: Gathers hardware specifications, IP addresses, and operating system details.

Detailed technical reports, such as the one from the ANY.RUN Sandbox , highlight the following flags: : Malicious Activity. Tags : agenttesla , keylogger , stealer . Recommended Actions

Upon execution, the malware may use "process hollowing" to inject its malicious code into a legitimate Windows process (like RegAsm.exe or vbc.exe ) to evade detection.

Are you dealing with an on a machine, or are you performing proactive threat hunting ?