Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.
Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.
Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.
RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.
Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.
SystemBC is a Remote Access Trojan (RAT) that can hide communication with the Command and Control server, and deposit other malware strains.
Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.
Vidar is a dangerous malware that steals information and cryptocurrency from infected users. It derives its name from the ancient Scandinavian god of Vengeance. This stealer has been terrorizing the internet since 2018.
ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
Launch configuration
Task duration:
300 seconds
Heavy Evasion option:
off
Network geolocation:
off
Additional time used:
240 seconds
MITM proxy:
off
Privacy:
Public submission
Fakenet option:
off
Route via Tor:
off
Autoconfirmation of UAC:
on
Network:
on
Software preset
Internet Explorer 11.0.9600.19596 KB4534251
Adobe Acrobat Reader DC (20.013.20064)
Adobe Flash Player 32 ActiveX (32.0.0.453)
Adobe Flash Player 32 NPAPI (32.0.0.453)
Adobe Flash Player 32 PPAPI (32.0.0.453)
Adobe Refresh Manager (1.8.0)
CCleaner (5.74)
FileZilla Client 3.51.0 (3.51.0)
Google Chrome (86.0.4240.198)
Google Update Helper (1.3.36.31)
Java 8 Update 271 (8.0.2710.9)
Java Auto Updater (2.8.271.9)
Microsoft .NET Framework 4.5.2 (4.5.51209)
Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Access MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Excel MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Groove MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office IME (Japanese) 2010 (14.0.4763.1000)
Microsoft Office IME (Korean) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (French) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (German) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Language Pack 2010 - French/Français (14.0.4763.1000)
Microsoft Office Language Pack 2010 - German/Deutsch (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Italian/Italiano (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Japanese/日本語 (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Korean/한국어 (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Portuguese/Português (Brasil) (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Russian/русский (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Spanish/Español (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Turkish/Türkçe (14.0.4763.1013)
Microsoft Office O MUI (French) 2010 (14.0.4763.1000)
Microsoft Office O MUI (German) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
Microsoft Office OneNote MUI (French) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (German) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Outlook MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
Microsoft Office PowerPoint MUI (French) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (German) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Professional 2010 (14.0.6029.1000)
Microsoft Office Proof (Arabic) 2010 (14.0.4763.1000)
Microsoft Office Proof (Basque) 2010 (14.0.4763.1000)
Microsoft Office Proof (Catalan) 2010 (14.0.4763.1000)
Microsoft Office Proof (Dutch) 2010 (14.0.4763.1000)
Microsoft Office Proof (English) 2010 (14.0.6029.1000)
Microsoft Office Proof (French) 2010 (14.0.6029.1000)
Microsoft Office Proof (Galician) 2010 (14.0.4763.1000)
Microsoft Office Proof (German) 2010 (14.0.4763.1000)
Microsoft Office Proof (Italian) 2010 (14.0.4763.1000)
Microsoft Office Proof (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Proof (Korean) 2010 (14.0.4763.1000)
Microsoft Office Proof (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Proof (Russian) 2010 (14.0.4763.1000)
Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
Microsoft Office Proof (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Proof (Ukrainian) 2010 (14.0.4763.1000)
Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
Microsoft Office Proofing (French) 2010 (14.0.4763.1000)
Microsoft Office Proofing (German) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Italian) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Korean) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Russian) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Publisher MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office SharePoint Designer MUI (French) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (German) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Shared MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Single Image 2010 (14.0.6029.1000)
Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Word MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office X MUI (French) 2010 (14.0.4763.1000)
Microsoft Office X MUI (German) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
Microsoft Visual C++ 2015-2019 Redistributable (x86) - 14.21.27702 (14.21.27702.2)
Microsoft Visual C++ 2019 X86 Additional Runtime - 14.21.27702 (14.21.27702)
Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.21.27702 (14.21.27702)
Mozilla Firefox 83.0 (x86 en-US) (83.0)
Mozilla Maintenance Service (83.0.0.7621)
Notepad++ (32-bit x86) (7.9.1)
Opera 12.15 (12.15.1748)
QGA (2.14.33)
Skype version 8.29 (8.29)
VLC media player (3.0.11)
WinRAR 5.91 (32-bit) (5.91.0)
Hotfixes
Client LanguagePack Package
Client Refresh LanguagePack Package
CodecPack Basic Package
Foundation Package
IE Hyphenation Parent Package English
IE Spelling Parent Package English
IE Troubleshooters Package
InternetExplorer Optional Package
InternetExplorer Package TopLevel
KB2479943
KB2491683
KB2506212
KB2506928
KB2532531
KB2533552
KB2533623
KB2534111
KB2545698
KB2547666
KB2552343
KB2560656
KB2564958
KB2574819
KB2579686
KB2585542
KB2604115
KB2620704
KB2621440
KB2631813
KB2639308
KB2640148
KB2653956
KB2654428
KB2656356
KB2660075
KB2667402
KB2676562
KB2685811
KB2685813
KB2685939
KB2690533
KB2698365
KB2705219
KB2719857
KB2726535
KB2727528
KB2729094
KB2729452
KB2731771
KB2732059
KB2736422
KB2742599
KB2750841
KB2758857
KB2761217
KB2770660
KB2773072
KB2786081
KB2789645
KB2799926
KB2800095
KB2807986
KB2808679
KB2813347
KB2813430
KB2820331
KB2834140
KB2836942
KB2836943
KB2840631
KB2843630
KB2847927
KB2852386
KB2853952
KB2857650
KB2861698
KB2862152
KB2862330
KB2862335
KB2864202
KB2868038
KB2871997
KB2872035
KB2884256
KB2891804
KB2893294
KB2893519
KB2894844
KB2900986
KB2908783
KB2911501
KB2912390
KB2918077
KB2919469
KB2923545
KB2931356
KB2937610
KB2943357
KB2952664
KB2968294
KB2970228
KB2972100
KB2972211
KB2973112
KB2973201
KB2977292
KB2978120
KB2978742
KB2984972
KB2984976
KB2984976 SP1
KB2985461
KB2991963
KB2992611
KB2999226
KB3004375
KB3006121
KB3006137
KB3010788
KB3011780
KB3013531
KB3019978
KB3020370
KB3020388
KB3021674
KB3021917
KB3022777
KB3023215
KB3030377
KB3031432
KB3035126
KB3037574
KB3042058
KB3045685
KB3046017
KB3046269
KB3054476
KB3055642
KB3059317
KB3060716
KB3061518
KB3067903
KB3068708
KB3071756
KB3072305
KB3074543
KB3075226
KB3078667
KB3080149
KB3086255
KB3092601
KB3093513
KB3097989
KB3101722
KB3102429
KB3102810
KB3107998
KB3108371
KB3108664
KB3109103
KB3109560
KB3110329
KB3115858
KB3118401
KB3122648
KB3123479
KB3126587
KB3127220
KB3133977
KB3137061
KB3138378
KB3138612
KB3138910
KB3139398
KB3139914
KB3140245
KB3147071
KB3150220
KB3150513
KB3155178
KB3156016
KB3159398
KB3161102
KB3161949
KB3170735
KB3172605
KB3179573
KB3184143
KB3185319
KB4019990
KB4040980
KB4474419
KB4490628
KB4524752
KB4532945
KB4536952
KB4567409
KB958488
KB976902
KB982018
LocalPack AU Package
LocalPack CA Package
LocalPack GB Package
LocalPack US Package
LocalPack ZA Package
Package 21 for KB2984976
Package 38 for KB2984976
Package 45 for KB2984976
Package 59 for KB2984976
Package 7 for KB2984976
Package 76 for KB2984976
PlatformUpdate Win7 SRV08R2 Package TopLevel
ProfessionalEdition
RDP BlueIP Package TopLevel
RDP WinIP Package TopLevel
RollupFix
UltimateEdition
WUClient SelfUpdate ActiveX
WUClient SelfUpdate Aux TopLevel
WUClient SelfUpdate Core TopLevel
WinMan WinIP Package TopLevel
MALICIOUS
Drops executable file immediately after starts
WinRAR.exe (PID: 4028)
PC_En-1653121520_setup.exe (PID: 2392)
setup_installer.exe (PID: 3868)
6288a1ea208a4_fd04fb523d.exe (PID: 3792)
6288a1e12b0d6_892f6331.exe (PID: 3340)
6288a1ea208a4_fd04fb523d.tmp (PID: 4124)
6288a1e916698_060a424.exe (PID: 732)
lBo5.exe (PID: 5976)
6288a1e12b0d6_892f6331.tmp (PID: 4672)
6288a1dfb8d08_cf8c29.exe (PID: 5220)
6288a1e12b0d6_892f6331.exe (PID: 4964)
6288a1e12b0d6_892f6331.tmp (PID: 5448)
6288a1e5cf6a8_a26c67c.exe (PID: 2840)
poweroff.exe (PID: 2288)
poweroff.tmp (PID: 4084)
Gozhinudejae.exe (PID: 5484)
HB0pcaJov.exe (PID: 4752)
installer.exe (PID: 5652)
glmQaq.exe (PID: 5780)
msiexec.exe (PID: 3920)
chrome.exe (PID: 4672)
chrome.exe (PID: 1836)
VkeDxukYR.exe (PID: 3884)
explorer.exe (PID: 5464)
w8LTwns6t.exe (PID: 3836)
NiceProcessX32.bmp.exe (PID: 892)
13.php.exe (PID: 1232)
cmd.exe (PID: 5616)
fxdd.bmp.exe (PID: 4212)
test33.bmp.exe (PID: 2328)
Service.bmp.exe (PID: 5028)
test33.bmp.exe (PID: 3248)
TrdngAnlzr22649.exe.exe (PID: 4020)
tde8etIr7miOb766p06Bs7fB.exe (PID: 5136)
utube2005.bmp.exe (PID: 4628)
K377K.exe (PID: 736)
Install.exe (PID: 5560)
download2.exe.exe (PID: 1152)
orxds.exe (PID: 4168)
build2.exe (PID: 1408)
setup.exe (PID: 5852)
Congiunto.exe.pif (PID: 5836)
ll.exe (PID: 4736)
Install.exe (PID: 1428)
Application was dropped or rewritten from another process
PC_En-1653121520_setup.exe (PID: 2392)
PC_En-1653121520_setup.exe (PID: 2940)
setup_installer.exe (PID: 3868)
6288a1e12b0d6_892f6331.exe (PID: 3340)
6288a1df09dd5_9fbf0bcee0.exe (PID: 4024)
6288a1de5a1db_30593f.exe (PID: 2516)
6288a1dfb8d08_cf8c29.exe (PID: 2024)
6288a1e20c44b_63f4244e0.exe (PID: 2616)
6288a1e5cf6a8_a26c67c.exe (PID: 2840)
6288a1ea208a4_fd04fb523d.exe (PID: 3792)
6288a1e443b77_fd2fce267.exe (PID: 4032)
6288a1e916698_060a424.exe (PID: 732)
6288a1e84c9ef_f8927b40db.exe (PID: 4168)
setup_install.exe (PID: 3680)
6288a1dfb8d08_cf8c29.exe (PID: 5220)
6288a1df09dd5_9fbf0bcee0.exe (PID: 5772)
6288a1e84c9ef_f8927b40db.exe (PID: 1024)
1518327346.exe (PID: 5096)
7231574788.exe (PID: 4380)
6288a1e12b0d6_892f6331.exe (PID: 4964)
Nihalehequ.exe (PID: 2752)
7231574788.exe (PID: 4968)
UNiXVEI3wd.exe (PID: 4876)
Gozhinudejae.exe (PID: 5484)
poweroff.exe (PID: 2288)
HB0pcaJov.exe (PID: 4752)
Setup.exe (PID: 2696)
installer.exe (PID: 5652)
gcleaner.exe (PID: 916)
glmQaq.exe (PID: 5780)
strongix.exe (PID: 2060)
random.exe (PID: 6140)
random.exe (PID: 5932)
Power Off.exe (PID: 4812)
handselfdiy_0.exe (PID: 5980)
chrome.exe (PID: 4672)
b123.exe (PID: 5108)
Cleaner.exe (PID: 5776)
installer.exe (PID: 4760)
Qadddgh25r.exe (PID: 5460)
hPeKSFoca.exe (PID: 4740)
hPeKSFoca.exe (PID: 2620)
VkeDxukYR.exe (PID: 3884)
M2rf60JTO.exe (PID: 188)
Tabivuz.exe (PID: 5372)
w8LTwns6t.exe (PID: 3836)
NiceProcessX32.bmp.exe (PID: 892)
SetupMEXX.exe.exe (PID: 3988)
rrmix.exe.exe (PID: 5424)
13.php.exe (PID: 1232)
Service.bmp.exe (PID: 5028)
Offscum.exe.exe (PID: 5208)
test33.bmp.exe (PID: 4064)
TrdngAnlzr22649.exe.exe (PID: 4020)
FJEfRXZ.exe.exe (PID: 648)
6523.exe.exe (PID: 5352)
mixinte2001.bmp.exe (PID: 5816)
test33.bmp.exe (PID: 2328)
wam.exe.exe (PID: 2940)
Fenix_8.bmp.exe (PID: 1040)
Cleaner.exe (PID: 5820)
prolivv.bmp.exe (PID: 5996)
real2001.bmp.exe (PID: 5900)
mouvcfbd.exe (PID: 5584)
Cleaner.exe (PID: 4828)
lokes_1.bmp.exe (PID: 5500)
arabcode_crypted_3.bmp.exe (PID: 5728)
norm2.bmp.exe (PID: 1120)
olympteam_build_crypted_2.bmp.exe (PID: 4760)
fxdd.bmp.exe (PID: 4212)
ShortnessUnsol.bmp.exe (PID: 5856)
unmatured.bmp.exe (PID: 2960)
orxds.exe (PID: 4168)
test33.bmp.exe (PID: 5432)
test33.bmp.exe (PID: 3248)
tde8etIr7miOb766p06Bs7fB.exe (PID: 5136)
orxds.exe (PID: 1772)
build2.exe (PID: 5932)
build2.exe (PID: 1408)
7AAAK.exe (PID: 3960)
NiceProcessX32.bmp.exe (PID: 4764)
4M9D8.exe (PID: 4208)
mixinte2001.bmp.exe (PID: 2860)
random.exe.exe (PID: 1844)
FJEfRXZ.exe.exe (PID: 5432)
random.exe.exe (PID: 4176)
setup777.exe.exe (PID: 3956)
K377K.exe (PID: 736)
BFJJJ.exe (PID: 5408)
search_hyperfs_310.exe.exe (PID: 4896)
utube2005.bmp.exe (PID: 4628)
Install.exe (PID: 5560)
download2.exe.exe (PID: 1152)
Install.exe (PID: 1428)
InvisBrowser45856.exe (PID: 1036)
setup331.exe (PID: 4600)
ll.exe (PID: 3200)
ll.exe (PID: 4736)
setup.exe (PID: 5852)
orxds.exe (PID: 4708)
Executes PowerShell scripts
cmd.exe (PID: 844)
Loads dropped or rewritten executable
setup_install.exe (PID: 3680)
rundll32.exe (PID: 5240)
rundll32.exe (PID: 5920)
Cleaner.exe (PID: 5776)
installer.exe (PID: 5652)
Cleaner.exe (PID: 5820)
Cleaner.exe (PID: 4828)
real2001.bmp.exe (PID: 5900)
UNiXVEI3wd.exe (PID: 4876)
b123.exe (PID: 5108)
rundll32.exe (PID: 3260)
build2.exe (PID: 1408)
taskkill.exe (PID: 916)
cmd.exe (PID: 4112)
random.exe.exe (PID: 4176)
cmd.exe (PID: 648)
conhost.exe (PID: 5852)
conhost.exe (PID: 3320)
find.exe (PID: 5864)
taskkill.exe (PID: 4296)
chrome.exe (PID: 3052)
conhost.exe (PID: 4648)
iexplore.exe (PID: 3404)
iexplore.exe (PID: 2908)
conhost.exe (PID: 2928)
cmd.exe (PID: 1732)
taskkill.exe (PID: 3148)
7231574788.exe (PID: 4968)
conhost.exe (PID: 3580)
iexplore.exe (PID: 1068)
6288a1e916698_060a424.exe (PID: 732)
SetupMEXX.exe.exe (PID: 3988)
cmd.exe (PID: 5120)
conhost.exe (PID: 4844)
chrome.exe (PID: 1448)
conhost.exe (PID: 5868)
WerFault.exe (PID: 4572)
chrome.exe (PID: 1560)
WerFault.exe (PID: 3732)
6288a1e84c9ef_f8927b40db.exe (PID: 4168)
svchost.exe (PID: 4824)
chrome.exe (PID: 268)
test33.bmp.exe (PID: 4064)
ftp.exe (PID: 3348)
chrome.exe (PID: 3524)
msiexec.exe (PID: 4916)
tasklist.exe (PID: 3308)
BFJJJ.exe (PID: 5408)
wmiprvse.exe (PID: 400)
find.exe (PID: 2932)
schtasks.exe (PID: 4060)
chrome.exe (PID: 1632)
setup331.exe (PID: 4600)
chrome.exe (PID: 3504)
chrome.exe (PID: 2460)
cmd.exe (PID: 4700)
FJEfRXZ.exe.exe (PID: 648)
schtasks.exe (PID: 5392)
cmd.exe (PID: 5616)
conhost.exe (PID: 4968)
conhost.exe (PID: 1796)
svchost.exe (PID: 880)
chrome.exe (PID: 1836)
1518327346.exe (PID: 5096)
conhost.exe (PID: 3960)
schtasks.exe (PID: 2456)
cmd.exe (PID: 3200)
6288a1e5cf6a8_a26c67c.exe (PID: 2840)
chrome.exe (PID: 1228)
TrdngAnlzr22649.exe.exe (PID: 4020)
chrome.exe (PID: 3152)
find.exe (PID: 4676)
search_hyperfs_310.exe.exe (PID: 4896)
DllHost.exe (PID: 3048)
chrome.exe (PID: 3944)
conhost.exe (PID: 5616)
poweroff.exe (PID: 2288)
conhost.exe (PID: 3712)
arabcode_crypted_3.bmp.exe (PID: 5728)
conhost.exe (PID: 1192)
chrome.exe (PID: 940)
tasklist.exe (PID: 4324)
chrome.exe (PID: 1860)
download2.exe.exe (PID: 1152)
test33.bmp.exe (PID: 3248)
SearchProtocolHost.exe (PID: 4392)
chrome.exe (PID: 2036)
control.exe (PID: 2464)
conhost.exe (PID: 6128)
explorer.exe (PID: 3952)
conhost.exe (PID: 3884)
conhost.exe (PID: 4320)
chrome.exe (PID: 2712)
cmd.exe (PID: 5292)
WinRAR.exe (PID: 4028)
DllHost.exe (PID: 3992)
DllHost.exe (PID: 4500)
DllHost.exe (PID: 3636)
conhost.exe (PID: 4524)
hPeKSFoca.exe (PID: 2620)
taskkill.exe (PID: 3408)
chrome.exe (PID: 5828)
chrome.exe (PID: 2800)
NiceProcessX32.bmp.exe (PID: 892)
rundll32.exe (PID: 4812)
cmd.exe (PID: 4940)
chrome.exe (PID: 3968)
prolivv.bmp.exe (PID: 5996)
fxdd.bmp.exe (PID: 4212)
setup.exe (PID: 5852)
cmd.exe (PID: 5240)
build2.exe (PID: 5932)
PC_En-1653121520_setup.exe (PID: 2940)
cmd.exe (PID: 2672)
setup777.exe.exe (PID: 3956)
chrome.exe (PID: 6040)
timeout.exe (PID: 4248)
6288a1df09dd5_9fbf0bcee0.exe (PID: 4024)
mouvcfbd.exe (PID: 5584)
WerFault.exe (PID: 5132)
DllHost.exe (PID: 4276)
conhost.exe (PID: 2408)
chrome.exe (PID: 6100)
cmd.exe (PID: 5432)
cmd.exe (PID: 2636)
schtasks.exe (PID: 4272)
conhost.exe (PID: 2924)
rundll32.exe (PID: 3120)
setup_installer.exe (PID: 3868)
cmd.exe (PID: 4500)
conhost.exe (PID: 4912)
conhost.exe (PID: 5400)
sc.exe (PID: 4532)
tde8etIr7miOb766p06Bs7fB.exe (PID: 5136)
conhost.exe (PID: 2868)
Qadddgh25r.exe (PID: 5460)
6288a1ea208a4_fd04fb523d.exe (PID: 3792)
conhost.exe (PID: 452)
Setup.exe (PID: 2696)
cmd.exe (PID: 1804)
chrome.exe (PID: 2180)
control.exe (PID: 5128)
Service.bmp.exe (PID: 5028)
DllHost.exe (PID: 4768)
strongix.exe (PID: 2060)
WerFault.exe (PID: 3832)
6288a1e443b77_fd2fce267.exe (PID: 4032)
cmd.exe (PID: 3952)
WerFault.exe (PID: 4932)
icacls.exe (PID: 3152)
rrmix.exe.exe (PID: 5424)
reg.exe (PID: 4692)
random.exe (PID: 6140)
svchost.exe (PID: 2580)
cmd.exe (PID: 2992)
handselfdiy_0.exe (PID: 5980)
Congiunto.exe.pif (PID: 5836)
test33.bmp.exe (PID: 2328)
InstallUtil.exe (PID: 2924)
K377K.exe (PID: 736)
6288a1e20c44b_63f4244e0.exe (PID: 2616)
olympteam_build_crypted_2.bmp.exe (PID: 4760)
utube2005.bmp.exe (PID: 4628)
cmd.exe (PID: 5224)
conhost.exe (PID: 1780)
6288a1dfb8d08_cf8c29.exe (PID: 2024)
taskeng.exe (PID: 4104)
PC_En-1653121520_setup.exe (PID: 2392)
Install.exe (PID: 5560)
HB0pcaJov.exe (PID: 4752)
cmd.exe (PID: 4020)
conhost.exe (PID: 5200)
svchost.exe (PID: 4132)
13.php.exe (PID: 1232)
ShortnessUnsol.bmp.exe (PID: 5856)
orxds.exe (PID: 4168)
M2rf60JTO.exe (PID: 188)
chrome.exe (PID: 3956)
DllHost.exe (PID: 4648)
DllHost.exe (PID: 5516)
DllHost.exe (PID: 3804)
cmd.exe (PID: 844)
AppLaunch.exe (PID: 2820)
6288a1dfb8d08_cf8c29.exe (PID: 5220)
VkeDxukYR.exe (PID: 3884)
chrome.exe (PID: 3652)
NOTEPAD.EXE (PID: 2920)
Fenix_8.bmp.exe (PID: 1040)
ll.exe (PID: 3200)
conhost.exe (PID: 4692)
AppLaunch.exe (PID: 6016)
conhost.exe (PID: 5596)
test33.bmp.exe (PID: 5432)
glmQaq.exe (PID: 5780)
6288a1df09dd5_9fbf0bcee0.exe (PID: 5772)
cmd.exe (PID: 4852)
conhost.exe (PID: 5228)
svchost.exe (PID: 1860)
conhost.exe (PID: 5528)
FJEfRXZ.exe.exe (PID: 5432)
conhost.exe (PID: 3180)
chrome.exe (PID: 2516)
ftp.exe (PID: 2216)
conhost.exe (PID: 4780)
chrome.exe (PID: 3316)
hPeKSFoca.exe (PID: 4740)
NiceProcessX32.bmp.exe (PID: 4764)
InvisBrowser45856.exe (PID: 1036)
explorer.exe (PID: 5464)
AppLaunch.exe (PID: 564)
WerFault.exe (PID: 4524)
cmd.exe (PID: 3948)
conhost.exe (PID: 5456)
DllHost.exe (PID: 2076)
unmatured.bmp.exe (PID: 2960)
msiexec.exe (PID: 3672)
DllHost.exe (PID: 2232)
cmd.exe (PID: 4612)
6523.exe.exe (PID: 5352)
Gozhinudejae.exe (PID: 5484)
cmd.exe (PID: 4300)
6288a1de5a1db_30593f.exe (PID: 2516)
chrome.exe (PID: 2984)
iexplore.exe (PID: 5236)
mixinte2001.bmp.exe (PID: 2860)
cmd.exe (PID: 3896)
cmd.exe (PID: 1780)
WerFault.exe (PID: 4696)
chrome.exe (PID: 3460)
cmd.exe (PID: 3252)
6288a1e84c9ef_f8927b40db.exe (PID: 1024)
cmd.exe (PID: 1036)
taskkill.exe (PID: 2456)
mixinte2001.bmp.exe (PID: 5816)
6288a1e12b0d6_892f6331.exe (PID: 3340)
lokes_1.bmp.exe (PID: 5500)
findstr.exe (PID: 4680)
chrome.exe (PID: 2492)
conhost.exe (PID: 4204)
DllHost.exe (PID: 120)
cmd.exe (PID: 2536)
PING.EXE (PID: 2464)
conhost.exe (PID: 4224)
WerFault.exe (PID: 3664)
chrome.exe (PID: 3376)
WerFault.exe (PID: 4192)
wam.exe.exe (PID: 2940)
cmd.exe (PID: 3980)
orxds.exe (PID: 1772)
DllHost.exe (PID: 3376)
consent.exe (PID: 3176)
DllHost.exe (PID: 6092)
DllHost.exe (PID: 2496)
chrome.exe (PID: 4672)
SearchFilterHost.exe (PID: 4928)
conhost.exe (PID: 564)
powershell.exe (PID: 2772)
gcleaner.exe (PID: 916)
4M9D8.exe (PID: 4208)
cmd.exe (PID: 5464)
ntvdm.exe (PID: 4972)
cmd.exe (PID: 5292)
cmd.exe (PID: 3280)
conhost.exe (PID: 4724)
cmd.exe (PID: 3296)
Congiunto.exe.pif (PID: 3316)
WerFault.exe (PID: 4820)
WinRAR.exe (PID: 3392)
6288a1e12b0d6_892f6331.exe (PID: 4964)
cmd.exe (PID: 3836)
Offscum.exe.exe (PID: 5208)
7AAAK.exe (PID: 3960)
cmd.exe (PID: 2192)
conhost.exe (PID: 1960)
sc.exe (PID: 3496)
AppLaunch.exe (PID: 5972)
conhost.exe (PID: 5572)
cmd.exe (PID: 5116)
chrome.exe (PID: 5384)
Tabivuz.exe (PID: 5372)
cmd.exe (PID: 5584)
chrome.exe (PID: 2464)
netsh.exe (PID: 2672)
chrome.exe (PID: 3344)
random.exe.exe (PID: 1844)
norm2.bmp.exe (PID: 1120)
conhost.exe (PID: 4908)
installer.exe (PID: 4760)
ll.exe (PID: 4736)
chrome.exe (PID: 1844)
chrome.exe (PID: 2212)
Install.exe (PID: 1428)
sc.exe (PID: 5984)
conhost.exe (PID: 4280)
Nihalehequ.exe (PID: 2752)
conhost.exe (PID: 2476)
conhost.exe (PID: 3044)
cmd.exe (PID: 2520)
tasklist.exe (PID: 6076)
7231574788.exe (PID: 4380)
rundll32.exe (PID: 5332)
random.exe (PID: 5932)
w8LTwns6t.exe (PID: 3836)
chrome.exe (PID: 5360)
Power Off.exe (PID: 4812)
control.exe (PID: 5424)
taskkill.exe (PID: 4684)
rundll32.exe (PID: 5604)
find.exe (PID: 3464)
tasklist.exe (PID: 5080)
forfiles.exe (PID: 2456)
Congiunto.exe.pif (PID: 3000)
forfiles.exe (PID: 5916)
conhost.exe (PID: 5728)
conhost.exe (PID: 2476)
orxds.exe (PID: 4708)
cmd.exe (PID: 4112)
reg.exe (PID: 872)
cmd.exe (PID: 1992)
reg.exe (PID: 5828)
conhost.exe (PID: 6096)
rundll32.exe (PID: 2992)
schtasks.exe (PID: 932)
conhost.exe (PID: 2344)
schtasks.exe (PID: 5256)
WerFault.exe (PID: 5624)
findstr.exe (PID: 3868)
Congiunto.exe.pif (PID: 4812)
powershell.EXE (PID: 3888)
conhost.exe (PID: 1180)
PING.EXE (PID: 2088)
conhost.exe (PID: 5052)
schtasks.exe (PID: 4296)
conhost.exe (PID: 4088)
schtasks.exe (PID: 3580)
Actions looks like stealing of personal data
6288a1de5a1db_30593f.exe (PID: 2516)
cmd.exe (PID: 5224)
6288a1df09dd5_9fbf0bcee0.exe (PID: 5772)
svchost.exe (PID: 1860)
strongix.exe (PID: 2060)
b123.exe (PID: 5108)
UNiXVEI3wd.exe (PID: 4876)
AppLaunch.exe (PID: 5972)
rrmix.exe.exe (PID: 5424)
AppLaunch.exe (PID: 2820)
AppLaunch.exe (PID: 6016)
SetupMEXX.exe.exe (PID: 3988)
Offscum.exe.exe (PID: 5208)
ShortnessUnsol.bmp.exe (PID: 5856)
Fenix_8.bmp.exe (PID: 1040)
lokes_1.bmp.exe (PID: 5500)
InvisBrowser45856.exe (PID: 1036)
real2001.bmp.exe (PID: 5900)
rundll32.exe (PID: 3260)
download2.exe.exe (PID: 1152)
build2.exe (PID: 1408)
7AAAK.exe (PID: 3960)
Stealing of credential data
6288a1de5a1db_30593f.exe (PID: 2516)
svchost.exe (PID: 1860)
real2001.bmp.exe (PID: 5900)
InvisBrowser45856.exe (PID: 1036)
rundll32.exe (PID: 3260)
build2.exe (PID: 1408)
Changes settings of System certificates
6288a1dfb8d08_cf8c29.exe (PID: 5220)
installer.exe (PID: 5652)
svchost.exe (PID: 1860)
Gozhinudejae.exe (PID: 5484)
w8LTwns6t.exe (PID: 3836)
Service.bmp.exe (PID: 5028)
test33.bmp.exe (PID: 2328)
Steals credentials from Web Browsers
6288a1de5a1db_30593f.exe (PID: 2516)
6288a1df09dd5_9fbf0bcee0.exe (PID: 5772)
svchost.exe (PID: 1860)
b123.exe (PID: 5108)
UNiXVEI3wd.exe (PID: 4876)
strongix.exe (PID: 2060)
AppLaunch.exe (PID: 5972)
rrmix.exe.exe (PID: 5424)
SetupMEXX.exe.exe (PID: 3988)
Offscum.exe.exe (PID: 5208)
AppLaunch.exe (PID: 6016)
Fenix_8.bmp.exe (PID: 1040)
real2001.bmp.exe (PID: 5900)
InvisBrowser45856.exe (PID: 1036)
build2.exe (PID: 1408)
AppLaunch.exe (PID: 2820)
Loads the Task Scheduler DLL interface
7231574788.exe (PID: 4380)
schtasks.exe (PID: 3580)
Connects to CnC server
6288a1e916698_060a424.exe (PID: 732)
6288a1df09dd5_9fbf0bcee0.exe (PID: 5772)
UNiXVEI3wd.exe (PID: 4876)
strongix.exe (PID: 2060)
w8LTwns6t.exe (PID: 3836)
Offscum.exe.exe (PID: 5208)
rrmix.exe.exe (PID: 5424)
Fenix_8.bmp.exe (PID: 1040)
AppLaunch.exe (PID: 5972)
AppLaunch.exe (PID: 2820)
AppLaunch.exe (PID: 6016)
orxds.exe (PID: 4168)
SetupMEXX.exe.exe (PID: 3988)
lokes_1.bmp.exe (PID: 5500)
ShortnessUnsol.bmp.exe (PID: 5856)
Service.bmp.exe (PID: 5028)
tde8etIr7miOb766p06Bs7fB.exe (PID: 5136)
7AAAK.exe (PID: 3960)
4M9D8.exe (PID: 4208)
svchost.exe (PID: 4132)
rundll32.exe (PID: 3260)
Application was injected by another process
svchost.exe (PID: 860)
Runs injected code in another process
rundll32.exe (PID: 5240)
rundll32.exe (PID: 5920)
rundll32.exe (PID: 5332)
Changes the autorun value in the registry
lBo5.exe (PID: 5976)
chrome.exe (PID: 4672)
FJEfRXZ.exe.exe (PID: 648)
test33.bmp.exe (PID: 2328)
FJEfRXZ.exe.exe (PID: 5432)
K377K.exe (PID: 736)
REDLINE was detected
6288a1df09dd5_9fbf0bcee0.exe (PID: 5772)
strongix.exe (PID: 2060)
rrmix.exe.exe (PID: 5424)
Offscum.exe.exe (PID: 5208)
Fenix_8.bmp.exe (PID: 1040)
AppLaunch.exe (PID: 5972)
AppLaunch.exe (PID: 2820)
AppLaunch.exe (PID: 6016)
SetupMEXX.exe.exe (PID: 3988)
lokes_1.bmp.exe (PID: 5500)
ShortnessUnsol.bmp.exe (PID: 5856)
7AAAK.exe (PID: 3960)
4M9D8.exe (PID: 4208)
REDLINE detected by memory dumps
6288a1df09dd5_9fbf0bcee0.exe (PID: 5772)
Offscum.exe.exe (PID: 5208)
rrmix.exe.exe (PID: 5424)
AppLaunch.exe (PID: 5972)
norm2.bmp.exe (PID: 1120)
AppLaunch.exe (PID: 6016)
AppLaunch.exe (PID: 2820)
AppLaunch.exe (PID: 564)
SYSTEMBC detected by memory dumps
7231574788.exe (PID: 4380)
7231574788.exe (PID: 4968)
ARKEI detected by memory dumps
UNiXVEI3wd.exe (PID: 4876)
Uses Task Scheduler to run other applications
cmd.exe (PID: 3200)
orxds.exe (PID: 4168)
Service.bmp.exe (PID: 5028)
Service.bmp.exe (PID: 5028)
Install.exe (PID: 1428)
Loads the Task Scheduler COM API
schtasks.exe (PID: 4060)
MsiExec.exe (PID: 4364)
installer.exe (PID: 5652)
schtasks.exe (PID: 4272)
test33.bmp.exe (PID: 2328)
test33.bmp.exe (PID: 3248)
schtasks.exe (PID: 2456)
schtasks.exe (PID: 5392)
schtasks.exe (PID: 5256)
schtasks.exe (PID: 932)
schtasks.exe (PID: 4296)
HILOTI was detected
explorer.exe (PID: 5464)
ARKEI was detected
UNiXVEI3wd.exe (PID: 4876)
Disables Windows Defender
w8LTwns6t.exe (PID: 3836)
tde8etIr7miOb766p06Bs7fB.exe (PID: 5136)
SOCELARS was detected
w8LTwns6t.exe (PID: 3836)
tde8etIr7miOb766p06Bs7fB.exe (PID: 5136)
TOFSEE detected by memory dumps
13.php.exe (PID: 1232)
svchost.exe (PID: 880)
Runs app for hidden code execution
cmd.exe (PID: 4112)
cmd.exe (PID: 3252)
Uses TASKLIST.EXE to query information about running processes
cmd.exe (PID: 4500)
cmd.exe (PID: 2672)
Uses SVCHOST.EXE for hidden code execution
mouvcfbd.exe (PID: 5584)
svchost.exe (PID: 880)
AMADEY detected by memory dumps
fxdd.bmp.exe (PID: 4212)
orxds.exe (PID: 4168)
orxds.exe (PID: 1772)
AMADEY was detected
orxds.exe (PID: 4168)
Changes the Startup folder
reg.exe (PID: 4692)
Runs PING.EXE for delay simulation
cmd.exe (PID: 4500)
cmd.exe (PID: 2672)
STOP was detected
test33.bmp.exe (PID: 3248)
MINER was detected
svchost.exe (PID: 4132)
TOFSEE was detected
svchost.exe (PID: 880)
Modifies exclusions in Windows Defender
svchost.exe (PID: 880)
SUSPICIOUS
Reads Microsoft Outlook installation path
iexplore.exe (PID: 1068)
chrome.exe (PID: 1860)
iexplore.exe (PID: 3404)
Checks supported languages
wmiprvse.exe (PID: 400)
WinRAR.exe (PID: 3392)
WinRAR.exe (PID: 4028)
PC_En-1653121520_setup.exe (PID: 2392)
setup_installer.exe (PID: 3868)
conhost.exe (PID: 3180)
setup_install.exe (PID: 3680)
cmd.exe (PID: 844)
powershell.exe (PID: 2772)
cmd.exe (PID: 3896)
6288a1de5a1db_30593f.exe (PID: 2516)
cmd.exe (PID: 3948)
cmd.exe (PID: 3952)
6288a1df09dd5_9fbf0bcee0.exe (PID: 4024)
cmd.exe (PID: 4020)
cmd.exe (PID: 3280)
6288a1dfb8d08_cf8c29.exe (PID: 2024)
cmd.exe (PID: 2636)
6288a1e12b0d6_892f6331.exe (PID: 3340)
cmd.exe (PID: 2992)
cmd.exe (PID: 1804)
6288a1e20c44b_63f4244e0.exe (PID: 2616)
cmd.exe (PID: 3836)
cmd.exe (PID: 2536)
6288a1e443b77_fd2fce267.exe (PID: 4032)
cmd.exe (PID: 2192)
6288a1ea208a4_fd04fb523d.tmp (PID: 4124)
6288a1ea208a4_fd04fb523d.exe (PID: 3792)
6288a1e5cf6a8_a26c67c.exe (PID: 2840)
6288a1e84c9ef_f8927b40db.exe (PID: 4168)
6288a1e916698_060a424.exe (PID: 732)
6288a1e12b0d6_892f6331.tmp (PID: 4672)
6288a1dfb8d08_cf8c29.exe (PID: 5220)
lBo5.exe (PID: 5976)
6288a1e84c9ef_f8927b40db.exe (PID: 1024)
1518327346.exe (PID: 5096)
cmd.exe (PID: 4940)
conhost.exe (PID: 4968)
6288a1df09dd5_9fbf0bcee0.exe (PID: 5772)
conhost.exe (PID: 4280)
Nihalehequ.exe (PID: 2752)
cmd.exe (PID: 3980)
7231574788.exe (PID: 4380)
6288a1e12b0d6_892f6331.exe (PID: 4964)
Gozhinudejae.exe (PID: 5484)
6288a1e12b0d6_892f6331.tmp (PID: 5448)
cmd.exe (PID: 5464)
conhost.exe (PID: 5572)
7231574788.exe (PID: 4968)
UNiXVEI3wd.exe (PID: 4876)
poweroff.exe (PID: 2288)
poweroff.tmp (PID: 4084)
Power Off.exe (PID: 4812)
cmd.exe (PID: 5432)
conhost.exe (PID: 1192)
Setup.exe (PID: 2696)
cmd.exe (PID: 5224)
HB0pcaJov.exe (PID: 4752)
conhost.exe (PID: 2868)
installer.exe (PID: 5652)
cmd.exe (PID: 4700)
conhost.exe (PID: 4780)
glmQaq.exe (PID: 5780)
conhost.exe (PID: 4908)
msiexec.exe (PID: 3920)
gcleaner.exe (PID: 916)
cmd.exe (PID: 4612)
MsiExec.exe (PID: 5640)
strongix.exe (PID: 2060)
cmd.exe (PID: 5120)
conhost.exe (PID: 5200)
random.exe (PID: 6140)
random.exe (PID: 5932)
conhost.exe (PID: 4648)
cmd.exe (PID: 3200)
cmd.exe (PID: 4300)
conhost.exe (PID: 4692)
MsiExec.exe (PID: 5348)
handselfdiy_0.exe (PID: 5980)
conhost.exe (PID: 3884)
MsiExec.exe (PID: 4364)
conhost.exe (PID: 1796)
cmd.exe (PID: 5240)
cmd.exe (PID: 4852)
chrome.exe (PID: 4672)
conhost.exe (PID: 4912)
b123.exe (PID: 5108)
cmd.exe (PID: 3296)
conhost.exe (PID: 4224)
cmd.exe (PID: 1780)
conhost.exe (PID: 2408)
cmd.exe (PID: 648)
cmd.exe (PID: 5116)
conhost.exe (PID: 5528)
Cleaner.exe (PID: 5776)
conhost.exe (PID: 5868)
cmd.exe (PID: 1036)
conhost.exe (PID: 2924)
conhost.exe (PID: 3712)
cmd.exe (PID: 1732)
installer.exe (PID: 4760)
Qadddgh25r.exe (PID: 5460)
InstallUtil.exe (PID: 2924)
M2rf60JTO.exe (PID: 188)
hPeKSFoca.exe (PID: 4740)
hPeKSFoca.exe (PID: 2620)
VkeDxukYR.exe (PID: 3884)
w8LTwns6t.exe (PID: 3836)
Tabivuz.exe (PID: 5372)
SetupMEXX.exe.exe (PID: 3988)
Service.bmp.exe (PID: 5028)
NiceProcessX32.bmp.exe (PID: 892)
rrmix.exe.exe (PID: 5424)
Offscum.exe.exe (PID: 5208)
conhost.exe (PID: 2928)
13.php.exe (PID: 1232)
TrdngAnlzr22649.exe.exe (PID: 4020)
test33.bmp.exe (PID: 4064)
6523.exe.exe (PID: 5352)
Fenix_8.bmp.exe (PID: 1040)
FJEfRXZ.exe.exe (PID: 648)
mixinte2001.bmp.exe (PID: 5816)
wam.exe.exe (PID: 2940)
cmd.exe (PID: 5292)
test33.bmp.exe (PID: 2328)
conhost.exe (PID: 4204)
conhost.exe (PID: 3960)
prolivv.bmp.exe (PID: 5996)
conhost.exe (PID: 5596)
cmd.exe (PID: 5616)
Cleaner.exe (PID: 5820)
real2001.bmp.exe (PID: 5900)
conhost.exe (PID: 564)
AppLaunch.exe (PID: 5972)
conhost.exe (PID: 2476)
conhost.exe (PID: 4724)
mouvcfbd.exe (PID: 5584)
conhost.exe (PID: 1780)
conhost.exe (PID: 5852)
lokes_1.bmp.exe (PID: 5500)
Cleaner.exe (PID: 4828)
conhost.exe (PID: 4844)
cmd.exe (PID: 4112)
cmd.exe (PID: 4500)
conhost.exe (PID: 3580)
arabcode_crypted_3.bmp.exe (PID: 5728)
norm2.bmp.exe (PID: 1120)
fxdd.bmp.exe (PID: 4212)
conhost.exe (PID: 452)
olympteam_build_crypted_2.bmp.exe (PID: 4760)
ShortnessUnsol.bmp.exe (PID: 5856)
unmatured.bmp.exe (PID: 2960)
conhost.exe (PID: 5616)
AppLaunch.exe (PID: 564)
AppLaunch.exe (PID: 2820)
AppLaunch.exe (PID: 6016)
orxds.exe (PID: 4168)
conhost.exe (PID: 5456)
cmd.exe (PID: 5584)
conhost.exe (PID: 1960)
conhost.exe (PID: 4320)
cmd.exe (PID: 5292)
test33.bmp.exe (PID: 5432)
Congiunto.exe.pif (PID: 5836)
test33.bmp.exe (PID: 3248)
build2.exe (PID: 5932)
conhost.exe (PID: 5228)
tde8etIr7miOb766p06Bs7fB.exe (PID: 5136)
conhost.exe (PID: 6128)
build2.exe (PID: 1408)
orxds.exe (PID: 1772)
7AAAK.exe (PID: 3960)
4M9D8.exe (PID: 4208)
NiceProcessX32.bmp.exe (PID: 4764)
setup777.exe.exe (PID: 3956)
mixinte2001.bmp.exe (PID: 2860)
random.exe.exe (PID: 1844)
FJEfRXZ.exe.exe (PID: 5432)
K377K.exe (PID: 736)
random.exe.exe (PID: 4176)
conhost.exe (PID: 3320)
conhost.exe (PID: 5400)
cmd.exe (PID: 3252)
cmd.exe (PID: 2672)
BFJJJ.exe (PID: 5408)
search_hyperfs_310.exe.exe (PID: 4896)
utube2005.bmp.exe (PID: 4628)
Install.exe (PID: 5560)
download2.exe.exe (PID: 1152)
Install.exe (PID: 1428)
InvisBrowser45856.exe (PID: 1036)
setup331.exe (PID: 4600)
conhost.exe (PID: 4524)
ll.exe (PID: 3200)
ll.exe (PID: 4736)
setup.exe (PID: 5852)
setup.tmp (PID: 6100)
conhost.exe (PID: 3044)
cmd.exe (PID: 2520)
Congiunto.exe.pif (PID: 3000)
conhost.exe (PID: 2476)
conhost.exe (PID: 5728)
orxds.exe (PID: 4708)
conhost.exe (PID: 6096)
conhost.exe (PID: 2344)
Congiunto.exe.pif (PID: 4812)
conhost.exe (PID: 1180)
powershell.EXE (PID: 3888)
conhost.exe (PID: 5052)
conhost.exe (PID: 4088)
Reads the computer name
wmiprvse.exe (PID: 400)
WinRAR.exe (PID: 3392)
WinRAR.exe (PID: 4028)
PC_En-1653121520_setup.exe (PID: 2392)
setup_installer.exe (PID: 3868)
powershell.exe (PID: 2772)
6288a1de5a1db_30593f.exe (PID: 2516)
6288a1df09dd5_9fbf0bcee0.exe (PID: 4024)
6288a1e443b77_fd2fce267.exe (PID: 4032)
6288a1e12b0d6_892f6331.tmp (PID: 4672)
6288a1ea208a4_fd04fb523d.tmp (PID: 4124)
6288a1dfb8d08_cf8c29.exe (PID: 5220)
6288a1dfb8d08_cf8c29.exe (PID: 2024)
6288a1e916698_060a424.exe (PID: 732)
6288a1e5cf6a8_a26c67c.exe (PID: 2840)
lBo5.exe (PID: 5976)
6288a1df09dd5_9fbf0bcee0.exe (PID: 5772)
1518327346.exe (PID: 5096)
7231574788.exe (PID: 4380)
Nihalehequ.exe (PID: 2752)
6288a1e12b0d6_892f6331.tmp (PID: 5448)
Gozhinudejae.exe (PID: 5484)
7231574788.exe (PID: 4968)
poweroff.tmp (PID: 4084)
Setup.exe (PID: 2696)
HB0pcaJov.exe (PID: 4752)
installer.exe (PID: 5652)
msiexec.exe (PID: 3920)
MsiExec.exe (PID: 5640)
random.exe (PID: 5932)
Power Off.exe (PID: 4812)
random.exe (PID: 6140)
glmQaq.exe (PID: 5780)
gcleaner.exe (PID: 916)
handselfdiy_0.exe (PID: 5980)
MsiExec.exe (PID: 5348)
chrome.exe (PID: 4672)
b123.exe (PID: 5108)
MsiExec.exe (PID: 4364)
UNiXVEI3wd.exe (PID: 4876)
Cleaner.exe (PID: 5776)
strongix.exe (PID: 2060)
installer.exe (PID: 4760)
VkeDxukYR.exe (PID: 3884)
w8LTwns6t.exe (PID: 3836)
Service.bmp.exe (PID: 5028)
rrmix.exe.exe (PID: 5424)
Offscum.exe.exe (PID: 5208)
Fenix_8.bmp.exe (PID: 1040)
wam.exe.exe (PID: 2940)
13.php.exe (PID: 1232)
test33.bmp.exe (PID: 2328)
Cleaner.exe (PID: 5820)
AppLaunch.exe (PID: 5972)
Cleaner.exe (PID: 4828)
norm2.bmp.exe (PID: 1120)
mouvcfbd.exe (PID: 5584)
AppLaunch.exe (PID: 564)
AppLaunch.exe (PID: 2820)
AppLaunch.exe (PID: 6016)
fxdd.bmp.exe (PID: 4212)
orxds.exe (PID: 4168)
SetupMEXX.exe.exe (PID: 3988)
mixinte2001.bmp.exe (PID: 5816)
real2001.bmp.exe (PID: 5900)
TrdngAnlzr22649.exe.exe (PID: 4020)
lokes_1.bmp.exe (PID: 5500)
ShortnessUnsol.bmp.exe (PID: 5856)
Congiunto.exe.pif (PID: 5836)
test33.bmp.exe (PID: 3248)
tde8etIr7miOb766p06Bs7fB.exe (PID: 5136)
build2.exe (PID: 1408)
orxds.exe (PID: 1772)
7AAAK.exe (PID: 3960)
setup777.exe.exe (PID: 3956)
random.exe.exe (PID: 1844)
random.exe.exe (PID: 4176)
BFJJJ.exe (PID: 5408)
search_hyperfs_310.exe.exe (PID: 4896)
K377K.exe (PID: 736)
download2.exe.exe (PID: 1152)
Install.exe (PID: 1428)
4M9D8.exe (PID: 4208)
setup331.exe (PID: 4600)
InvisBrowser45856.exe (PID: 1036)
ll.exe (PID: 3200)
ll.exe (PID: 4736)
setup.tmp (PID: 6100)
mixinte2001.bmp.exe (PID: 2860)
Congiunto.exe.pif (PID: 4812)
powershell.EXE (PID: 3888)
Modifies files in Chrome extension folder
chrome.exe (PID: 1632)
Reads Windows owner or organization settings
wmiprvse.exe (PID: 400)
6288a1ea208a4_fd04fb523d.tmp (PID: 4124)
6288a1e12b0d6_892f6331.tmp (PID: 4672)
6288a1e12b0d6_892f6331.tmp (PID: 5448)
poweroff.tmp (PID: 4084)
installer.exe (PID: 5652)
msiexec.exe (PID: 3920)
Executable content was dropped or overwritten
WinRAR.exe (PID: 4028)
setup_installer.exe (PID: 3868)
PC_En-1653121520_setup.exe (PID: 2392)
6288a1ea208a4_fd04fb523d.exe (PID: 3792)
6288a1e12b0d6_892f6331.exe (PID: 3340)
6288a1ea208a4_fd04fb523d.tmp (PID: 4124)
6288a1e916698_060a424.exe (PID: 732)
lBo5.exe (PID: 5976)
6288a1e12b0d6_892f6331.tmp (PID: 4672)
6288a1dfb8d08_cf8c29.exe (PID: 5220)
6288a1e12b0d6_892f6331.exe (PID: 4964)
6288a1e12b0d6_892f6331.tmp (PID: 5448)
6288a1e5cf6a8_a26c67c.exe (PID: 2840)
poweroff.exe (PID: 2288)
poweroff.tmp (PID: 4084)
Gozhinudejae.exe (PID: 5484)
HB0pcaJov.exe (PID: 4752)
glmQaq.exe (PID: 5780)
installer.exe (PID: 5652)
msiexec.exe (PID: 3920)
chrome.exe (PID: 4672)
explorer.exe (PID: 5464)
chrome.exe (PID: 1836)
VkeDxukYR.exe (PID: 3884)
NiceProcessX32.bmp.exe (PID: 892)
w8LTwns6t.exe (PID: 3836)
13.php.exe (PID: 1232)
cmd.exe (PID: 5616)
fxdd.bmp.exe (PID: 4212)
test33.bmp.exe (PID: 2328)
Service.bmp.exe (PID: 5028)
test33.bmp.exe (PID: 3248)
TrdngAnlzr22649.exe.exe (PID: 4020)
tde8etIr7miOb766p06Bs7fB.exe (PID: 5136)
utube2005.bmp.exe (PID: 4628)
K377K.exe (PID: 736)
Install.exe (PID: 5560)
download2.exe.exe (PID: 1152)
orxds.exe (PID: 4168)
build2.exe (PID: 1408)
setup.exe (PID: 5852)
Congiunto.exe.pif (PID: 5836)
ll.exe (PID: 4736)
Install.exe (PID: 1428)
Drops a file with a compile date too recent
WinRAR.exe (PID: 4028)
PC_En-1653121520_setup.exe (PID: 2392)
setup_installer.exe (PID: 3868)
6288a1ea208a4_fd04fb523d.exe (PID: 3792)
6288a1e12b0d6_892f6331.exe (PID: 3340)
6288a1ea208a4_fd04fb523d.tmp (PID: 4124)
6288a1e916698_060a424.exe (PID: 732)
lBo5.exe (PID: 5976)
6288a1e12b0d6_892f6331.tmp (PID: 4672)
6288a1dfb8d08_cf8c29.exe (PID: 5220)
6288a1e12b0d6_892f6331.exe (PID: 4964)
6288a1e12b0d6_892f6331.tmp (PID: 5448)
6288a1e5cf6a8_a26c67c.exe (PID: 2840)
poweroff.exe (PID: 2288)
poweroff.tmp (PID: 4084)
Gozhinudejae.exe (PID: 5484)
HB0pcaJov.exe (PID: 4752)
installer.exe (PID: 5652)
glmQaq.exe (PID: 5780)
msiexec.exe (PID: 3920)
chrome.exe (PID: 4672)
explorer.exe (PID: 5464)
chrome.exe (PID: 1836)
VkeDxukYR.exe (PID: 3884)
w8LTwns6t.exe (PID: 3836)
NiceProcessX32.bmp.exe (PID: 892)
13.php.exe (PID: 1232)
cmd.exe (PID: 5616)
fxdd.bmp.exe (PID: 4212)
test33.bmp.exe (PID: 2328)
Service.bmp.exe (PID: 5028)
test33.bmp.exe (PID: 3248)
TrdngAnlzr22649.exe.exe (PID: 4020)
tde8etIr7miOb766p06Bs7fB.exe (PID: 5136)
utube2005.bmp.exe (PID: 4628)
K377K.exe (PID: 736)
Install.exe (PID: 5560)
download2.exe.exe (PID: 1152)
orxds.exe (PID: 4168)
build2.exe (PID: 1408)
setup.exe (PID: 5852)
Congiunto.exe.pif (PID: 5836)
ll.exe (PID: 4736)
Install.exe (PID: 1428)
Application launched itself
WinRAR.exe (PID: 3392)
6288a1dfb8d08_cf8c29.exe (PID: 2024)
6288a1df09dd5_9fbf0bcee0.exe (PID: 4024)
6288a1e84c9ef_f8927b40db.exe (PID: 4168)
random.exe (PID: 6140)
hPeKSFoca.exe (PID: 4740)
test33.bmp.exe (PID: 4064)
cmd.exe (PID: 4112)
test33.bmp.exe (PID: 2328)
test33.bmp.exe (PID: 5432)
build2.exe (PID: 5932)
random.exe.exe (PID: 1844)
cmd.exe (PID: 3252)
svchost.exe (PID: 880)
ll.exe (PID: 3200)
Congiunto.exe.pif (PID: 5836)
Starts CMD.EXE for commands execution
setup_install.exe (PID: 3680)
6288a1e916698_060a424.exe (PID: 732)
Gozhinudejae.exe (PID: 5484)
glmQaq.exe (PID: 5780)
gcleaner.exe (PID: 916)
chrome.exe (PID: 4672)
6288a1e5cf6a8_a26c67c.exe (PID: 2840)
13.php.exe (PID: 1232)
FJEfRXZ.exe.exe (PID: 648)
cmd.exe (PID: 4112)
orxds.exe (PID: 4168)
mixinte2001.bmp.exe (PID: 5816)
FJEfRXZ.exe.exe (PID: 5432)
cmd.exe (PID: 3252)
mixinte2001.bmp.exe (PID: 2860)
forfiles.exe (PID: 2456)
forfiles.exe (PID: 5916)
Reads the Windows organization settings
6288a1ea208a4_fd04fb523d.tmp (PID: 4124)
wmiprvse.exe (PID: 400)
6288a1e12b0d6_892f6331.tmp (PID: 4672)
6288a1e12b0d6_892f6331.tmp (PID: 5448)
poweroff.tmp (PID: 4084)
installer.exe (PID: 5652)
msiexec.exe (PID: 3920)
Adds / modifies Windows certificates
6288a1dfb8d08_cf8c29.exe (PID: 5220)
installer.exe (PID: 5652)
Gozhinudejae.exe (PID: 5484)
w8LTwns6t.exe (PID: 3836)
Service.bmp.exe (PID: 5028)
test33.bmp.exe (PID: 2328)
Loads DLL from Mozilla Firefox
6288a1de5a1db_30593f.exe (PID: 2516)
InvisBrowser45856.exe (PID: 1036)
Reads CPU info
wmiprvse.exe (PID: 400)
6288a1de5a1db_30593f.exe (PID: 2516)
HB0pcaJov.exe (PID: 4752)
glmQaq.exe (PID: 5780)
b123.exe (PID: 5108)
UNiXVEI3wd.exe (PID: 4876)
real2001.bmp.exe (PID: 5900)
build2.exe (PID: 1408)
InvisBrowser45856.exe (PID: 1036)
Reads the date of Windows installation
wmiprvse.exe (PID: 400)
powershell.EXE (PID: 3888)
Reads Environment values
lBo5.exe (PID: 5976)
6288a1de5a1db_30593f.exe (PID: 2516)
Nihalehequ.exe (PID: 2752)
Gozhinudejae.exe (PID: 5484)
6288a1df09dd5_9fbf0bcee0.exe (PID: 5772)
installer.exe (PID: 5652)
HB0pcaJov.exe (PID: 4752)
MsiExec.exe (PID: 5640)
glmQaq.exe (PID: 5780)
MsiExec.exe (PID: 5348)
chrome.exe (PID: 4672)
Cleaner.exe (PID: 5776)
b123.exe (PID: 5108)
UNiXVEI3wd.exe (PID: 4876)
strongix.exe (PID: 2060)
Offscum.exe.exe (PID: 5208)
Fenix_8.bmp.exe (PID: 1040)
netsh.exe (PID: 2672)
Cleaner.exe (PID: 5820)
Cleaner.exe (PID: 4828)
AppLaunch.exe (PID: 2820)
wam.exe.exe (PID: 2940)
AppLaunch.exe (PID: 6016)
SetupMEXX.exe.exe (PID: 3988)
AppLaunch.exe (PID: 5972)
ShortnessUnsol.bmp.exe (PID: 5856)
rrmix.exe.exe (PID: 5424)
lokes_1.bmp.exe (PID: 5500)
K377K.exe (PID: 736)
real2001.bmp.exe (PID: 5900)
4M9D8.exe (PID: 4208)
build2.exe (PID: 1408)
7AAAK.exe (PID: 3960)
Reads Windows Product ID
wmiprvse.exe (PID: 400)
Creates files in the program directory
WerFault.exe (PID: 4192)
svchost.exe (PID: 860)
b123.exe (PID: 5108)
WerFault.exe (PID: 5132)
WerFault.exe (PID: 4820)
WerFault.exe (PID: 4524)
WerFault.exe (PID: 4696)
Service.bmp.exe (PID: 5028)
real2001.bmp.exe (PID: 5900)
build2.exe (PID: 1408)
Uses RUNDLL32.EXE to load library
control.exe (PID: 2464)
wmiprvse.exe (PID: 400)
control.exe (PID: 5128)
orxds.exe (PID: 4168)
control.exe (PID: 5424)
Creates files in the Windows directory
7231574788.exe (PID: 4380)
svchost.exe (PID: 860)
svchost.exe (PID: 1860)
svchost.exe (PID: 880)
schtasks.exe (PID: 3580)
Executed via WMI
rundll32.exe (PID: 5240)
rundll32.exe (PID: 5920)
Searches for installed software
6288a1de5a1db_30593f.exe (PID: 2516)
svchost.exe (PID: 1860)
6288a1df09dd5_9fbf0bcee0.exe (PID: 5772)
glmQaq.exe (PID: 5780)
b123.exe (PID: 5108)
UNiXVEI3wd.exe (PID: 4876)
strongix.exe (PID: 2060)
AppLaunch.exe (PID: 2820)
AppLaunch.exe (PID: 5972)
AppLaunch.exe (PID: 6016)
ShortnessUnsol.bmp.exe (PID: 5856)
rrmix.exe.exe (PID: 5424)
SetupMEXX.exe.exe (PID: 3988)
Fenix_8.bmp.exe (PID: 1040)
real2001.bmp.exe (PID: 5900)
build2.exe (PID: 1408)
Offscum.exe.exe (PID: 5208)
7AAAK.exe (PID: 3960)
Uses TASKKILL.EXE to kill process
cmd.exe (PID: 5464)
MsiExec.exe (PID: 5348)
cmd.exe (PID: 3296)
cmd.exe (PID: 648)
cmd.exe (PID: 5292)
cmd.exe (PID: 2520)
Creates a directory in Program Files
lBo5.exe (PID: 5976)
poweroff.tmp (PID: 4084)
msiexec.exe (PID: 3920)
Service.bmp.exe (PID: 5028)
Creates files in the user directory
6288a1e5cf6a8_a26c67c.exe (PID: 2840)
installer.exe (PID: 5652)
HB0pcaJov.exe (PID: 4752)
glmQaq.exe (PID: 5780)
svchost.exe (PID: 1860)
b123.exe (PID: 5108)
UNiXVEI3wd.exe (PID: 4876)
chrome.exe (PID: 4672)
explorer.exe (PID: 3952)
K377K.exe (PID: 736)
orxds.exe (PID: 4168)
Executed via Task Scheduler
7231574788.exe (PID: 4968)
Tabivuz.exe (PID: 5372)
orxds.exe (PID: 1772)
orxds.exe (PID: 4708)
powershell.EXE (PID: 3888)
Starts Internet Explorer
Nihalehequ.exe (PID: 2752)
Reads the cookies of Mozilla Firefox
6288a1df09dd5_9fbf0bcee0.exe (PID: 5772)
strongix.exe (PID: 2060)
AppLaunch.exe (PID: 5972)
rrmix.exe.exe (PID: 5424)
SetupMEXX.exe.exe (PID: 3988)
Offscum.exe.exe (PID: 5208)
AppLaunch.exe (PID: 6016)
Fenix_8.bmp.exe (PID: 1040)
build2.exe (PID: 1408)
AppLaunch.exe (PID: 2820)
Check for Java to be installed
MsiExec.exe (PID: 5640)
MsiExec.exe (PID: 5348)
Starts Microsoft Installer
installer.exe (PID: 5652)
Checks for external IP
svchost.exe (PID: 1860)
w8LTwns6t.exe (PID: 3836)
Service.bmp.exe (PID: 5028)
tde8etIr7miOb766p06Bs7fB.exe (PID: 5136)
Reads mouse settings
Tabivuz.exe (PID: 5372)
Congiunto.exe.pif (PID: 5836)
Congiunto.exe.pif (PID: 4812)
Creates executable files which already exist in Windows
WerFault.exe (PID: 4524)
Starts SC.EXE for service management
13.php.exe (PID: 1232)
Executed as Windows Service
mouvcfbd.exe (PID: 5584)
Uses NETSH.EXE for network configuration
13.php.exe (PID: 1232)
Creates or modifies windows services
svchost.exe (PID: 880)
Starts itself from another location
fxdd.bmp.exe (PID: 4212)
utube2005.bmp.exe (PID: 4628)
Uses ICACLS.EXE to modify access control list
test33.bmp.exe (PID: 2328)
Uses REG.EXE to modify Windows registry
cmd.exe (PID: 5584)
cmd.exe (PID: 4112)
cmd.exe (PID: 1992)
Uses TASKLIST.EXE to query information about running processes
cmd.exe (PID: 4500)
cmd.exe (PID: 2672)
Starts application with an unusual extension
cmd.exe (PID: 4500)
Congiunto.exe.pif (PID: 5836)
cmd.exe (PID: 2672)
Removes files from Windows directory
svchost.exe (PID: 860)
Executes application which crashes
TrdngAnlzr22649.exe.exe (PID: 4020)
Reads default file associations for system extensions
setup331.exe (PID: 4600)
Executes PowerShell scripts
powershell.EXE (PID: 3888)
INFO
Reads the computer name
iexplore.exe (PID: 2908)
iexplore.exe (PID: 1068)
DllHost.exe (PID: 2076)
chrome.exe (PID: 1632)
chrome.exe (PID: 3652)
chrome.exe (PID: 2460)
chrome.exe (PID: 268)
chrome.exe (PID: 1844)
chrome.exe (PID: 2516)
chrome.exe (PID: 1860)
DllHost.exe (PID: 2496)
DllHost.exe (PID: 3636)
chrome.exe (PID: 2800)
consent.exe (PID: 3176)
DllHost.exe (PID: 3048)
svchost.exe (PID: 2580)
WerFault.exe (PID: 4192)
control.exe (PID: 2464)
rundll32.exe (PID: 5240)
taskkill.exe (PID: 916)
svchost.exe (PID: 1860)
taskeng.exe (PID: 4104)
svchost.exe (PID: 4824)
iexplore.exe (PID: 5236)
iexplore.exe (PID: 3404)
chrome.exe (PID: 6100)
SearchProtocolHost.exe (PID: 4392)
explorer.exe (PID: 5464)
DllHost.exe (PID: 3992)
schtasks.exe (PID: 4060)
msiexec.exe (PID: 4916)
taskkill.exe (PID: 2456)
DllHost.exe (PID: 6092)
taskkill.exe (PID: 3408)
rundll32.exe (PID: 5920)
WerFault.exe (PID: 4820)
taskkill.exe (PID: 4296)
WerFault.exe (PID: 5132)
explorer.exe (PID: 3952)
DllHost.exe (PID: 2232)
WerFault.exe (PID: 4524)
SearchFilterHost.exe (PID: 4928)
DllHost.exe (PID: 3376)
sc.exe (PID: 4532)
sc.exe (PID: 3496)
WerFault.exe (PID: 4696)
sc.exe (PID: 5984)
netsh.exe (PID: 2672)
ftp.exe (PID: 2216)
tasklist.exe (PID: 3308)
WerFault.exe (PID: 3832)
svchost.exe (PID: 880)
WerFault.exe (PID: 4572)
schtasks.exe (PID: 4272)
DllHost.exe (PID: 5516)
icacls.exe (PID: 3152)
taskkill.exe (PID: 3148)
WerFault.exe (PID: 3732)
tasklist.exe (PID: 6076)
PING.EXE (PID: 2464)
DllHost.exe (PID: 120)
WerFault.exe (PID: 3664)
schtasks.exe (PID: 2456)
schtasks.exe (PID: 5392)
DllHost.exe (PID: 4500)
DllHost.exe (PID: 4276)
ftp.exe (PID: 3348)
tasklist.exe (PID: 4324)
control.exe (PID: 5128)
DllHost.exe (PID: 4768)
DllHost.exe (PID: 3804)
svchost.exe (PID: 4132)
rundll32.exe (PID: 3260)
WerFault.exe (PID: 4932)
DllHost.exe (PID: 4648)
rundll32.exe (PID: 5332)
taskkill.exe (PID: 4684)
control.exe (PID: 5424)
tasklist.exe (PID: 5080)
schtasks.exe (PID: 932)
WerFault.exe (PID: 5624)
schtasks.exe (PID: 5256)
PING.EXE (PID: 2088)
schtasks.exe (PID: 4296)
schtasks.exe (PID: 3580)
Checks supported languages
iexplore.exe (PID: 2908)
DllHost.exe (PID: 2076)
iexplore.exe (PID: 1068)
chrome.exe (PID: 268)
chrome.exe (PID: 3052)
chrome.exe (PID: 1560)
chrome.exe (PID: 3652)
chrome.exe (PID: 1448)
chrome.exe (PID: 1632)
chrome.exe (PID: 2464)
chrome.exe (PID: 3504)
chrome.exe (PID: 2460)
chrome.exe (PID: 2984)
chrome.exe (PID: 1228)
chrome.exe (PID: 1844)
chrome.exe (PID: 2036)
chrome.exe (PID: 3316)
chrome.exe (PID: 3376)
chrome.exe (PID: 2180)
chrome.exe (PID: 3956)
chrome.exe (PID: 2712)
chrome.exe (PID: 940)
chrome.exe (PID: 2516)
chrome.exe (PID: 3344)
chrome.exe (PID: 3944)
chrome.exe (PID: 2212)
chrome.exe (PID: 2492)
chrome.exe (PID: 3968)
chrome.exe (PID: 1860)
NOTEPAD.EXE (PID: 2920)
chrome.exe (PID: 2800)
DllHost.exe (PID: 2496)
DllHost.exe (PID: 3636)
consent.exe (PID: 3176)
DllHost.exe (PID: 3048)
svchost.exe (PID: 2580)
WerFault.exe (PID: 4192)
control.exe (PID: 2464)
rundll32.exe (PID: 3120)
svchost.exe (PID: 860)
rundll32.exe (PID: 5240)
chrome.exe (PID: 6040)
taskkill.exe (PID: 916)
taskeng.exe (PID: 4104)
svchost.exe (PID: 4824)
svchost.exe (PID: 1860)
iexplore.exe (PID: 3404)
chrome.exe (PID: 6100)
iexplore.exe (PID: 5236)
SearchProtocolHost.exe (PID: 4392)
explorer.exe (PID: 5464)
DllHost.exe (PID: 3992)
msiexec.exe (PID: 4916)
schtasks.exe (PID: 4060)
chrome.exe (PID: 3460)
taskkill.exe (PID: 2456)
DllHost.exe (PID: 6092)
taskkill.exe (PID: 3408)
WerFault.exe (PID: 4820)
rundll32.exe (PID: 5920)
chrome.exe (PID: 5360)
timeout.exe (PID: 4248)
taskkill.exe (PID: 4296)
WerFault.exe (PID: 5132)
chrome.exe (PID: 3524)
chrome.exe (PID: 3152)
DllHost.exe (PID: 2232)
explorer.exe (PID: 3952)
chrome.exe (PID: 1836)
WerFault.exe (PID: 4524)
SearchFilterHost.exe (PID: 4928)
DllHost.exe (PID: 3376)
sc.exe (PID: 4532)
sc.exe (PID: 5984)
sc.exe (PID: 3496)
WerFault.exe (PID: 4696)
netsh.exe (PID: 2672)
ftp.exe (PID: 2216)
tasklist.exe (PID: 3308)
find.exe (PID: 4676)
WerFault.exe (PID: 3832)
svchost.exe (PID: 880)
chrome.exe (PID: 5828)
WerFault.exe (PID: 4572)
schtasks.exe (PID: 4272)
reg.exe (PID: 4692)
DllHost.exe (PID: 5516)
icacls.exe (PID: 3152)
WerFault.exe (PID: 3732)
taskkill.exe (PID: 3148)
find.exe (PID: 2932)
tasklist.exe (PID: 6076)
findstr.exe (PID: 4680)
PING.EXE (PID: 2464)
DllHost.exe (PID: 120)
WerFault.exe (PID: 3664)
schtasks.exe (PID: 5392)
schtasks.exe (PID: 2456)
DllHost.exe (PID: 4500)
ntvdm.exe (PID: 4972)
DllHost.exe (PID: 4276)
ftp.exe (PID: 3348)
tasklist.exe (PID: 4324)
find.exe (PID: 5864)
chrome.exe (PID: 5384)
control.exe (PID: 5128)
rundll32.exe (PID: 4812)
DllHost.exe (PID: 4768)
DllHost.exe (PID: 3804)
msiexec.exe (PID: 3672)
svchost.exe (PID: 4132)
rundll32.exe (PID: 3260)
WerFault.exe (PID: 4932)
DllHost.exe (PID: 4648)
rundll32.exe (PID: 5332)
taskkill.exe (PID: 4684)
control.exe (PID: 5424)
rundll32.exe (PID: 5604)
tasklist.exe (PID: 5080)
find.exe (PID: 3464)
forfiles.exe (PID: 2456)
forfiles.exe (PID: 5916)
cmd.exe (PID: 4112)
reg.exe (PID: 872)
reg.exe (PID: 5828)
cmd.exe (PID: 1992)
schtasks.exe (PID: 5256)
schtasks.exe (PID: 932)
rundll32.exe (PID: 2992)
WerFault.exe (PID: 5624)
findstr.exe (PID: 3868)
PING.EXE (PID: 2088)
schtasks.exe (PID: 4296)
schtasks.exe (PID: 3580)
Creates files in the user directory
iexplore.exe (PID: 1068)
iexplore.exe (PID: 3404)
Reads the date of Windows installation
iexplore.exe (PID: 2908)
chrome.exe (PID: 2800)
iexplore.exe (PID: 5236)
Reads settings of System Certificates
iexplore.exe (PID: 1068)
iexplore.exe (PID: 2908)
chrome.exe (PID: 268)
6288a1dfb8d08_cf8c29.exe (PID: 5220)
powershell.exe (PID: 2772)
lBo5.exe (PID: 5976)
Nihalehequ.exe (PID: 2752)
Gozhinudejae.exe (PID: 5484)
iexplore.exe (PID: 3404)
6288a1de5a1db_30593f.exe (PID: 2516)
iexplore.exe (PID: 5236)
installer.exe (PID: 5652)
svchost.exe (PID: 1860)
random.exe (PID: 5932)
msiexec.exe (PID: 3920)
handselfdiy_0.exe (PID: 5980)
chrome.exe (PID: 4672)
MsiExec.exe (PID: 5348)
b123.exe (PID: 5108)
explorer.exe (PID: 5464)
explorer.exe (PID: 3952)
w8LTwns6t.exe (PID: 3836)
Service.bmp.exe (PID: 5028)
test33.bmp.exe (PID: 2328)
Offscum.exe.exe (PID: 5208)
wam.exe.exe (PID: 2940)
test33.bmp.exe (PID: 3248)
tde8etIr7miOb766p06Bs7fB.exe (PID: 5136)
random.exe.exe (PID: 4176)
real2001.bmp.exe (PID: 5900)
build2.exe (PID: 1408)
K377K.exe (PID: 736)
ll.exe (PID: 4736)
Reads internet explorer settings
iexplore.exe (PID: 1068)
iexplore.exe (PID: 3404)
Checks Windows Trust Settings
iexplore.exe (PID: 1068)
iexplore.exe (PID: 2908)
consent.exe (PID: 3176)
powershell.exe (PID: 2772)
iexplore.exe (PID: 3404)
installer.exe (PID: 5652)
iexplore.exe (PID: 5236)
svchost.exe (PID: 1860)
msiexec.exe (PID: 3920)
handselfdiy_0.exe (PID: 5980)
b123.exe (PID: 5108)
MsiExec.exe (PID: 5348)
explorer.exe (PID: 5464)
explorer.exe (PID: 3952)
w8LTwns6t.exe (PID: 3836)
test33.bmp.exe (PID: 2328)
test33.bmp.exe (PID: 3248)
tde8etIr7miOb766p06Bs7fB.exe (PID: 5136)
real2001.bmp.exe (PID: 5900)
build2.exe (PID: 1408)
Application launched itself
iexplore.exe (PID: 2908)
chrome.exe (PID: 1632)
iexplore.exe (PID: 5236)
msiexec.exe (PID: 3920)
Changes internet zones settings
iexplore.exe (PID: 2908)
iexplore.exe (PID: 5236)
Manual execution by user
chrome.exe (PID: 1632)
Cleaner.exe (PID: 5820)
Cleaner.exe (PID: 4828)
Reads the hosts file
chrome.exe (PID: 268)
chrome.exe (PID: 1632)
Application was dropped or rewritten from another process
6288a1e12b0d6_892f6331.tmp (PID: 4672)
6288a1ea208a4_fd04fb523d.tmp (PID: 4124)
lBo5.exe (PID: 5976)
6288a1e12b0d6_892f6331.tmp (PID: 5448)
poweroff.tmp (PID: 4084)
setup.tmp (PID: 6100)
Loads dropped or rewritten executable
6288a1ea208a4_fd04fb523d.tmp (PID: 4124)
6288a1e12b0d6_892f6331.tmp (PID: 5448)
6288a1e12b0d6_892f6331.tmp (PID: 4672)
poweroff.tmp (PID: 4084)
MsiExec.exe (PID: 5348)
MsiExec.exe (PID: 5640)
MsiExec.exe (PID: 4364)
setup.tmp (PID: 6100)
msiexec.exe (PID: 3920)
lBo5.exe (PID: 5976)
Creates files in the program directory
lBo5.exe (PID: 5976)
poweroff.tmp (PID: 4084)
msiexec.exe (PID: 3920)
Creates a software uninstall entry
poweroff.tmp (PID: 4084)
msiexec.exe (PID: 3920)
Reads CPU info
svchost.exe (PID: 1860)
Reads Microsoft Office registry keys
MsiExec.exe (PID: 5640)
MsiExec.exe (PID: 5348)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report