All of this was done for scientific purposes, of course. Here's how I managed to expose the computer: https://fsturmat.net/blog/05042022/ Here's a professional analysis of "C:\installed2.exe": https://www.bitdefender.com/files/News/CaseStudies/study/280/Bitdefender-WhitePaper-Worm-Cryptominer-Beapy-PCASTLE.pdf Special thanks to Fornax Void for letting me use some of his tracks: Cyberspace Database - Rāmen Multinode Cyberspace Database - Cyberspace Database