Atom.exe

1 view
Skip to first unread message

Henrietta Naughton

unread,
Aug 5, 2024, 2:09:04 PM8/5/24
to radasora
Ithink the title says it all. I downloaded Atom, which comes over as a zip file containing an executable, etc. When I right-click on a text file, source code file, etc, in Windows Explorer and select Open With > Choose default program... I don't see Atom in the list of "Recommended Programs" or "Other Programs" (when I use the arrow to expand that list). If I select "Browse" and use the file explorer to navigate to the Atom executable file and select that, when I return to the "Open with" dialog, I still do not see Atom as an option. I'm pretty clueless when it comes to Windows, so if anyone has any suggestions I'd really appreciate them - thanks!

Instead of associating your extensions to the atom.cmd file (which doesn't show the beautiful green Atom icon), I associated them with atom.exe, on C:\Users\\AppData\Local\atom\app-\ folder. After first association, Atom app showed on the apps list for subsequent extensions.


Using Windows 10 here. I right clicked the Atom icon on the desktop and picked properties. After that i copied the "Start in" location path. I looked over there with the windows explorer and found atom.exe so i typed this in the git bash:


Description: Atom.exe is not essential for Windows and will often cause problems. Atom.exe is located in a subfolder of the user's profile folder (in most cases C:\Users\USERNAME\AppData\Local\Mail.Ru\Atom\Application\).Known file sizes on Windows 10/11/7 are 13,179,660 bytes (21% of all occurrences), 1,462,968 bytes and 13 more variants.

There is no information about the author of the file. The atom.exe file is not a Windows system file. The program has no visible window. It is certified by a trustworthy company.Atom.exe is able to manipulate other programs, record keyboard and mouse inputs and monitor applications.Therefore the technical security rating is 74% dangerous.


If atom.exe is located in a subfolder of "C:\Program Files", the security rating is 69% dangerous. The file size is 13,179,660 bytes (75% of all occurrences) or 2,099,296 bytes.It is not a Windows system file. The file is certified by a trustworthy company. The program is not visible. The file is a file with no information about its developer.Atom.exe is able to manipulate other programs, monitor applications and record keyboard and mouse inputs.


Important: You should check the atom.exe process on your PC to see if it is a threat. We recommend Security Task Manager for verifying your computer's security. This was one of the Top Download Picks of The Washington Post and PC World.


The following programs have also been shown useful for a deeper analysis: ASecurity Task Manager examines the active atom process on your computer and clearly tells you what it is doing. Malwarebytes' well-known Banti-malware tool tells you if the atom.exe on your computer displays annoying ads, slowing it down. This type of unwanted adware program is not considered by some antivirus software to be a virus and is therefore not marked for cleanup.


A clean and tidy computer is the key requirement for avoiding PC trouble. This means running a scan for malware, cleaning your hard drive using 1cleanmgr and 2sfc /scannow, 3uninstalling programs that you no longer need, checking for Autostart programs (using 4msconfig) and enabling Windows' 5Automatic Update. Always remember to perform periodic backups, or at least to set restore points.


Should you experience an actual problem, try to recall the last thing you did, or the last thing you installed before the problem appeared for the first time. Use the 6resmon command to identify the processes that are causing your problem. Even for serious problems, rather than reinstalling Windows, you are better off repairing of your installation or, for Windows 8 and later versions, executing the 7DISM.exe /Online /Cleanup-image /Restorehealth command. This allows you to repair the operating system without losing data.


So let's say I am on my Desktop and I try opening a file called index.html by using: atom index.html. What this actually does is it creates a new file called index.html in the directory where atom.exe is located. Weirdly enough, I followed the exact same procedure for Sublime text, and when I do subl index.html, I am getting the file that I want. Why is this not working with Atom?


I found that when calling atom.exe from within wsl, the path is not interpreted correctly and defaults to atom.exe's path. In Windows, your wsl path starts with "\wsl$" which is the issue. You can use a drive map in Windows to get around this. I mapped "Z:" to "\wsl$\Ubuntu" and can open files from bash now with atom "Z:\home\user\index.html" for instance.


ABCluster is one of the most successful, powerful, and popular program for the global optimization of chemical cluster structures. The essential artificial bee colony algorithm of ABCluster enables the following tasks to be routine for every chemist:


Structure generator: rapidly generate clusters of assigned flexibilities (some bond rotations can be frozen) and complicated topology (like bi-phase, micelle, ligated) for subsequent studies.


One can connect ABCluster with the program that is most suitable for your own chemical systems. ABCluster provides programming interfaces, enabling you to connect ABCluster with any program!


ABCluster was initiated by Dr. Jun Zhang since 2015 and is still actively developed. If you have any bug reports, comments, suggestions or the possibility of cooperation on ABCluster, please feel free to contact to Dr. Jun Zhang via E-mail:


While I have provided a lot of interfaces to third-party programs for ABCluster, there are of course a lot of other programs for which interfaces are not available, like ADF, etc. If you have written one and think it works well, I would appreciate if you could send them to me.


ABCluster is an out-of-box program. When you download ABCluster, it is a .zip or .tar.gz file. Once you decompress it, ABCluster is ready to work so actually no installation is needed. Please note that the current version of ABCluster does not have a graphic user interface (GUI). One must use it in the command line of Windows or Linux.


Assume you put ABCluster (atom.exe, etc) in the directory D:\ABCluster, then right-click This PC and click Properties, Advanced System Settings, and Environment Variables. In System variables, select PATH and click Edit. In the editbox, add ;D:\ABCluster at the end of the texts in it, and click OK to confirm it.


Now, you can press Shift and right-click in any explorer window and click Open cmd window here to call the command line. Type atom or other ABCluster executable names to confirm that you can already call ABCluster commands.


If you prepare an input file on Windows and copy it to Linux, ABCluster may not recognize its format and report such an error. In this case, please transform the Windows file format into Linux one by dos2unix or using :set fileformat=unix in VIM.


ABCluster is parallelized by OpenMP. By default, it will use up all the CPU cores by default. If you want to change this behavior, please set OMP_NUM_THREADS variable to the number of CPU cores you want to use.


The GPU acceleration is currently only available for Linux version and can be run on arbitrarily number of GPU cards. You should have NVIDIA GPU cards and CUDA toolkit well configured before running GPU accelerated ABCluster.


For different compute capability, you should download different ABCluster. First, check the compute capability from -gpus. For example, if you have a NVIDIA A30 Tensor Core GPU, then you can find that its compute capability is 8.0, so you should download -Linux-GPU80 version. An inconsistent version of ABCluster may raise some errors like:


Note that from ABCluster 3.0, no PDF manual is provided in the distribution package. You are recommended to refer to the online documentation, but you can also download a PDF manual (may not be as up-to-date as the online version).


It has been reported that a new trojanized Super Mario Bros game installer is being circulated, which contains various malicious components, including the SupremeBot mining client, XMR miner, and the Open-source Umbral stealer.


Due to Mario's immense popularity as an entertaining game with millions of downloads, threat actors have taken advantage of this by distributing a modified version of the game's installer through various channels such as social media, phishing etc. This tempered Mario installer is spread as a self-extracting archive executable.

Fig.1- Compromised Super Mario game installer file icon (source: Cyble)


After being tampered with, Mario's installer file "Super-Mario-Bros.exe" is transformed into a trojan-infected variant of a Super Mario game installer, consisting of three executable files in which the "super-mario-forever-v702e.exe" represents the main, safe, and genuine application of the Mario game, among three executable files. Additionally, there exist two malicious executable files named "java.exe" and "atom.exe." During the game installation process, these files secretly find their way into the victim's AppData directory.


Once the malicious executables have been stored on the disk, these are executed by the installer to initiate the operation of an XMR (Monero) miner and a SupremeBot mining client. The malware gathers data about the target's hardware and establishes a connection with a mining server in order to initiate mining operations.


URL: (connect from SupremeBot)hxxp://silentlegion[.]duckdns[.]org/gate/update[.]php hxxp://silentlegion[.]duckdns[.]org/gate/connection[.]phphxxp://silentlegion[.]duckdns[.]org/gate/config[.]php




Best Practices and Recommendations:

It is advisable for users to periodically check their system performance and CPU usage.Enterprises ought to take measures to prevent users from downloading pirated software from Warez/Torrent websites, as the presence of malware in "Hack Tool" found on sites like YouTube, Torrent sites, etc., is a concern.The organizational information security policies/acceptable usage policies should be revised to explicitly prohibit the downloading and installation of crypto mining software on end-user systems.Users are encouraged to enable the automatic software update feature on their computer, mobile, and other connected devices.It is recommended to use a reputable antivirus and internet security software package on connected devices, such as PCs, laptops, and mobile devices.As part of ongoing security awareness and training, users should be educated not to open untrusted links and email attachments without first verifying their authenticity.Only click on URLs that clearly indicate the website domain. When in doubt, users can search for the organisation's website directly using search engines to ensure that the websites they visited are legitimate, to protect themselves from threats like phishing attacks and untrusted URLs.URLs that could be used to distribute malware, such as Torrent/Warez, should be blocked.It is important to monitor endpoints and servers for unexpected spikes in CPU and RAM utilization, which could indicate a potential malware infection.Carry out vulnerability Assessment and Penetration Testing (VAPT) and information security audit of critical networks/systems, especially database servers from CERT-IN empanelled auditors. Repeat audits at regular intervals.Individuals or organizations are not encouraged to pay the ransom, as this does not guarantee files will be released. Report such instances of fraud to CERT-In and Law Enforcement agencies.

3a8082e126
Reply all
Reply to author
Forward
0 new messages