: 4808)
      • svchost.exe (PID: 7220)
      • RuntimeBroker.exe (PID: 8256)
      • RuntimeBroker.exe (PID: 9512)
      • RuntimeBroker.exe (PID: 10432)
      • RuntimeBroker.exe (PID: 10864)
      • RuntimeBroker.exe (PID: 2292)
      • svchost.exe (PID: 8108)
      • KKMAgent.exe (PID: 8672)
      • RuntimeBroker.exe (PID: 12216)
      • Monotone.exe (PID: 8012)
      • RegAsm.exe (PID: 4052)
      • discord.exe (PID: 7648)
      • Host.exe (PID: 9252)
      • Client.exe (PID: 9576)
      • ceng.exe (PID: 7864)
      • RuntimeBroker.exe (PID: 10352)
      • %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe (PID: 6268)
      • MSBuild.exe (PID: 10424)
      • RuntimeBroker.exe (PID: 2140)
      • ec5013ad46.exe (PID: 6496)
      • RuntimeBroker.exe (PID: 9092)
      • MSBuild.exe (PID: 9068)
      • RuntimeBroker.exe (PID: 10220)
      • sFFG7Wg.exe (PID: 11412)
      • svchost.exe (PID: 11372)
    • Disables trace logs

      • 4363463463464363463463463.exe (PID: 3672)
      • jd124.exe (PID: 7004)
      • JUpdate.exe (PID: 1212)
      • jd124.exe (PID: 4084)
      • svchost.exe (PID: 4040)
      • Assiah.exe (PID: 6896)
      • powershell.exe (PID: 7172)
      • RegSvcs.exe (PID: 7764)
      • KKMAgent.exe (PID: 8672)
      • powershell.exe (PID: 3564)
      • %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe (PID: 6268)
    • Checks proxy server information

      • 4363463463464363463463463.exe (PID: 3672)
      • jd124.exe (PID: 7004)
      • QQHelper_1540.exe (PID: 4156)
      • JUpdate.exe (PID: 1212)
      • jd124.exe (PID: 4084)
      • svchost.exe (PID: 4040)
      • slui.exe (PID: 4160)
      • Assiah.exe (PID: 6896)
      • powershell.exe (PID: 7172)
      • RegSvcs.exe (PID: 7764)
      • bmw_v1.7.exe (PID: 7300)
      • explorer.exe (PID: 868)
      • KKMAgent.exe (PID: 8672)
      • WerFault.exe (PID: 7588)
      • Host.exe (PID: 9252)
      • powershell.exe (PID: 3564)
      • %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe (PID: 6268)
      • dumer.exe (PID: 6304)
      • Hl2dm_Updater.exe (PID: 11908)
      • sFFG7Wg.exe (PID: 11412)
    • The sample compiled with english language support

      • 4363463463464363463463463.exe (PID: 3672)
      • x210.exe (PID: 1156)
      • Ul.pif (PID: 4216)
      • Ul.pif (PID: 6348)
      • Dark_Brout_ncrypt.exe (PID: 7076)
      • RuntimeBroker.exe (PID: 7252)
      • powershell.exe (PID: 7172)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7532)
      • darts-wled.exe (PID: 7948)
      • kkm.exe (PID: 9384)
      • powershell.exe (PID: 3564)
      • dumer.exe (PID: 6304)
      • tktVLbc.tmp (PID: 7496)
      • Tu_Inspector32.exe (PID: 9572)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 4772)
      • mmc.exe (PID: 1976)
      • explorer.exe (PID: 3936)
      • mmc.exe (PID: 4132)
      • powershell.exe (PID: 7620)
      • explorer.exe (PID: 868)
      • powershell.exe (PID: 9524)
    • Process checks computer location settings

      • 4363463463464363463463463.exe (PID: 3672)
      • jd124.exe (PID: 7004)
      • JUpdate.exe (PID: 1212)
      • x210.exe (PID: 1156)
      • windows.exe (PID: 6420)
      • LukeJazz.exe (PID: 6700)
      • svchost.exe (PID: 4040)
      • ShellExperienceHost.exe (PID: 4580)
      • Dark_Brout_ncrypt.exe (PID: 7076)
      • RuntimeBroker.exe (PID: 7344)
      • RuntimeBroker.exe (PID: 7152)
      • RuntimeBroker.exe (PID: 5288)
      • RuntimeBroker.exe (PID: 4808)
      • RuntimeBroker.exe (PID: 8256)
      • RuntimeBroker.exe (PID: 9512)
      • RuntimeBroker.exe (PID: 10432)
      • svchocl.exe (PID: 10356)
      • RuntimeBroker.exe (PID: 10864)
      • RuntimeBroker.exe (PID: 2292)
      • RuntimeBroker.exe (PID: 12216)
      • RuntimeBroker.exe (PID: 10352)
      • random.exe (PID: 11004)
      • RuntimeBroker.exe (PID: 2140)
      • dumer.exe (PID: 6304)
      • RuntimeBroker.exe (PID: 9092)
      • RuntimeBroker.exe (PID: 10220)
    • Reads the software policy settings

      • 4363463463464363463463463.exe (PID: 3672)
      • MSBuild.exe (PID: 2272)
      • TORRENTOLD-1.exe (PID: 6768)
      • bryjf.exe (PID: 2124)
      • slui.exe (PID: 4160)
      • powershell.exe (PID: 7620)
      • MSBuild.exe (PID: 7460)
      • RegSvcs.exe (PID: 7764)
      • KKMAgent.exe (PID: 8672)
      • WerFault.exe (PID: 7588)
      • powershell.exe (PID: 9524)
      • MSBuild.exe (PID: 10424)
      • %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe (PID: 6268)
      • ec5013ad46.exe (PID: 6496)
      • MSBuild.exe (PID: 9068)
      • sFFG7Wg.exe (PID: 11412)
    • Reads Environment values

      • Sentil.exe (PID: 1056)
      • Client1.exe (PID: 4512)
      • svchost.exe (PID: 4040)
      • Assiah.exe (PID: 6896)
      • RuntimeBroker.exe (PID: 7252)
      • Client-built.exe (PID: 7304)
      • TempSpoofer.exe (PID: 5848)
      • RuntimeBroker.exe (PID: 7344)
      • WindowsSecurityCheckWSC.secureapp.exe (PID: 7480)
      • installer.exe (PID: 7396)
      • Client.exe (PID: 7740)
      • RuntimeBroker.exe (PID: 7152)
      • RuntimeBroker.exe (PID: 5288)
      • Client-built2.exe (PID: 7728)
      • Client.exe (PID: 7632)
      • RuntimeBroker.exe (PID: 4808)
      • RuntimeBroker.exe (PID: 8256)
      • identity_helper.exe (PID: 7360)
      • identity_helper.exe (PID: 9276)
      • RuntimeBroker.exe (PID: 9512)
      • RuntimeBroker.exe (PID: 10432)
      • RuntimeBroker.exe (PID: 10864)
      • RuntimeBroker.exe (PID: 2292)
      • RuntimeBroker.exe (PID: 12216)
      • discord.exe (PID: 7648)
      • Monotone.exe (PID: 8012)
      • Client.exe (PID: 9576)
      • RuntimeBroker.exe (PID: 10352)
      • RuntimeBroker.exe (PID: 2140)
      • RuntimeBroker.exe (PID: 9092)
      • RuntimeBroker.exe (PID: 10220)
    • Creates files or folders in the user directory

      • Sentil.exe (PID: 1056)
      • explorer.exe (PID: 4772)
      • Fast%20Download.exe (PID: 4700)
      • windows.exe (PID: 6420)
      • Ul.pif (PID: 4216)
      • svchost.exe (PID: 4040)
      • Ul.pif (PID: 6348)
      • ctfmon.exe (PID: 2804)
      • RuntimeBroker.exe (PID: 7252)
      • Client-built.exe (PID: 7304)
      • installer.exe (PID: 7396)
      • bmw_v1.7.exe (PID: 7300)
      • explorer.exe (PID: 868)
      • kkm.exe (PID: 9384)
      • Assiah.exe (PID: 6896)
      • KKMAgent.exe (PID: 8672)
      • WerFault.exe (PID: 7588)
      • ceng.exe (PID: 7864)
      • Host.exe (PID: 9252)
      • dumer.exe (PID: 6304)
      • Hl2dm_Updater.exe (PID: 11908)
      • Tu_Inspector32.exe (PID: 9828)
      • sFFG7Wg.exe (PID: 11412)
    • Uses Task Scheduler to autorun other applications (AUTOMATE)

      • Client1.exe (PID: 4512)
      • cmd.exe (PID: 6148)
      • Client.exe (PID: 7632)
    • The sample compiled with chinese language support

      • 4363463463464363463463463.exe (PID: 3672)
      • jd124.exe (PID: 7004)
      • x210.exe (PID: 1156)
      • HDDrive1095_XinAnPlug3030_20230619_inno.exe (PID: 32)
      • kkm.exe (PID: 9384)
      • dumer.exe (PID: 6304)
      • Tu_Inspector32.exe (PID: 9828)
    • Launching a file from the Startup directory

      • Fast%20Download.exe (PID: 4700)
      • cmd.exe (PID: 5008)
      • svchost.exe (PID: 4040)
    • Create files in a temporary directory

      • brbotnet.exe (PID: 1944)
      • rarx210.exe (PID: 2732)
      • windows.exe (PID: 6420)
      • LukeJazz.exe (PID: 6700)
      • bryjf.exe (PID: 2124)
      • Ul.pif (PID: 6348)
      • YHY_Setup.exe (PID: 4192)
      • ctfmon.exe (PID: 1520)
      • TempSpoofer.exe (PID: 5848)
      • RuntimeBroker.exe (PID: 7344)
      • powershell.exe (PID: 7620)
      • HDDrive1095_XinAnPlug3030_20230619_inno.exe (PID: 32)
      • RuntimeBroker.exe (PID: 7152)
      • HDDrive1095_XinAnPlug3030_20230619_inno.tmp (PID: 7532)
      • catee.exe (PID: 7772)
      • darts-wled.exe (PID: 7948)
      • RuntimeBroker.exe (PID: 5288)
      • RuntimeBroker.exe (PID: 4808)
      • RuntimeBroker.exe (PID: 8256)
      • file.exe (PID: 8488)
      • kkm.exe (PID: 9384)
      • RuntimeBroker.exe (PID: 9512)
      • RuntimeBroker.exe (PID: 10432)
      • RuntimeBroker.exe (PID: 10864)
      • RuntimeBroker.exe (PID: 2292)
      • Monotone.exe (PID: 8012)
      • RuntimeBroker.exe (PID: 12216)
      • powershell.exe (PID: 9524)
      • RuntimeBroker.exe (PID: 10352)
      • xsh.exe (PID: 10180)
      • random.exe (PID: 11004)
      • RuntimeBroker.exe (PID: 2140)
      • dumer.exe (PID: 6304)
      • RuntimeBroker.exe (PID: 9092)
      • RuntimeBroker.exe (PID: 10220)
      • ec5013ad46.exe (PID: 6496)
      • tktVLbc.exe (PID: 7872)
      • tktVLbc.tmp (PID: 7496)
      • Tu_Inspector32.exe (PID: 9828)
    • The sample compiled with korean language support

      • 4363463463464363463463463.exe (PID: 3672)
    • Creates files in the program directory

      • mmc.exe (PID: 4132)
      • Ul.pif (PID: 6348)
      • Client-built2.exe (PID: 7728)
      • Ganja3.exe (PID: 9460)
      • Tu_Inspector32.exe (PID: 9572)
    • Creates a new folder

      • cmd.exe (PID: 5644)
    • Reads mouse settings

      • Ul.pif (PID: 4216)
      • catee.exe (PID: 7772)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7156)
      • powershell.exe (PID: 6376)
      • powershell.exe (PID: 5724)
      • powershell.exe (PID: 2160)
      • powershell.exe (PID: 6700)
      • powershell.exe (PID: 7172)
      • powershell.exe (PID: 3564)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 5724)
      • powershell.exe (PID: 6376)
      • powershell.exe (PID: 2160)
      • powershell.exe (PID: 6700)
      • powershell.exe (PID: 7172)
      • powershell.exe (PID: 3564)
    • Launching a file from a Registry key

      • svchost.exe (PID: 4040)
      • Ul.pif (PID: 6348)
      • ctfmon.exe (PID: 2804)
      • Dark_Brout_ncrypt.exe (PID: 7076)
      • msdcsc.exe (PID: 2716)
      • explorer.exe (PID: 868)
      • klass.exe (PID: 9480)
      • kkm.exe (PID: 9384)
      • KKMAgent.exe (PID: 8672)
      • dumer.exe (PID: 6304)
    • Launching a file from Task Scheduler

      • Ul.pif (PID: 6348)
    • The sample compiled with spanish language support

      • 4363463463464363463463463.exe (PID: 3672)
      • ctfmon.exe (PID: 2804)
    • NirSoft software is detected

      • nircmd.exe (PID: 6876)
      • PingInfoView.exe (PID: 9948)
    • Changes the display of characters in the console

      • cmd.exe (PID: 7640)
      • cmd.exe (PID: 7540)
      • cmd.exe (PID: 6528)
      • cmd.exe (PID: 7792)
      • cmd.exe (PID: 8344)
      • cmd.exe (PID: 9664)
      • cmd.exe (PID: 10512)
      • cmd.exe (PID: 10968)
      • cmd.exe (PID: 7712)
      • cmd.exe (PID: 11892)
      • cmd.exe (PID: 10304)
      • cmd.exe (PID: 9220)
      • cmd.exe (PID: 8836)
      • cmd.exe (PID: 9400)
    • .NET Reactor protector has been detected

      • bryjf.exe (PID: 2124)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 7172)
      • powershell.exe (PID: 3564)
    • The executable file from the user directory is run by the Powershell process

      • 4l5b2jwj.o5y0.exe (PID: 8152)
      • gsav3omg.vaj0.exe (PID: 10112)
    • Application launched itself

      • msedge.exe (PID: 8008)
      • msedge.exe (PID: 7080)
      • msedge.exe (PID: 7564)
      • msedge.exe (PID: 8572)
    • FileZilla executable

      • 4363463463464363463463463.exe (PID: 3672)
    • Process checks whether UAC notifications are on

      • random.exe (PID: 11004)
      • dumer.exe (PID: 6304)
      • dumer.exe (PID: 11816)
    • Execution of CURL command

      • cmd.exe (PID: 9396)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Lumma

(PID) Process(2272) MSBuild.exe
C2 (11)korxddl.top/qidz
waxnps.live/aoqp
diecam.top/laur
citellcagt.top/gjtu
narrathfpt.top/tekq
https://t.me/vstalnasral555
peppinqikp.xyz/xaow
swenku.xyz/gaok
escczlv.top/bufi
localixbiw.top/zlpa
stochalyqp.xyz/alfp

Quasar

(PID) Process(4512) Client1.exe
Version1.4.1
C2 (2)73.62.14.5:4782
Sub_DirSubDir
Install_NameClient1.exe
Mutex3aaa11be-d135-4877-a61e-c409c29a7a60
StartupStartup
TagOffice04
LogDirLogs
SignatureEdBsB69NrhYROGjMirEw1pe15mwZjJy+fpGVF2aEbnAFOtUvB+inXlq8CBJsHyw2rIpTOfp4iJoePBYs9NdmFCd3gos2x+OqODgudinjtlJ3MQljnn0DPtxxorYuDf5VUKr0n15ASslFNr8Z6jDUIHZBaCbxs4uO8NaqMeStXJzf+YByrEcyZU6gOjyIIGfrpqBLqq1isNVIZONqJkRwLltRhrSgtDWEaDv4HiaDfFr2uEXgYvWN1iOqsoCHi9ioLMItlaTygAnKjrljjlADQAyWj/m8/7eKUkbRes7c3Axb...
CertificateMIIE9DCCAtygAwIBAgIQANfZS7y4agM8ac9WWr3FiTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MDYxMTE4MjE0MFoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAivzXGPouAW3xLRhzxtOI9wrlH+Nk0QndGLi3B5yS0nGPq3CY6D/70xUT+I042LxX3VBF1fiU...

NjRat

(PID) Process(4700) Fast%20Download.exe
C2late-lil.at.ply.gg
Ports35022
BotnetCrash
Options
Auto-run registry keySoftware\Microsoft\Windows\CurrentVersion\Run\Windows
Splitter|-F-|
Versionnull

XWorm

(PID) Process(5720) XClient.exe
C278.142.218.142:5353
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
MutexsDpdv2mpksLcLamH
(PID) Process(4040) svchost.exe
C2rates-north.gl.at.ply.gg,second-spyware.gl.at.ply.gg:51537
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
MutexgJvMWWdu1fLovptK

Formbook

(PID) Process(868) explorer.exe
C2www.cjc-nm.vip/tu90/
Strings (79)USERNAME
LOCALAPPDATA
USERPROFILE
APPDATA
TEMP
ProgramFiles
CommonProgramFiles
ALLUSERSPROFILE
/c copy "
/c del "
\Run
\Policies
\Explorer
\Registry\User
\Registry\Machine
\SOFTWARE\Microsoft\Windows\CurrentVersion
Office\15.0\Outlook\Profiles\Outlook\
NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\
\SOFTWARE\Mozilla\Mozilla
\Mozilla
Username:
Password:
formSubmitURL
usernameField
encryptedUsername
encryptedPassword
\logins.json
\signons.sqlite
\Microsoft\Vault\
SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins
\Google\Chrome\User Data\Default\Login Data
SELECT origin_url, username_value, password_value FROM logins
.exe
.com
.scr
.pif
.cmd
.bat
ms
win
gdi
mfc
vga
igfx
user
help
config
update
regsvc
chkdsk
systray
audiodg
certmgr
autochk
taskhost
colorcpl
services
IconCache
ThumbCache
Cookies
SeDebugPrivilege
SeShutdownPrivilege
\BaseNamedObjects
config.php
POST
HTTP/1.1
Host:
Connection: close
Content-Length:
Cache-Control: no-cache
Origin: http://
User-Agent: Mozilla Firefox/4.0
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://
Accept-Language: en-US
Accept-Encoding: gzip, deflate dat=
f-start
f-end
Decoy C2 (64)952734073.xyz
l2d35efae0yw1rvt9qefw8cfg.net
87445.pizza
idlersinduedinfeft.cloud
whichwe.live
100449.net
chinaclean.xyz
olding-beds-61261.bond
leadmagnetcpa.shop
video-games-97741.bond
marvelterbang.shop
video1.net
perfectdrishti.info
mantispms.net
matalan.jobs
greenblockventures.net
pagamentoseguroficial.pro
leadmagnetppc.shop
77578.shop
tdnimji.buzz
zainnova.shop
roofing-services-34072.bond
topisalpert.shop
cleaning-services-40215.bond
abandoned-houses-38551.bond
59hl.net
fromscratch.top
vincnakliye.xyz
cars-3549835.zone
setpink.life
soggilysootsstative.cloud
thinkhuman.net
estieaaa.xyz
sharelaunch.xyz
simplycandles.shop
ufalosdmsz.shop
influencer-marketing-61296.bond
newcarfi.info
oxvia.homes
cvkisegy.shop
pin-up-slot-fast.buzz
work-abroad-52523.bond
j2st.info
cataract-surgery-63955.bond
pl-oferta2759576.cfd
xinshengyou.xyz
rockystatue.shop
guidacorsa.corsica
jfdjn.autos
roofing-jobs-26086.bond
your-swsolutions.info
xzgdp.autos
0v3py92izrp23yy.xyz
aborteracciteadmetus.cloud
security-jobs-cl-3.today
marpiset.shop
fashionstore1999.shop
knapsackdisplay.shop
whuastp.info
wall-repair-10251.bond
frau-tonis-parfum.shop
binarybingenbiscay.cloud
yuuk1.click
parposaltguide.cyou

Rhadamanthys

(PID) Process(3652) fontdrvhost.exe
C2 (1)https://154.216.20.224:9773/a36090f1390c7cab81330/tauau3xb.nto48

AsyncRat

(PID) Process(6516) system.exe
C2 (1)tuna91.duckdns.org
Ports (1)1604
Version0.5.7B
BotnetSystem Program
Options
AutoRuntrue
MutexAsyncMutex_6SI8OkPnk
InstallFolder%AppData%
BSoDfalse
AntiVMfalse
Certificates
Cert1MIIE8jCCAtqgAwIBAgIQAKhExv8gmkFnvPeZ0hk8+zANBgkqhkiG9w0BAQ0FADAaMRgwFgYDVQQDDA9Bc3luY1JBVCBTZXJ2ZXIwIBcNMjIwODE2MTkyNTM3WhgPOTk5OTEyMzEyMzU5NTlaMBoxGDAWBgNVBAMMD0FzeW5jUkFUIFNlcnZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIic+3NLTvw3b0gehT5806CFq2ShxEgQqWuI28vsBCLZ+NWjFPOLBrY1lRN5b/n8CypRPqxsQTll...
Server_SignatureZXHOnE08L81TusUZzv0Za4+/nIXSBcP6Nmv5fosfqTrMhy7mEpEzc7CAN89oOPiTaoU1MhykzWji7VIttu8Pq/LZlg82GncU6rUoNw16njz2r/SzkzCIc8yAx5h42OkdznCKQhQvH8890f+4s2UseUzBu5KJq7bvf59wGWmib9zUeWdB+PSLe7UgEFothE5gaNMKyBA1/7PrAQITZk5GED22tm7hHv8fR/0FLI3FWyC21YticBRx26Vy/JiCNk21i/Y/gReFcI3KQLNWo/oqFrJqwEg3T3G9Y7uukspWIjiB...
Keys
AES95482da6f1a6ef3f62f660597ff853b6340dfb716f65b1f7184105eaaf1c588d
Saltbfeb1e56fbcd973bb219022430a57843003d5644d21e62b9d4f180e7e6c33941
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 51
ZipBitFlag: 0x0009
ZipCompression: Unknown (99)
ZipModifyDate: 2025:06:26 21:31:52
ZipCRC: 0x31d44928
ZipCompressedSize: 4869
ZipUncompressedSize: 10752
ZipFileName: 4363463463464363463463463.exe.bin
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
663
Monitored processes
496
Malicious processes
82
Suspicious processes
34

Behavior graph

Click at the process to see the details
start winrar.exe 4363463463464363463463463.exe no specs #STEALER 4363463463464363463463463.exe conhost.exe no specs #STEALC vtoroy.exe no specs neploskiy_crypted_lab.exe no specs conhost.exe no specs #QUASARRAT sentil.exe schtasks.exe no specs conhost.exe no specs #LUMMA msbuild.exe #QUASAR client1.exe schtasks.exe no specs conhost.exe no specs #LUMMA svchost.exe qqhelper_1540.exe #NJRAT fast%20download.exe slui.exe attrib.exe no specs attrib.exe no specs conhost.exe no specs conhost.exe no specs mimilove.exe no specs conhost.exe no specs brbotnet.exe no specs conhost.exe no specs jd124.exe #XWORM xclient.exe jupdate.exe cabalmain.exe no specs #ASYNCRAT windows.exe x210.exe jd124.exe rarx210.exe no specs zeropersca.exe no specs cmd.exe no specs conhost.exe no specs explorer.exe no specs #FORMBOOK explorer.exe no specs mmc.exe mmc.exe cmd.exe cmd.exe no specs conhost.exe no specs conhost.exe no specs timeout.exe no specs schtasks.exe no specs nbin22.exe no specs #FORMBOOK explorer.exe #RHADAMANTHYS fontdrvhost.exe lukejazz.exe no specs #ASYNCRAT bryjf.exe cmd.exe conhost.exe no specs torrentold-1.exe no specs powershell.exe no specs conhost.exe no specs #XWORM svchost.exe torrentold-1.exe #ASYNCRAT system.exe tasklist.exe no specs findstr.exe no specs #METASPLOIT award.pdf.exe tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs ul.pif timeout.exe no specs cmd.exe conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs ul.pif schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs shellexperiencehost.exe no specs yhy_setup.exe no specs ctfmon.exe #IRC ctfmon.exe svchost.exe no specs msf.exe dark_brout_ncrypt.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs notepad.exe no specs #DARKCOMET msdcsc.exe attrib.exe no specs attrib.exe no specs iexplore.exe no specs explorer.exe no specs #DARKCOMET notepad.exe no specs nircmd.exe no specs pm3100.exe no specs assiah.exe rickroll.exe no specs conhost.exe no specs tempspoofer.exe no specs mimikatz.exe no specs conhost.exe no specs conhost.exe no specs #LUMMA powershell.exe #QUASARRAT runtimebroker.exe #QUASAR client-built.exe runtimebroker.exe no specs #QUASARRAT installer.exe schtasks.exe no specs conhost.exe no specs windowssecuritycheckwsc.secureapp.exe schtasks.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs client.exe chcp.com no specs schtasks.exe no specs conhost.exe no specs ping.exe no specs schtasks.exe no specs conhost.exe no specs 4l5b2jwj.o5y0.exe no specs conhost.exe no specs #LUMMA msbuild.exe runtimebroker.exe no specs hddrive1095_xinanplug3030_20230619_inno.exe hddrive1095_xinanplug3030_20230619_inno.tmp cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs catee.exe no specs #SNAKEKEYLOGGER regsvcs.exe darts-wled.exe conhost.exe no specs darts-wled.exe no specs #FORMBOOK explorer.exe runtimebroker.exe no specs bmw_v1.7.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs client-built2.exe schtasks.exe no specs conhost.exe no specs client.exe ganja168.exe no specs schtasks.exe no specs conhost.exe no specs #MINER xblkpfz8y4.exe conhost.exe no specs iexplore.exe no specs iexplore.exe no specs msedge.exe no specs msedge.exe no specs runtimebroker.exe no specs cmd.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs svchost.exe no specs chcp.com no specs msedge.exe ping.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs runtimebroker.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs file.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs kkm.exe ganja3.exe klass.exe runtimebroker.exe no specs ntladlklthawd.exe cmd.exe no specs conhost.exe no specs werfault.exe no specs chcp.com no specs ping.exe no specs werfault.exe no specs werfault.exe no specs tb.exe pinginfoview.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs find.exe no specs reg.exe no specs find.exe no specs reg.exe no specs find.exe no specs reg.exe no specs find.exe no specs ping.exe no specs svchocl.exe runtimebroker.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs cmd.exe no specs conhost.exe no specs runtimebroker.exe no specs #REDDRIVER svchost.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs svchost.exe no specs runtimebroker.exe no specs kkmagent.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs tomcat8.exe no specs conhost.exe no specs redlinestealer.exe conhost.exe no specs regasm.exe werfault.exe tcp_windows_amd64.exe monotone.exe no specs runtimebroker.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs #QUASARRAT discord.exe #REMCOS prueba.exe conhost.exe no specs conhost.exe no specs #LUMMA powershell.exe ceng.exe #REMCOS host.exe schtasks.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs client.exe minerd.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs gsav3omg.vaj0.exe no specs conhost.exe no specs xsh.exe no specs runtimebroker.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs outlook.exe %e5%9b%9b%e6%96%b9%e5%b9%b3%e5%8f%b0-%e5%8d%a1%e5%95%86%e7%ab%af.exe #LUMMA msbuild.exe wxworkmultiopen.exe no specs conhost.exe no specs t_vnc.exe no specs conhost.exe no specs msedge.exe no specs random.exe #AMADEY dumer.exe autoruns.exe no specs runtimebroker.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs patcher.exe no specs conhost.exe no specs cmd.exe no specs curl.exe hl2dm_updater.exe kdmapper_release.exe no specs conhost.exe no specs #LUMMA ec5013ad46.exe hl2dm_updater.new.exe no specs hl2dm_updater.exe qwalphaqw.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs csc.exe no specs voodyy.exe no specs runtimebroker.exe no specs 691d9b712d.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs msbuild.exe conhost.exe no specs osonryg.exe no specs control.exe control.exe runtimebroker.exe no specs d87n7lbijlvvu4r0mh.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs tktvlbc.exe tktvlbc.tmp tu_inspector32.exe #GENERIC tu_inspector32.exe svchost.exe no specs dumer.exe no specs sffg7wg.exe

Process information

PID
CMD
Path
Indicators
Parent process
32"C:\Users\admin\Desktop\Files\HDDrive1095_XinAnPlug3030_20230619_inno.exe" C:\Users\admin\Desktop\Files\HDDrive1095_XinAnPlug3030_20230619_inno.exe
4363463463464363463463463.exe
User:
admin
Company:
LNCA Company, Inc.
Integrity Level:
HIGH
Description:
辽宁CA客户端
Exit code:
2
Version:
3.0.3.0
Modules
Images
c:\users\admin\desktop\files\hddrive1095_xinanplug3030_20230619_inno.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
304cmd /c copy /b Avi + Hits + Joyce + Desk + Cheers + Cleanup + Generate + Hobbies + Possible + Rover + Notifications + Unique + Helpful + Constantly + Namibia + Revolution + Transfers + Index + Colors 437570\b C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
304"C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exemsdcsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\program files (x86)\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
684"C:\Users\admin\Desktop\Files\tomcat8.exe" C:\Users\admin\Desktop\Files\tomcat8.exe4363463463464363463463463.exe
User:
admin
Company:
Apache Software Foundation
Integrity Level:
HIGH
Description:
Commons Daemon Service Runner
Exit code:
2
Version:
1.0.15.0
Modules
Images
c:\users\admin\desktop\files\tomcat8.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
724timeout 3 C:\Windows\SysWOW64\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
868"C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcp_win.dll
c:\windows\syswow64\ucrtbase.dll
Formbook
(PID) Process(868) explorer.exe
C2www.cjc-nm.vip/tu90/
Strings (79)USERNAME
LOCALAPPDATA
USERPROFILE
APPDATA
TEMP
ProgramFiles
CommonProgramFiles
ALLUSERSPROFILE
/c copy "
/c del "
\Run
\Policies
\Explorer
\Registry\User
\Registry\Machine
\SOFTWARE\Microsoft\Windows\CurrentVersion
Office\15.0\Outlook\Profiles\Outlook\
NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\
\SOFTWARE\Mozilla\Mozilla
\Mozilla
Username:
Password:
formSubmitURL
usernameField
encryptedUsername
encryptedPassword
\logins.json
\signons.sqlite
\Microsoft\Vault\
SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins
\Google\Chrome\User Data\Default\Login Data
SELECT origin_url, username_value, password_value FROM logins
.exe
.com
.scr
.pif
.cmd
.bat
ms
win
gdi
mfc
vga
igfx
user
help
config
update
regsvc
chkdsk
systray
audiodg
certmgr
autochk
taskhost
colorcpl
services
IconCache
ThumbCache
Cookies
SeDebugPrivilege
SeShutdownPrivilege
\BaseNamedObjects
config.php
POST
HTTP/1.1
Host:
Connection: close
Content-Length:
Cache-Control: no-cache
Origin: http://
User-Agent: Mozilla Firefox/4.0
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://
Accept-Language: en-US
Accept-Encoding: gzip, deflate dat=
f-start
f-end
Decoy C2 (64)952734073.xyz
l2d35efae0yw1rvt9qefw8cfg.net
87445.pizza
idlersinduedinfeft.cloud
whichwe.live
100449.net
chinaclean.xyz
olding-beds-61261.bond
leadmagnetcpa.shop
video-games-97741.bond
marvelterbang.shop
video1.net
perfectdrishti.info
mantispms.net
matalan.jobs
greenblockventures.net
pagamentoseguroficial.pro
leadmagnetppc.shop
77578.shop
tdnimji.buzz
zainnova.shop
roofing-services-34072.bond
topisalpert.shop
cleaning-services-40215.bond
abandoned-houses-38551.bond
59hl.net
fromscratch.top
vincnakliye.xyz
cars-3549835.zone
setpink.life
soggilysootsstative.cloud
thinkhuman.net
estieaaa.xyz
sharelaunch.xyz
simplycandles.shop
ufalosdmsz.shop
influencer-marketing-61296.bond
newcarfi.info
oxvia.homes
cvkisegy.shop
pin-up-slot-fast.buzz
work-abroad-52523.bond
j2st.info
cataract-surgery-63955.bond
pl-oferta2759576.cfd
xinshengyou.xyz
rockystatue.shop
guidacorsa.corsica
jfdjn.autos
roofing-jobs-26086.bond
your-swsolutions.info
xzgdp.autos
0v3py92izrp23yy.xyz
aborteracciteadmetus.cloud
security-jobs-cl-3.today
marpiset.shop
fashionstore1999.shop
knapsackdisplay.shop
whuastp.info
wall-repair-10251.bond
frau-tonis-parfum.shop
binarybingenbiscay.cloud
yuuk1.click
parposaltguide.cyou
892\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemimilove.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1052"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeqwalphaqw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1056"C:\Users\admin\Desktop\Files\Sentil.exe" C:\Users\admin\Desktop\Files\Sentil.exe
4363463463464363463463463.exe
User:
admin
Integrity Level:
HIGH
Description:
Quasar Client
Exit code:
3
Version:
1.4.1
Modules
Images
c:\users\admin\desktop\files\sentil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1128"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\admin\Desktop\Files\Dark_Brout_ncrypt.exe" +s +hC:\Windows\SysWOW64\cmd.exeDark_Brout_ncrypt.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
191 846
Read events
190 632
Write events
1 049
Delete events
165

Modification events

(PID) Process:(3540) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(3540) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(3540) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(3540) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\4363463463464363463463463.exe.zip
(PID) Process:(3540) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3540) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3540) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3540) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3540) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3540) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
Executable files
258
Suspicious files
409
Text files
200
Unknown types
102

Dropped files

PID
Process
Filename
Type
36724363463463464363463463463.exeC:\Users\admin\Desktop\Files\neploskiy_crypted_LAB.exeexecutable
MD5:6FDD3FC5B0799393D7EA782B9A5B84BC
SHA256:2D93BC4EF064B8A824825AF4672DA00B1651EA42B9B58009816019D801F7EF0D
4156QQHelper_1540.exeC:\Users\admin\Desktop\Files\xml\JprrFGqH.uTMP
MD5:
SHA256:
4156QQHelper_1540.exeC:\Users\admin\Desktop\Files\xml\rGqzXyMQ.uTMP
MD5:
SHA256:
4156QQHelper_1540.exeC:\Users\admin\Desktop\Files\xml\CkJyuzaV.uTMP
MD5:
SHA256:
4772explorer.exeC:\Users\admin\Desktop\4363463463464363463463463.exe.binexecutable
MD5:2A94F3960C58C6E70826495F76D00B85
SHA256:2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE
4772explorer.exeC:\Users\admin\Desktop\4363463463464363463463463.exeexecutable
MD5:2A94F3960C58C6E70826495F76D00B85
SHA256:2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE
4156QQHelper_1540.exeC:\Users\admin\Desktop\Files\¹Ù·½ÍøÕ¾.urlbinary
MD5:E7087BFE4C6DEE47A5C0B64DACE49392
SHA256:67165D96FE685002147A4712AC93659FAF3E2C122CB22FAA68DD3EBE7DFB18F0
1056Sentil.exeC:\Users\admin\AppData\Roaming\SubDir\Client1.exeexecutable
MD5:CFF3E677B6383632EFF6D1B52CD6D277
SHA256:0D57B81C8C42D3450782AF358D0938D813ABC28EC18B3AD6C81BD680A3EFBBEA
36724363463463464363463463463.exeC:\Users\admin\Desktop\Files\Sentil.exeexecutable
MD5:CFF3E677B6383632EFF6D1B52CD6D277
SHA256:0D57B81C8C42D3450782AF358D0938D813ABC28EC18B3AD6C81BD680A3EFBBEA
36724363463463464363463463463.exeC:\Users\admin\Desktop\Files\QQHelper_1540.exeexecutable
MD5:5A39D66E2B925F7B7F9F39DE2F9C5FA0
SHA256:4F91F9C5D3BAF612A1920AE8B2C49A1EE9850D018E308F8E65184A9046138658
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
344
TCP/UDP connections
426
DNS requests
216
Threats
544

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2876
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6780
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6780
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
3672
4363463463464363463463463.exe
GET
301
140.82.112.4:80
http://github.com/rimase12/urika/raw/refs/heads/main/vtoroy.exe
unknown
whitelisted
3672
4363463463464363463463463.exe
GET
200
185.156.72.61:80
http://185.156.72.61/inc/neploskiy_crypted_LAB.exe
unknown
malicious
1268
svchost.exe
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3672
4363463463464363463463463.exe
GET
200
180.163.146.102:80
http://down.qqfarmer.com.cn/QQHelper_1540.exe
unknown
unknown
3672
4363463463464363463463463.exe
GET
301
140.82.112.4:80
http://github.com/ff245185/payload/raw/refs/heads/main/Fast%20Download.exe
unknown
whitelisted
3672
4363463463464363463463463.exe
GET
200
34.240.189.130:80
http://sg123.net/files/update.exe
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4916
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
1268
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2876
svchost.exe
20.190.160.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2876
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
  • 4.231.128.59
whitelisted
google.com
  • 216.58.212.174
whitelisted
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
  • 23.32.238.171
  • 23.32.238.219
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 95.101.149.131
whitelisted
login.live.com
  • 20.190.160.2
  • 20.190.160.132
  • 20.190.160.20
  • 20.190.160.5
  • 20.190.160.4
  • 20.190.160.131
  • 20.190.160.67
  • 40.126.32.136
  • 40.126.32.138
  • 40.126.32.133
  • 20.190.160.64
  • 40.126.32.72
  • 20.190.160.66
  • 40.126.32.76
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.21
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
2200
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
3672
4363463463464363463463463.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
3672
4363463463464363463463463.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
3672
4363463463464363463463463.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
3672
4363463463464363463463463.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
Misc activity
ET HUNTING EXE Downloaded from Github
Misc activity
ET INFO Packed Executable Download
2272
MSBuild.exe
Misc activity
ET INFO Observed Telegram Domain (t .me in TLS SNI)
Process
Message
4363463463464363463463463.exe
The specified executable is not a valid application for this OS platform.
4363463463464363463463463.exe
The specified executable is not a valid application for this OS platform.
mmc.exe
"C:\WINDOWS\system32\compmgmt.msc" "C:\WINDOWS\system32\compmgmt.msc"
mmc.exe
mmc.exe
ViewerAdminViewsPath = 'C:\ProgramData\Microsoft\Event Viewer\Views\ApplicationViewsRootNode': Microsoft.Windows.ManagementUI.CombinedControls.EventsNode
mmc.exe
ViewerConfigPath = 'C:\ProgramData\Microsoft\Event Viewer': Microsoft.Windows.ManagementUI.CombinedControls.EventsNode
mmc.exe
ViewerExternalLogsPath = 'C:\ProgramData\Microsoft\Event Viewer\ExternalLogs': Microsoft.Windows.ManagementUI.CombinedControls.EventsNode
mmc.exe
ViewerViewsFolderPath = 'C:\ProgramData\Microsoft\Event Viewer\Views': Microsoft.Windows.ManagementUI.CombinedControls.EventsNode
mmc.exe
AddIcons: Microsoft.TaskScheduler.SnapIn.TaskSchedulerExtension
Assiah.exe
Ready to work