It is difficult to distinguish the true from the false by naming the malicious software written by yourself.


eicar.exe keygen.exe Bloomberg_Excel_Addon.exe SAP-custom-helper.exe \SecurityTraining_Oct22\something.exe \quarantine\inactive-sample-af232.exe
ChocolatetyInstall.ps1
__PSScriptPolicyTest_.ps1
IR_Incident_Case_file.exe ChangeDesktopBackground.exe mousejiggler.exe gathernetworkinfo.vbs atomic_red_team_test.ps1
spools.exe:Folks always think the real spoolsv is misspelled and everyone knows the print spooler NEEDs internet access.
Zoom_Update.exe:After recon to find what web conf tool client uses.
lsass.exe:Just run from odd path.
setup.exe uninstall.exe 7z.exe verodin-test.exe BlockedTestApp_X86_AMD64_2.exe
ntoskrnl.exe
explorer.exe rundll32.exe vmsrvc.exe svchost.exe vboxtray.exe vmtoolsd.exe df5serv.exe vboxservice.exe findstr.exe vmtoolsd.exe DxDiag.exe winmine.exe pinball.exe WINWORD.exe EXCEL.exe
KillNotes.exe
C:\Windows\Temp\wjdlfghp\wjdlfghp.dll
intel-driver-and-support-assistant-installer.exe
Konboot.exe HirensBootCD.exe Wavebrowser.exe Win10_KMS_Activator.exe KMSeldi.exe
werfault.exe
windows11.0-kb5019980-x64_8c5c341ffaa52f1e832bbd2a9acc5072c52b89fe.exe:Patch name。
delloptimizer.exe searchapp.exe smartscreen.exe officeclicktorun.exe
apache.exe certutil.exe userinit.exe BIOS_update.exe regedit.exe gpupdate.exe
svchost.exe ips-system.bat winexplorer.dll
setup_think-cell.exe
jre-drv-u53r-nut5-in-54321.exe
Powershell.exe MpCmdRun.exe MpDefinitions20221108.exe Teams.exe
MsMpEng.exe conhost.exe ntdII.dll node.js
winninit.exe svchst.exe NTDS.dit:Active Directory related. plotty.py JohnsExcel.xls ForecastTemplate.exe JennasDeck_DontDelete.ppx uwfcfgmgmt.exe:writer filter configuration management.