File name:

New Text Document mod.bin

Full analysis: https://app.any.run/tasks/587e7083-4c4c-41d0-9fe6-2b186419c50e
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: December 26, 2023, 21:10:55
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
hausbomber
loader
risepro
amadey
botnet
stealer
evasion
stealc
opendir
metasploit
kelihos
trojan
lumma
smoke
smokeloader
redline
glupteba
havoc
backdoor
framework
keylogger
neoreklami
rat
remcos
remote
adware
xmrig
rhadamanthys
miner
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

69994FF2F00EECA9335CCD502198E05B

SHA1:

B13A15A5BEA65B711B835CE8ECCD2A699A99CEAD

SHA256:

2E2E035ECE4ACCDEE838ECAACDC263FA526939597954D18D1320D73C8BF810C2

SSDEEP:

96:OF/l9j0WSY3AnLJZBJUJCrQt0LpCBIW12nEtgpH9GIiY82WNw9fnmKz0yLjCzNt:OSYQnzB20LsBIW12n/eIifNgz0Ck

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • HAUSBOMBER has been detected (YARA)

      • New Text Document mod.bin.exe (PID: 540)
    • Create files in the Startup directory

      • 4lN988IG.exe (PID: 1908)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 5404)
      • Utsysc.exe (PID: 4056)
      • csrss.exe (PID: 6712)
      • Install.exe (PID: 4796)
      • 473892748329d.exe (PID: 7536)
      • RkfnNyX.exe (PID: 6476)
      • vGRJSaQ.exe (PID: 480)
      • rundll32.exe (PID: 9872)
      • OneDrive.exe (PID: 10036)
      • build3.exe (PID: 10232)
      • XRJNZC.exe (PID: 10248)
      • ~tlA253.tmp (PID: 10148)
    • Risepro uses scheduled tasks to run itself

      • cmd.exe (PID: 5404)
      • cmd.exe (PID: 2084)
    • Changes the autorun value in the registry

      • Utsysc.exe (PID: 4056)
      • csrss.exe (PID: 6712)
      • reg.exe (PID: 6344)
      • build3.exe (PID: 10232)
    • Uses Task Scheduler to autorun other applications

      • cmd.exe (PID: 2084)
      • csrss.exe (PID: 6712)
      • vGRJSaQ.exe (PID: 480)
    • AMADEY has been detected (SURICATA)

      • Utsysc.exe (PID: 4056)
      • build3.exe (PID: 10232)
    • Actions looks like stealing of personal data

      • updater.exe (PID: 5256)
      • rundll32.exe (PID: 6476)
      • 6vm5BN1.exe (PID: 7688)
      • RegAsm.exe (PID: 1120)
      • nsu4F1F.tmp.exe (PID: 7260)
      • wlanext.exe (PID: 2260)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7800)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 5240)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 3716)
      • 4lN988IG.exe (PID: 1908)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7768)
      • M9pyTtBq42t8D78CaimhjEcX.exe (PID: 7180)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8400)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8504)
      • SUZMJrw0VEyB7Shkm0BuDole.exe (PID: 756)
      • RegAsm.exe (PID: 8244)
      • RegAsm.exe (PID: 2224)
      • 53AE.exe (PID: 8292)
      • BE52.exe (PID: 8348)
      • A4AE.exe (PID: 8660)
      • RegSvcs.exe (PID: 7052)
      • RkfnNyX.exe (PID: 6476)
      • AcroBroker.exe (PID: 1660)
      • AcroBroker.exe (PID: 6900)
      • AcroBroker.exe (PID: 7292)
      • AcroBroker.exe (PID: 776)
      • vGRJSaQ.exe (PID: 480)
      • assistant_installer.exe (PID: 9400)
      • assistant_installer.exe (PID: 8832)
      • OpenWith.exe (PID: 5840)
      • v1220-55000.exe (PID: 2600)
      • rest.exe (PID: 6016)
    • RISEPRO has been detected (SURICATA)

      • 4lN988IG.exe (PID: 1908)
      • rest.exe (PID: 6016)
    • STEALC has been detected (SURICATA)

      • timeSync.exe (PID: 6936)
      • nsu4F1F.tmp.exe (PID: 7260)
      • nsjA6D4.tmp (PID: 7796)
      • nsdD7F6.tmp (PID: 8748)
      • nsm9E2F.tmp.exe (PID: 8908)
    • Adds path to the Windows Defender exclusion list

      • WinScp.exe (PID: 6376)
      • InstallSetup2.exe (PID: 6436)
      • Rby1.exe (PID: 6668)
      • 473892748329d.exe (PID: 7536)
      • svchost.exe (PID: 8896)
      • ~tlA253.tmp (PID: 10148)
    • Connects to the CnC server

      • timeSync.exe (PID: 6936)
      • 4lN988IG.exe (PID: 1908)
      • nsu4F1F.tmp.exe (PID: 7260)
      • 6vm5BN1.exe (PID: 7688)
      • explorer.exe (PID: 4500)
      • nsjA6D4.tmp (PID: 7796)
      • csrss.exe (PID: 6712)
      • nsdD7F6.tmp (PID: 8748)
      • 53AE.exe (PID: 8292)
      • nsm9E2F.tmp.exe (PID: 8908)
      • rest.exe (PID: 6016)
      • vbc.exe (PID: 5200)
    • Steals credentials from Web Browsers

      • 4lN988IG.exe (PID: 1908)
      • rundll32.exe (PID: 6476)
      • wlanext.exe (PID: 2260)
      • nsu4F1F.tmp.exe (PID: 7260)
      • RegAsm.exe (PID: 8244)
      • A4AE.exe (PID: 8660)
      • AcroBroker.exe (PID: 776)
      • vGRJSaQ.exe (PID: 480)
      • rest.exe (PID: 6016)
    • Runs injected code in another process

      • toolspub2.exe (PID: 6908)
      • 7qY2pj51.exe (PID: 776)
    • Unusual connection from system programs

      • rundll32.exe (PID: 6476)
      • rundll32.exe (PID: 8072)
      • rundll32.exe (PID: 9872)
      • vbc.exe (PID: 5200)
    • UAC/LUA settings modification

      • InstallSetup2.exe (PID: 6436)
      • Rby1.exe (PID: 6668)
    • Creates a writable file in the system directory

      • powershell.exe (PID: 2104)
      • csrss.exe (PID: 6712)
      • powershell.exe (PID: 8196)
      • vGRJSaQ.exe (PID: 480)
    • METASPLOIT has been detected (SURICATA)

      • New Text Document mod.bin.exe (PID: 540)
    • KELIHOS has been detected (SURICATA)

      • New Text Document mod.bin.exe (PID: 540)
    • The DLL Hijacking

      • winSAT.exe (PID: 6544)
    • LUMMA has been detected (SURICATA)

      • 6vm5BN1.exe (PID: 7688)
      • 53AE.exe (PID: 8292)
      • RegSvcs.exe (PID: 7052)
    • Glupteba is detected

      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7440)
    • Starts CMD.EXE for self-deleting

      • nsu4F1F.tmp.exe (PID: 7260)
    • SMOKE has been detected (SURICATA)

      • explorer.exe (PID: 4500)
    • REDLINE has been detected (SURICATA)

      • RegAsm.exe (PID: 8244)
      • A4AE.exe (PID: 8660)
    • GLUPTEBA has been detected (SURICATA)

      • csrss.exe (PID: 6712)
    • Remcos is detected

      • AcroBroker.exe (PID: 7292)
      • AcroBroker.exe (PID: 7292)
    • REMCOS has been detected (SURICATA)

      • AcroBroker.exe (PID: 7292)
    • HAVOC has been detected (SURICATA)

      • UpdateCheck.exe (PID: 1424)
    • Modifies files in the Chrome extension folder

      • vGRJSaQ.exe (PID: 480)
    • NEOREKLAMI has been detected (SURICATA)

      • rundll32.exe (PID: 9872)
    • RHADAMANTHYS has been detected (SURICATA)

      • dialer.exe (PID: 9284)
    • MINER has been detected (SURICATA)

      • vbc.exe (PID: 5200)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • updater_3.exe (PID: 640)
      • powershell.exe (PID: 6368)
      • powershell.exe (PID: 2104)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7440)
      • RegAsm.exe (PID: 1120)
      • 473892748329d.exe (PID: 7536)
    • Reads the BIOS version

      • ama.exe (PID: 4552)
      • Utsysc.exe (PID: 4056)
      • Install.exe (PID: 4796)
      • Utsysc.exe (PID: 7380)
      • A0E4.exe (PID: 9152)
      • iojmibhyhiws.exe (PID: 8204)
      • Utsysc.exe (PID: 7484)
    • Connects to the server without a host name

      • New Text Document mod.bin.exe (PID: 540)
      • Utsysc.exe (PID: 4056)
      • WinScp.exe (PID: 6376)
      • timeSync.exe (PID: 6936)
      • nsu4F1F.tmp.exe (PID: 7260)
    • Reads the date of Windows installation

      • ama.exe (PID: 4552)
      • Utsysc.exe (PID: 4056)
      • setup294.exe (PID: 6624)
      • 288c47bbc1871b42239df19ff4df68f076.exe (PID: 6644)
      • InstallSetup2.exe (PID: 6436)
      • InstallUtil.exe (PID: 4136)
      • f305ba-b4b69ab5.exe (PID: 7908)
      • Rby1.exe (PID: 6668)
      • InstallUtil.exe (PID: 2104)
      • nsu4F1F.tmp.exe (PID: 7260)
      • RegAsm.exe (PID: 8244)
      • Install.exe (PID: 4796)
      • Cheat.tmp (PID: 6320)
      • forrock.exe (PID: 9432)
      • tuc4.tmp (PID: 9768)
      • adobe.tmp (PID: 8016)
      • cp.exe (PID: 6680)
      • build3.exe (PID: 10232)
      • XRJNZC.exe (PID: 10248)
    • Process requests binary or script from the Internet

      • New Text Document mod.bin.exe (PID: 540)
      • Utsysc.exe (PID: 4056)
      • nsu4F1F.tmp.exe (PID: 7260)
    • Starts CMD.EXE for commands execution

      • 4lN988IG.exe (PID: 1908)
      • updater.exe (PID: 5256)
      • cmd.exe (PID: 6684)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 6296)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7440)
      • nsu4F1F.tmp.exe (PID: 7260)
      • csrss.exe (PID: 6712)
      • HuldhM6DSteHlk6BDfkThD3h.exe (PID: 7816)
      • w4kIEA8aVKK03clwsSKfaQGK.exe (PID: 1752)
      • forfiles.exe (PID: 9044)
      • forfiles.exe (PID: 7216)
      • windefender.exe (PID: 8916)
      • A0E4.exe (PID: 9152)
      • powershell.exe (PID: 8628)
      • powershell.exe (PID: 8196)
      • vGRJSaQ.exe (PID: 480)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 9656)
      • ma.exe (PID: 9992)
      • cp.exe (PID: 6680)
    • Connects to unusual port

      • 4lN988IG.exe (PID: 1908)
      • WinScp.exe (PID: 6376)
      • Screensaver.exe (PID: 7244)
      • Recorder.exe (PID: 7284)
      • Journal.exe (PID: 7312)
      • RegAsm.exe (PID: 7696)
      • RegAsm.exe (PID: 8244)
      • SUZMJrw0VEyB7Shkm0BuDole.exe (PID: 756)
      • A4AE.exe (PID: 8660)
      • svchost.exe (PID: 8896)
      • AcroBroker.exe (PID: 7292)
      • rest.exe (PID: 6016)
      • build_2023-12-19_21-29.exe (PID: 8828)
      • dialer.exe (PID: 9284)
      • againn.exe (PID: 7288)
      • OpenWith.exe (PID: 5840)
      • vbc.exe (PID: 5200)
      • AppLaunch.exe (PID: 9264)
    • Checks for external IP

      • updater.exe (PID: 5256)
      • 4lN988IG.exe (PID: 1908)
      • InstallSetup9.exe (PID: 6532)
      • 8rIs9Ou7DU0nOx04QPnABkmR.exe (PID: 7956)
      • RegAsm.exe (PID: 1120)
      • lQlWqxEx3Dd4JiaXzISETbKx.exe (PID: 7892)
      • InstallSetup8.exe (PID: 9592)
      • rest.exe (PID: 6016)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 6312)
      • RegAsm.exe (PID: 1120)
    • Uses WMIC.EXE to obtain a list of video controllers

      • cmd.exe (PID: 6548)
      • RegAsm.exe (PID: 1120)
    • Accesses video controller name via WMI (SCRIPT)

      • WMIC.exe (PID: 6596)
      • WMIC.exe (PID: 7232)
    • Starts application with an unusual extension

      • cmd.exe (PID: 6744)
      • 8rIs9Ou7DU0nOx04QPnABkmR.exe (PID: 7956)
      • lQlWqxEx3Dd4JiaXzISETbKx.exe (PID: 7892)
      • svchost.exe (PID: 8896)
    • Uses NETSH.EXE to obtain data on the network

      • cmd.exe (PID: 6684)
      • rundll32.exe (PID: 6476)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 6960)
      • cmd.exe (PID: 9108)
      • cmd.exe (PID: 9104)
      • A0E4.exe (PID: 9152)
      • iojmibhyhiws.exe (PID: 8204)
      • cmd.exe (PID: 8344)
      • powershell.exe (PID: 8196)
      • cmd.exe (PID: 7084)
      • powershell.exe (PID: 8628)
      • cmd.exe (PID: 6760)
      • cmd.exe (PID: 6556)
      • cmd.exe (PID: 9984)
      • cmd.exe (PID: 10068)
    • Executes application which crashes

      • timeSync.exe (PID: 6936)
      • 4lN988IG.exe (PID: 1908)
      • toolspub2.exe (PID: 6908)
      • 6vm5BN1.exe (PID: 7688)
      • nsu4F1F.tmp.exe (PID: 7260)
      • nsjA6D4.tmp (PID: 7796)
      • nsdD7F6.tmp (PID: 8748)
      • 53AE.exe (PID: 8292)
      • nsm9E2F.tmp.exe (PID: 8908)
      • ww.exe (PID: 9744)
      • rest.exe (PID: 6016)
    • Get information on the list of running processes

      • updater.exe (PID: 5256)
      • cmd.exe (PID: 6968)
    • Starts POWERSHELL.EXE for commands execution

      • WinScp.exe (PID: 6376)
      • rundll32.exe (PID: 6476)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7760)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7440)
      • InstallSetup2.exe (PID: 6436)
      • RegAsm.exe (PID: 1120)
      • Rby1.exe (PID: 6668)
      • csrss.exe (PID: 6712)
      • rjcq1EOwwA1w1VHpa0sdESmS.exe (PID: 6732)
      • 7XuiJHZF5NuCI3jIIc0aPI5A.exe (PID: 8088)
      • rjcq1EOwwA1w1VHpa0sdESmS.exe (PID: 8688)
      • 7XuiJHZF5NuCI3jIIc0aPI5A.exe (PID: 9140)
      • w4kIEA8aVKK03clwsSKfaQGK.exe (PID: 896)
      • w4kIEA8aVKK03clwsSKfaQGK.exe (PID: 7392)
      • 473892748329d.exe (PID: 7536)
      • svchost.exe (PID: 8896)
      • RkfnNyX.exe (PID: 6476)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 4436)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 8176)
      • ~tlA253.tmp (PID: 10148)
    • Script adds exclusion path to Windows Defender

      • WinScp.exe (PID: 6376)
      • InstallSetup2.exe (PID: 6436)
      • Rby1.exe (PID: 6668)
      • 473892748329d.exe (PID: 7536)
      • svchost.exe (PID: 8896)
      • ~tlA253.tmp (PID: 10148)
    • Reads security settings of Internet Explorer

      • WinScp.exe (PID: 6376)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7800)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8400)
      • InstallSetup9.exe (PID: 6532)
      • 8rIs9Ou7DU0nOx04QPnABkmR.exe (PID: 7956)
      • lQlWqxEx3Dd4JiaXzISETbKx.exe (PID: 7892)
      • InstallSetup8.exe (PID: 9592)
      • build3.exe (PID: 10232)
    • Checks Windows Trust Settings

      • WinScp.exe (PID: 6376)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7800)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8400)
      • InstallSetup9.exe (PID: 6532)
      • 8rIs9Ou7DU0nOx04QPnABkmR.exe (PID: 7956)
      • lQlWqxEx3Dd4JiaXzISETbKx.exe (PID: 7892)
      • vGRJSaQ.exe (PID: 480)
      • InstallSetup8.exe (PID: 9592)
      • build3.exe (PID: 10232)
    • Uses RUNDLL32.EXE to load library

      • rundll32.exe (PID: 7124)
      • rundll32.exe (PID: 7080)
    • The process checks if it is being run in the virtual environment

      • rundll32.exe (PID: 7080)
      • rundll32.exe (PID: 1824)
      • dialer.exe (PID: 9284)
    • Loads DLL from Mozilla Firefox

      • rundll32.exe (PID: 6476)
      • OpenWith.exe (PID: 5840)
    • Searches for installed software

      • 4lN988IG.exe (PID: 1908)
      • nsu4F1F.tmp.exe (PID: 7260)
      • 6vm5BN1.exe (PID: 7688)
      • RegAsm.exe (PID: 8244)
      • RegAsm.exe (PID: 2224)
      • RegSvcs.exe (PID: 7052)
      • 53AE.exe (PID: 8292)
      • A4AE.exe (PID: 8660)
      • rest.exe (PID: 6016)
      • OpenWith.exe (PID: 5840)
      • v1220-55000.exe (PID: 2600)
    • The process hides Powershell's copyright startup banner

      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7760)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7440)
      • csrss.exe (PID: 6712)
      • rjcq1EOwwA1w1VHpa0sdESmS.exe (PID: 6732)
      • 7XuiJHZF5NuCI3jIIc0aPI5A.exe (PID: 8088)
      • rjcq1EOwwA1w1VHpa0sdESmS.exe (PID: 8688)
      • 7XuiJHZF5NuCI3jIIc0aPI5A.exe (PID: 9140)
      • w4kIEA8aVKK03clwsSKfaQGK.exe (PID: 896)
      • w4kIEA8aVKK03clwsSKfaQGK.exe (PID: 7392)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 4436)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 8176)
    • The process bypasses the loading of PowerShell profile settings

      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7760)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7440)
      • csrss.exe (PID: 6712)
      • rjcq1EOwwA1w1VHpa0sdESmS.exe (PID: 6732)
      • 7XuiJHZF5NuCI3jIIc0aPI5A.exe (PID: 8088)
      • rjcq1EOwwA1w1VHpa0sdESmS.exe (PID: 8688)
      • 7XuiJHZF5NuCI3jIIc0aPI5A.exe (PID: 9140)
      • w4kIEA8aVKK03clwsSKfaQGK.exe (PID: 896)
      • w4kIEA8aVKK03clwsSKfaQGK.exe (PID: 7392)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 4436)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 8176)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • cmd.exe (PID: 6472)
    • Uses WMIC.EXE to obtain operating system information

      • RegAsm.exe (PID: 1120)
    • Accesses operating system name via WMI (SCRIPT)

      • WMIC.exe (PID: 6656)
    • Uses WMIC.EXE to obtain computer system information

      • RegAsm.exe (PID: 1120)
    • Accesses product unique identifier via WMI (SCRIPT)

      • WMIC.exe (PID: 6576)
    • The process verifies whether the antivirus software is installed

      • nsu4F1F.tmp.exe (PID: 7260)
      • M9pyTtBq42t8D78CaimhjEcX.exe (PID: 7180)
      • SUZMJrw0VEyB7Shkm0BuDole.exe (PID: 756)
      • BE52.exe (PID: 8348)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 8368)
      • cmd.exe (PID: 1276)
      • cmd.exe (PID: 7788)
    • Creates files in the driver directory

      • csrss.exe (PID: 6712)
    • Drops a system driver (possible attempt to evade defenses)

      • csrss.exe (PID: 6712)
      • iojmibhyhiws.exe (PID: 8204)
    • Found strings related to reading or modifying Windows Defender settings

      • forfiles.exe (PID: 9044)
      • forfiles.exe (PID: 7216)
      • windefender.exe (PID: 8916)
      • powershell.exe (PID: 8196)
      • powershell.exe (PID: 8628)
      • vGRJSaQ.exe (PID: 480)
    • Connects to SMTP port

      • wlanext.exe (PID: 2260)
    • Creates a software uninstall entry

      • SUZMJrw0VEyB7Shkm0BuDole.exe (PID: 756)
      • etopt.exe (PID: 5492)
      • etopt.exe (PID: 10048)
    • Xmrig is detected

      • csrss.exe (PID: 6712)
    • Reads the Windows owner or organization settings

      • tuc4.tmp (PID: 10104)
      • adobe.tmp (PID: 3880)
    • Executing commands from a ".bat" file

      • ma.exe (PID: 9992)
      • cp.exe (PID: 6680)
  • INFO

    • Reads Environment values

      • New Text Document mod.bin.exe (PID: 540)
      • ama.exe (PID: 4552)
      • Utsysc.exe (PID: 4056)
      • 4lN988IG.exe (PID: 1908)
      • updater.exe (PID: 5256)
      • WinScp.exe (PID: 6376)
      • nsu4F1F.tmp.exe (PID: 7260)
      • InstallUtil.exe (PID: 4136)
      • f305ba-b4b69ab5.exe (PID: 7908)
      • RegAsm.exe (PID: 1120)
      • wlanext.exe (PID: 2260)
      • InstallUtil.exe (PID: 2104)
      • RegAsm.exe (PID: 8244)
      • Utsysc.exe (PID: 7380)
      • A4AE.exe (PID: 8660)
      • svchost.exe (PID: 8896)
      • Utsysc.exe (PID: 7484)
      • AcroBroker.exe (PID: 7292)
      • rest.exe (PID: 6016)
      • OneDrive.exe (PID: 10036)
      • build3.exe (PID: 10232)
    • Checks supported languages

      • New Text Document mod.bin.exe (PID: 540)
      • updater_3.exe (PID: 640)
      • ama.exe (PID: 4552)
      • foxi.exe (PID: 208)
      • updater.exe (PID: 5256)
      • Utsysc.exe (PID: 4056)
      • ON0rI91.exe (PID: 4052)
      • 4lN988IG.exe (PID: 1908)
      • updater.exe (PID: 1096)
      • updater.exe (PID: 2084)
      • updater.exe (PID: 2628)
      • chcp.com (PID: 6760)
      • 473892748329d.exe (PID: 6280)
      • WinScp.exe (PID: 6376)
      • timeSync.exe (PID: 6936)
      • setup294.exe (PID: 6624)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 6296)
      • 288c47bbc1871b42239df19ff4df68f076.exe (PID: 6644)
      • InstallSetup9.exe (PID: 6532)
      • toolspub2.exe (PID: 6588)
      • BroomSetup.exe (PID: 7040)
      • Journal.exe (PID: 7312)
      • toolspub2.exe (PID: 6908)
      • Recorder.exe (PID: 7284)
      • wlanext.exe (PID: 7188)
      • Screensaver.exe (PID: 7244)
      • nsu4F1F.tmp.exe (PID: 7260)
      • rundll64.exe (PID: 7360)
      • xxx.exe (PID: 7620)
      • 6vm5BN1.exe (PID: 7688)
      • RegAsm.exe (PID: 7696)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7760)
      • InstallSetup2.exe (PID: 6436)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7440)
      • InstallUtil.exe (PID: 4136)
      • aZULuCSYxPtkaTSNaDTux6dK.exe (PID: 8044)
      • f305ba-b4b69ab5.exe (PID: 7908)
      • wlanext.exe (PID: 2260)
      • RegAsm.exe (PID: 1120)
      • 473892748329d.exe (PID: 7536)
      • Rby1.exe (PID: 6668)
      • winSAT.exe (PID: 6544)
      • InstallUtil.exe (PID: 2104)
      • 8rIs9Ou7DU0nOx04QPnABkmR.exe (PID: 7956)
      • BroomSetup.exe (PID: 6656)
      • cv4QETDuOVR6c2JSujEdc3Z5.exe (PID: 5388)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7800)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 756)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 5240)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 3716)
      • 7qY2pj51.exe (PID: 776)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7768)
      • csrss.exe (PID: 6712)
      • nsjA6D4.tmp (PID: 7796)
      • rjcq1EOwwA1w1VHpa0sdESmS.exe (PID: 6732)
      • 7XuiJHZF5NuCI3jIIc0aPI5A.exe (PID: 8088)
      • M9pyTtBq42t8D78CaimhjEcX.exe (PID: 7180)
      • lQlWqxEx3Dd4JiaXzISETbKx.exe (PID: 7892)
      • D2C3.exe (PID: 7136)
      • BroomSetup.exe (PID: 3292)
      • RegAsm.exe (PID: 8244)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8400)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8504)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8596)
      • rjcq1EOwwA1w1VHpa0sdESmS.exe (PID: 8688)
      • nsdD7F6.tmp (PID: 8748)
      • 7XuiJHZF5NuCI3jIIc0aPI5A.exe (PID: 9140)
      • HuldhM6DSteHlk6BDfkThD3h.exe (PID: 7816)
      • w4kIEA8aVKK03clwsSKfaQGK.exe (PID: 1752)
      • qemu-ga.exe (PID: 7544)
      • SUZMJrw0VEyB7Shkm0BuDole.exe (PID: 756)
      • Utsysc.exe (PID: 7380)
      • D4zQx6uKJqWQxY3T3p6sjn6X.exe (PID: 8640)
      • w4kIEA8aVKK03clwsSKfaQGK.exe (PID: 896)
      • Install.exe (PID: 1260)
      • Install.exe (PID: 4796)
      • w4kIEA8aVKK03clwsSKfaQGK.exe (PID: 7392)
      • RegAsm.exe (PID: 2224)
      • 15B8.exe (PID: 6308)
      • windefender.exe (PID: 8916)
      • windefender.exe (PID: 7388)
      • 4E6D.exe (PID: 3272)
      • 53AE.exe (PID: 8292)
      • svchost.exe (PID: 8896)
      • RegSvcs.exe (PID: 7052)
      • A0E4.exe (PID: 9152)
      • A4AE.exe (PID: 8660)
      • BE52.exe (PID: 8348)
      • iojmibhyhiws.exe (PID: 8204)
      • Cheat.exe (PID: 7224)
      • Cheat.tmp (PID: 6320)
      • UpdateCheck.exe (PID: 1424)
      • Cheat.tmp (PID: 5676)
      • RkfnNyX.exe (PID: 6476)
      • Utsysc.exe (PID: 7484)
      • Cheat.exe (PID: 2032)
      • updater.exe (PID: 5572)
      • AcroBroker.exe (PID: 7292)
      • AcroBroker.exe (PID: 776)
      • AcroBroker.exe (PID: 6900)
      • AcroBroker.exe (PID: 1660)
      • etopt.exe (PID: 5492)
      • vGRJSaQ.exe (PID: 480)
      • forrock.exe (PID: 9432)
      • BroomSetup.exe (PID: 9648)
      • toolspub2.exe (PID: 9616)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 9656)
      • InstallSetup8.exe (PID: 9592)
      • ww.exe (PID: 9744)
      • tuc4.tmp (PID: 9768)
      • toolspub2.exe (PID: 9792)
      • tuc4.exe (PID: 8356)
      • etopt.exe (PID: 10048)
      • ~tlA253.tmp (PID: 10148)
      • tuc4.tmp (PID: 10104)
      • nsm9E2F.tmp.exe (PID: 8908)
      • tuc4.exe (PID: 10124)
      • adobe.tmp (PID: 8016)
      • adobe.exe (PID: 8856)
      • adobe.tmp (PID: 3880)
      • datapumpcrt.exe (PID: 3708)
      • adobe.exe (PID: 2400)
      • Utsysc.exe (PID: 9504)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 4436)
      • Assistant_106.0.4998.16_Setup.exe_sfx.exe (PID: 9384)
      • datapumpcrt.exe (PID: 9844)
      • assistant_installer.exe (PID: 9400)
      • assistant_installer.exe (PID: 8832)
      • cloudpanelcrt.exe (PID: 2184)
      • cloudpanelcrt.exe (PID: 10156)
      • rest.exe (PID: 6016)
      • build_2023-12-19_21-29.exe (PID: 8828)
      • ma.exe (PID: 9992)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 8176)
      • OneDrive.exe (PID: 10036)
      • againn.exe (PID: 7288)
      • cp.exe (PID: 6680)
      • crypted.exe (PID: 7368)
      • vbc.exe (PID: 5200)
      • AppLaunch.exe (PID: 9264)
      • v1220-55000.exe (PID: 2600)
      • build3.exe (PID: 10232)
      • XRJNZC.exe (PID: 10248)
      • svchost.exe (PID: 10400)
      • wmplayer.exe (PID: 10356)
      • Creal.exe (PID: 10752)
      • e0cbefcb1af40c7d4aff4aca26621a98.exe (PID: 10652)
    • Drops the executable file immediately after the start

      • New Text Document mod.bin.exe (PID: 540)
      • updater_3.exe (PID: 640)
      • explorer.exe (PID: 4500)
      • ama.exe (PID: 4552)
      • foxi.exe (PID: 208)
      • ON0rI91.exe (PID: 4052)
      • 4lN988IG.exe (PID: 1908)
      • updater.exe (PID: 5256)
      • setup294.exe (PID: 6624)
      • Utsysc.exe (PID: 4056)
      • InstallSetup9.exe (PID: 6532)
      • 288c47bbc1871b42239df19ff4df68f076.exe (PID: 6644)
      • nsu4F1F.tmp.exe (PID: 7260)
      • InstallUtil.exe (PID: 4136)
      • 473892748329d.exe (PID: 6280)
      • 8rIs9Ou7DU0nOx04QPnABkmR.exe (PID: 7956)
      • InstallUtil.exe (PID: 2104)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 5240)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7800)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 756)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 3716)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7768)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7440)
      • M9pyTtBq42t8D78CaimhjEcX.exe (PID: 7180)
      • lQlWqxEx3Dd4JiaXzISETbKx.exe (PID: 7892)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8400)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8596)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8504)
      • csrss.exe (PID: 6712)
      • RegAsm.exe (PID: 8244)
      • SUZMJrw0VEyB7Shkm0BuDole.exe (PID: 756)
      • D4zQx6uKJqWQxY3T3p6sjn6X.exe (PID: 8640)
      • Install.exe (PID: 1260)
      • 473892748329d.exe (PID: 7536)
      • Install.exe (PID: 4796)
      • 4E6D.exe (PID: 3272)
      • A0E4.exe (PID: 9152)
      • iojmibhyhiws.exe (PID: 8204)
      • BE52.exe (PID: 8348)
      • Cheat.exe (PID: 7224)
      • Cheat.exe (PID: 2032)
      • etopt.exe (PID: 5492)
      • vGRJSaQ.exe (PID: 480)
      • RkfnNyX.exe (PID: 6476)
      • InstallSetup8.exe (PID: 9592)
      • forrock.exe (PID: 9432)
      • tuc4.exe (PID: 8356)
      • etopt.exe (PID: 10048)
      • tuc4.exe (PID: 10124)
      • svchost.exe (PID: 8896)
      • adobe.exe (PID: 8856)
      • tuc4.tmp (PID: 10104)
      • adobe.exe (PID: 2400)
      • adobe.tmp (PID: 3880)
      • Assistant_106.0.4998.16_Setup.exe_sfx.exe (PID: 9384)
      • rest.exe (PID: 6016)
      • cloudpanelcrt.exe (PID: 2184)
      • ma.exe (PID: 9992)
      • cp.exe (PID: 6680)
      • build3.exe (PID: 10232)
      • Creal.exe (PID: 10752)
    • Reads the computer name

      • New Text Document mod.bin.exe (PID: 540)
      • updater_3.exe (PID: 640)
      • ama.exe (PID: 4552)
      • 4lN988IG.exe (PID: 1908)
      • Utsysc.exe (PID: 4056)
      • updater.exe (PID: 5256)
      • updater.exe (PID: 1096)
      • updater.exe (PID: 2084)
      • timeSync.exe (PID: 6936)
      • WinScp.exe (PID: 6376)
      • setup294.exe (PID: 6624)
      • 288c47bbc1871b42239df19ff4df68f076.exe (PID: 6644)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 6296)
      • InstallSetup9.exe (PID: 6532)
      • BroomSetup.exe (PID: 7040)
      • wlanext.exe (PID: 7188)
      • Journal.exe (PID: 7312)
      • nsu4F1F.tmp.exe (PID: 7260)
      • rundll64.exe (PID: 7360)
      • xxx.exe (PID: 7620)
      • 6vm5BN1.exe (PID: 7688)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7760)
      • RegAsm.exe (PID: 7696)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7440)
      • InstallSetup2.exe (PID: 6436)
      • InstallUtil.exe (PID: 4136)
      • 473892748329d.exe (PID: 6280)
      • f305ba-b4b69ab5.exe (PID: 7908)
      • RegAsm.exe (PID: 1120)
      • Rby1.exe (PID: 6668)
      • wlanext.exe (PID: 2260)
      • InstallUtil.exe (PID: 2104)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7800)
      • 8rIs9Ou7DU0nOx04QPnABkmR.exe (PID: 7956)
      • BroomSetup.exe (PID: 6656)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 3716)
      • csrss.exe (PID: 6712)
      • nsjA6D4.tmp (PID: 7796)
      • rjcq1EOwwA1w1VHpa0sdESmS.exe (PID: 6732)
      • M9pyTtBq42t8D78CaimhjEcX.exe (PID: 7180)
      • 7XuiJHZF5NuCI3jIIc0aPI5A.exe (PID: 8088)
      • BroomSetup.exe (PID: 3292)
      • lQlWqxEx3Dd4JiaXzISETbKx.exe (PID: 7892)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8400)
      • D2C3.exe (PID: 7136)
      • RegAsm.exe (PID: 8244)
      • rjcq1EOwwA1w1VHpa0sdESmS.exe (PID: 8688)
      • nsdD7F6.tmp (PID: 8748)
      • 7XuiJHZF5NuCI3jIIc0aPI5A.exe (PID: 9140)
      • qemu-ga.exe (PID: 7544)
      • HuldhM6DSteHlk6BDfkThD3h.exe (PID: 7816)
      • w4kIEA8aVKK03clwsSKfaQGK.exe (PID: 1752)
      • SUZMJrw0VEyB7Shkm0BuDole.exe (PID: 756)
      • w4kIEA8aVKK03clwsSKfaQGK.exe (PID: 896)
      • Install.exe (PID: 4796)
      • w4kIEA8aVKK03clwsSKfaQGK.exe (PID: 7392)
      • 473892748329d.exe (PID: 7536)
      • 15B8.exe (PID: 6308)
      • RegAsm.exe (PID: 2224)
      • windefender.exe (PID: 8916)
      • windefender.exe (PID: 7388)
      • 53AE.exe (PID: 8292)
      • 4E6D.exe (PID: 3272)
      • svchost.exe (PID: 8896)
      • RegSvcs.exe (PID: 7052)
      • A4AE.exe (PID: 8660)
      • Cheat.tmp (PID: 6320)
      • UpdateCheck.exe (PID: 1424)
      • Cheat.tmp (PID: 5676)
      • updater.exe (PID: 5572)
      • AcroBroker.exe (PID: 7292)
      • AcroBroker.exe (PID: 1660)
      • AcroBroker.exe (PID: 776)
      • AcroBroker.exe (PID: 6900)
      • vGRJSaQ.exe (PID: 480)
      • etopt.exe (PID: 5492)
      • forrock.exe (PID: 9432)
      • InstallSetup8.exe (PID: 9592)
      • BroomSetup.exe (PID: 9648)
      • tuc4.tmp (PID: 9768)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 9656)
      • etopt.exe (PID: 10048)
      • tuc4.tmp (PID: 10104)
      • adobe.tmp (PID: 8016)
      • nsm9E2F.tmp.exe (PID: 8908)
      • adobe.tmp (PID: 3880)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 4436)
      • assistant_installer.exe (PID: 9400)
      • datapumpcrt.exe (PID: 3708)
      • rest.exe (PID: 6016)
      • build_2023-12-19_21-29.exe (PID: 8828)
      • cloudpanelcrt.exe (PID: 2184)
      • ma.exe (PID: 9992)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 8176)
      • OneDrive.exe (PID: 10036)
      • ~tlA253.tmp (PID: 10148)
      • againn.exe (PID: 7288)
      • vbc.exe (PID: 5200)
      • cp.exe (PID: 6680)
      • AppLaunch.exe (PID: 9264)
      • v1220-55000.exe (PID: 2600)
      • build3.exe (PID: 10232)
      • XRJNZC.exe (PID: 10248)
      • Creal.exe (PID: 10752)
      • e0cbefcb1af40c7d4aff4aca26621a98.exe (PID: 10652)
    • Reads the machine GUID from the registry

      • New Text Document mod.bin.exe (PID: 540)
      • 4lN988IG.exe (PID: 1908)
      • WinScp.exe (PID: 6376)
      • wlanext.exe (PID: 7188)
      • xxx.exe (PID: 7620)
      • RegAsm.exe (PID: 7696)
      • InstallSetup2.exe (PID: 6436)
      • InstallUtil.exe (PID: 4136)
      • f305ba-b4b69ab5.exe (PID: 7908)
      • Rby1.exe (PID: 6668)
      • wlanext.exe (PID: 2260)
      • InstallUtil.exe (PID: 2104)
      • RegAsm.exe (PID: 1120)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7800)
      • RegAsm.exe (PID: 8244)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8400)
      • InstallSetup9.exe (PID: 6532)
      • 7XuiJHZF5NuCI3jIIc0aPI5A.exe (PID: 9140)
      • rjcq1EOwwA1w1VHpa0sdESmS.exe (PID: 8688)
      • 8rIs9Ou7DU0nOx04QPnABkmR.exe (PID: 7956)
      • w4kIEA8aVKK03clwsSKfaQGK.exe (PID: 7392)
      • windefender.exe (PID: 7388)
      • lQlWqxEx3Dd4JiaXzISETbKx.exe (PID: 7892)
      • windefender.exe (PID: 8916)
      • 4E6D.exe (PID: 3272)
      • A4AE.exe (PID: 8660)
      • svchost.exe (PID: 8896)
      • UpdateCheck.exe (PID: 1424)
      • updater.exe (PID: 5572)
      • AcroBroker.exe (PID: 7292)
      • csrss.exe (PID: 6712)
      • AcroBroker.exe (PID: 776)
      • AcroBroker.exe (PID: 1660)
      • vGRJSaQ.exe (PID: 480)
      • InstallSetup8.exe (PID: 9592)
      • rest.exe (PID: 6016)
      • build_2023-12-19_21-29.exe (PID: 8828)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 8176)
      • OneDrive.exe (PID: 10036)
      • againn.exe (PID: 7288)
      • AppLaunch.exe (PID: 9264)
      • wmplayer.exe (PID: 10356)
      • build3.exe (PID: 10232)
    • Checks proxy server information

      • New Text Document mod.bin.exe (PID: 540)
      • Utsysc.exe (PID: 4056)
      • updater.exe (PID: 5256)
      • timeSync.exe (PID: 6936)
      • WerFault.exe (PID: 6428)
      • WinScp.exe (PID: 6376)
      • 4lN988IG.exe (PID: 1908)
      • rundll32.exe (PID: 6476)
      • InstallSetup9.exe (PID: 6532)
      • Journal.exe (PID: 7312)
      • WerFault.exe (PID: 1124)
      • nsu4F1F.tmp.exe (PID: 7260)
      • rundll32.exe (PID: 8072)
      • WerFault.exe (PID: 8020)
      • InstallUtil.exe (PID: 4136)
      • f305ba-b4b69ab5.exe (PID: 7908)
      • RegAsm.exe (PID: 1120)
      • InstallUtil.exe (PID: 2104)
      • wlanext.exe (PID: 2260)
      • 8rIs9Ou7DU0nOx04QPnABkmR.exe (PID: 7956)
      • WerFault.exe (PID: 7804)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7800)
      • explorer.exe (PID: 4500)
      • lQlWqxEx3Dd4JiaXzISETbKx.exe (PID: 7892)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8400)
      • WerFault.exe (PID: 8428)
      • nsjA6D4.tmp (PID: 7796)
      • SUZMJrw0VEyB7Shkm0BuDole.exe (PID: 756)
      • WerFault.exe (PID: 7528)
      • nsdD7F6.tmp (PID: 8748)
      • WerFault.exe (PID: 6688)
      • WerFault.exe (PID: 7852)
      • UpdateCheck.exe (PID: 1424)
      • svchost.exe (PID: 8896)
      • AcroBroker.exe (PID: 7292)
      • InstallSetup8.exe (PID: 9592)
      • nsm9E2F.tmp.exe (PID: 8908)
      • WerFault.exe (PID: 9544)
      • rest.exe (PID: 6016)
      • OneDrive.exe (PID: 10036)
      • WerFault.exe (PID: 9680)
      • build3.exe (PID: 10232)
    • Reads the software policy settings

      • New Text Document mod.bin.exe (PID: 540)
      • WerFault.exe (PID: 6428)
      • WinScp.exe (PID: 6376)
      • 4lN988IG.exe (PID: 1908)
      • WerFault.exe (PID: 1124)
      • WerFault.exe (PID: 8020)
      • InstallUtil.exe (PID: 4136)
      • f305ba-b4b69ab5.exe (PID: 7908)
      • RegAsm.exe (PID: 1120)
      • InstallUtil.exe (PID: 2104)
      • WerFault.exe (PID: 7804)
      • wlanext.exe (PID: 2260)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7800)
      • explorer.exe (PID: 4500)
      • WerFault.exe (PID: 8428)
      • InstallSetup9.exe (PID: 6532)
      • WerFault.exe (PID: 7528)
      • RegAsm.exe (PID: 2224)
      • WerFault.exe (PID: 6688)
      • WerFault.exe (PID: 7852)
      • UpdateCheck.exe (PID: 1424)
      • vGRJSaQ.exe (PID: 480)
      • WerFault.exe (PID: 9544)
      • rest.exe (PID: 6016)
      • InstallSetup8.exe (PID: 9592)
      • WerFault.exe (PID: 9680)
      • v1220-55000.exe (PID: 2600)
      • build3.exe (PID: 10232)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • updater_3.exe (PID: 640)
    • Create files in a temporary directory

      • updater_3.exe (PID: 640)
      • foxi.exe (PID: 208)
      • ama.exe (PID: 4552)
      • ON0rI91.exe (PID: 4052)
      • 4lN988IG.exe (PID: 1908)
      • updater.exe (PID: 5256)
      • Utsysc.exe (PID: 4056)
      • WinScp.exe (PID: 6376)
      • setup294.exe (PID: 6624)
      • 288c47bbc1871b42239df19ff4df68f076.exe (PID: 6644)
      • InstallSetup9.exe (PID: 6532)
      • xxx.exe (PID: 7620)
      • InstallUtil.exe (PID: 4136)
      • f305ba-b4b69ab5.exe (PID: 7908)
      • RegAsm.exe (PID: 1120)
      • InstallUtil.exe (PID: 2104)
      • 8rIs9Ou7DU0nOx04QPnABkmR.exe (PID: 7956)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7800)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 5240)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 756)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 3716)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7768)
      • M9pyTtBq42t8D78CaimhjEcX.exe (PID: 7180)
      • lQlWqxEx3Dd4JiaXzISETbKx.exe (PID: 7892)
      • explorer.exe (PID: 4500)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8400)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8504)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8596)
      • RegAsm.exe (PID: 8244)
      • D4zQx6uKJqWQxY3T3p6sjn6X.exe (PID: 8640)
      • SUZMJrw0VEyB7Shkm0BuDole.exe (PID: 756)
      • Install.exe (PID: 1260)
      • Install.exe (PID: 4796)
      • 4E6D.exe (PID: 3272)
      • iojmibhyhiws.exe (PID: 8204)
      • Cheat.exe (PID: 7224)
      • BE52.exe (PID: 8348)
      • Cheat.exe (PID: 2032)
      • AcroBroker.exe (PID: 1660)
      • AcroBroker.exe (PID: 6900)
      • AcroBroker.exe (PID: 776)
      • etopt.exe (PID: 5492)
      • forrock.exe (PID: 9432)
      • InstallSetup8.exe (PID: 9592)
      • etopt.exe (PID: 10048)
      • tuc4.exe (PID: 8356)
      • tuc4.tmp (PID: 10104)
      • tuc4.exe (PID: 10124)
      • adobe.exe (PID: 8856)
      • adobe.exe (PID: 2400)
      • adobe.tmp (PID: 3880)
      • Assistant_106.0.4998.16_Setup.exe_sfx.exe (PID: 9384)
      • rest.exe (PID: 6016)
      • ma.exe (PID: 9992)
      • cp.exe (PID: 6680)
      • build3.exe (PID: 10232)
      • Creal.exe (PID: 10752)
    • Drops 7-zip archiver for unpacking

      • updater_3.exe (PID: 640)
      • InstallUtil.exe (PID: 4136)
      • D4zQx6uKJqWQxY3T3p6sjn6X.exe (PID: 8640)
      • tuc4.tmp (PID: 10104)
      • adobe.tmp (PID: 3880)
    • Process drops legitimate windows executable

      • New Text Document mod.bin.exe (PID: 540)
      • updater_3.exe (PID: 640)
      • foxi.exe (PID: 208)
      • nsu4F1F.tmp.exe (PID: 7260)
      • 473892748329d.exe (PID: 6280)
      • tuc4.tmp (PID: 10104)
      • adobe.tmp (PID: 3880)
      • Assistant_106.0.4998.16_Setup.exe_sfx.exe (PID: 9384)
    • Starts itself from another location

      • ama.exe (PID: 4552)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7800)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7440)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8400)
      • D4zQx6uKJqWQxY3T3p6sjn6X.exe (PID: 8640)
      • 473892748329d.exe (PID: 7536)
      • A0E4.exe (PID: 9152)
      • ~tlA253.tmp (PID: 10148)
    • Creates files or folders in the user directory

      • 4lN988IG.exe (PID: 1908)
      • updater.exe (PID: 5256)
      • explorer.exe (PID: 4500)
      • WerFault.exe (PID: 6428)
      • Utsysc.exe (PID: 4056)
      • updater.exe (PID: 2084)
      • 288c47bbc1871b42239df19ff4df68f076.exe (PID: 6644)
      • InstallSetup9.exe (PID: 6532)
      • WerFault.exe (PID: 1124)
      • xxx.exe (PID: 7620)
      • WerFault.exe (PID: 8020)
      • nsu4F1F.tmp.exe (PID: 7260)
      • InstallSetup2.exe (PID: 6436)
      • InstallUtil.exe (PID: 4136)
      • f305ba-b4b69ab5.exe (PID: 7908)
      • wlanext.exe (PID: 7188)
      • Rby1.exe (PID: 6668)
      • InstallUtil.exe (PID: 2104)
      • 8rIs9Ou7DU0nOx04QPnABkmR.exe (PID: 7956)
      • WerFault.exe (PID: 7804)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 5240)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7800)
      • RegAsm.exe (PID: 1120)
      • lQlWqxEx3Dd4JiaXzISETbKx.exe (PID: 7892)
      • D2C3.exe (PID: 7136)
      • M9pyTtBq42t8D78CaimhjEcX.exe (PID: 7180)
      • WerFault.exe (PID: 8428)
      • WerFault.exe (PID: 7528)
      • 15B8.exe (PID: 6308)
      • WerFault.exe (PID: 6688)
      • 4E6D.exe (PID: 3272)
      • WerFault.exe (PID: 7852)
      • A0E4.exe (PID: 9152)
      • A4AE.exe (PID: 8660)
      • svchost.exe (PID: 8896)
      • updater.exe (PID: 5572)
      • AcroBroker.exe (PID: 7292)
      • vGRJSaQ.exe (PID: 480)
      • InstallSetup8.exe (PID: 9592)
      • forrock.exe (PID: 9432)
      • WerFault.exe (PID: 9544)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 3716)
      • ma.exe (PID: 9992)
      • WerFault.exe (PID: 9680)
      • OneDrive.exe (PID: 10036)
      • build3.exe (PID: 10232)
    • Creates files in the program directory

      • 4lN988IG.exe (PID: 1908)
      • nsu4F1F.tmp.exe (PID: 7260)
      • M9pyTtBq42t8D78CaimhjEcX.exe (PID: 7180)
      • SUZMJrw0VEyB7Shkm0BuDole.exe (PID: 756)
      • vGRJSaQ.exe (PID: 480)
      • tuc4.tmp (PID: 10104)
      • adobe.tmp (PID: 3880)
      • datapumpcrt.exe (PID: 3708)
      • cloudpanelcrt.exe (PID: 2184)
      • ma.exe (PID: 9992)
      • cp.exe (PID: 6680)
    • Reads product name

      • updater.exe (PID: 5256)
      • nsu4F1F.tmp.exe (PID: 7260)
      • svchost.exe (PID: 8896)
    • Application launched itself

      • updater.exe (PID: 5256)
      • cmd.exe (PID: 6684)
      • toolspub2.exe (PID: 6588)
      • 288c47bbc1871b439df19ff4df68f076.exe (PID: 7760)
      • wlanext.exe (PID: 7188)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 7800)
      • u7lZJ7xTTrYLuwS7h5rftBhm.exe (PID: 3716)
      • PtKWzjMRdF2MzZxEocRMy80e.exe (PID: 8400)
      • rjcq1EOwwA1w1VHpa0sdESmS.exe (PID: 6732)
      • 7XuiJHZF5NuCI3jIIc0aPI5A.exe (PID: 8088)
      • w4kIEA8aVKK03clwsSKfaQGK.exe (PID: 896)
      • AcroBroker.exe (PID: 7292)
      • toolspub2.exe (PID: 9616)
      • assistant_installer.exe (PID: 9400)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 4436)
    • Reads CPU info

      • updater.exe (PID: 5256)
      • nsu4F1F.tmp.exe (PID: 7260)
    • Process checks computer location settings

      • updater.exe (PID: 2628)
      • updater.exe (PID: 5256)
      • New Text Document mod.bin.exe (PID: 540)
      • setup294.exe (PID: 6624)
      • Utsysc.exe (PID: 4056)
      • 288c47bbc1871b42239df19ff4df68f076.exe (PID: 6644)
      • InstallSetup2.exe (PID: 6436)
      • InstallUtil.exe (PID: 4136)
      • f305ba-b4b69ab5.exe (PID: 7908)
      • 473892748329d.exe (PID: 6280)
      • Rby1.exe (PID: 6668)
      • InstallUtil.exe (PID: 2104)
      • nsu4F1F.tmp.exe (PID: 7260)
      • RegAsm.exe (PID: 8244)
      • Install.exe (PID: 4796)
      • 473892748329d.exe (PID: 7536)
      • csrss.exe (PID: 6712)
      • svchost.exe (PID: 8896)
      • Cheat.tmp (PID: 6320)
      • vGRJSaQ.exe (PID: 480)
      • forrock.exe (PID: 9432)
      • tuc4.tmp (PID: 9768)
      • adobe.tmp (PID: 8016)
      • OneDrive.exe (PID: 10036)
      • ~tlA253.tmp (PID: 10148)
      • cp.exe (PID: 6680)
      • build3.exe (PID: 10232)
      • XRJNZC.exe (PID: 10248)
    • Application was injected by another process

      • explorer.exe (PID: 4500)
    • The process drops Mozilla's DLL files

      • nsu4F1F.tmp.exe (PID: 7260)
    • Process checks are UAC notifies on

      • InstallSetup2.exe (PID: 6436)
      • Rby1.exe (PID: 6668)
    • The process drops C-runtime libraries

      • nsu4F1F.tmp.exe (PID: 7260)
    • Manual execution by a user

      • D2C3.exe (PID: 7136)
      • 15B8.exe (PID: 6308)
      • 53AE.exe (PID: 8292)
      • 4E6D.exe (PID: 3272)
      • A0E4.exe (PID: 9152)
      • A4AE.exe (PID: 8660)
      • BE52.exe (PID: 8348)
    • The process executes via Task Scheduler

      • Utsysc.exe (PID: 7380)
      • powershell.exe (PID: 6348)
      • RkfnNyX.exe (PID: 6476)
      • Utsysc.exe (PID: 7484)
      • powershell.exe (PID: 8816)
      • vGRJSaQ.exe (PID: 480)
      • rundll32.exe (PID: 9848)
      • Utsysc.exe (PID: 9504)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 6348)
      • powershell.exe (PID: 8816)
    • Executes as Windows Service

      • windefender.exe (PID: 7388)
    • Writes files like Keylogger logs

      • BE52.exe (PID: 8348)
      • AcroBroker.exe (PID: 7292)
    • Neoreklami has been detected

      • RkfnNyX.exe (PID: 6476)
    • Uses NirSoft utilities to collect credentials

      • AcroBroker.exe (PID: 776)
    • Process drops SQLite DLL files

      • tuc4.tmp (PID: 10104)
      • adobe.tmp (PID: 3880)
    • Dropped object may contain TOR URL's

      • Assistant_106.0.4998.16_Setup.exe_sfx.exe (PID: 9384)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:12:20 07:24:29+01:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 80
CodeSize: 5632
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x34e6
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows command line
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 0.0.0.0
InternalName: New Text Document mod.exe
LegalCopyright:
OriginalFileName: New Text Document mod.exe
ProductVersion: 0.0.0.0
AssemblyVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
697
Monitored processes
531
Malicious processes
91
Suspicious processes
19

Behavior graph

Click at the process to see the details
start inject #HAUSBOMBER new text document mod.bin.exe conhost.exe no specs rundll32.exe no specs updater_3.exe no specs ama.exe no specs foxi.exe no specs #AMADEY utsysc.exe on0ri91.exe no specs #RISEPRO 4ln988ig.exe updater.exe cmd.exe conhost.exe no specs schtasks.exe no specs cmd.exe conhost.exe no specs schtasks.exe no specs schtasks.exe no specs conhost.exe no specs updater.exe no specs updater.exe no specs updater.exe no specs 473892748329d.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs reg.exe no specs reg.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs chcp.com no specs netsh.exe no specs #STEALC timesync.exe cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs reg.exe no specs tasklist.exe no specs werfault.exe winscp.exe powershell.exe no specs conhost.exe no specs setup294.exe no specs control.exe no specs rundll32.exe no specs rundll32.exe no specs rundll32.exe netsh.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs 288c47bbc1871b42239df19ff4df68f076.exe no specs 288c47bbc1871b439df19ff4df68f076.exe no specs installsetup9.exe no specs installsetup9.exe toolspub2.exe no specs broomsetup.exe no specs werfault.exe toolspub2.exe wlanext.exe no specs screensaver.exe #STEALC nsu4f1f.tmp.exe recorder.exe journal.exe rundll64.exe cmd.exe no specs conhost.exe no specs fodhelper.exe no specs fodhelper.exe no specs fodhelper.exe xxx.exe no specs #LUMMA 6vm5bn1.exe regasm.exe 288c47bbc1871b439df19ff4df68f076.exe no specs powershell.exe no specs conhost.exe no specs werfault.exe rundll32.exe #GLUPTEBA 288c47bbc1871b439df19ff4df68f076.exe powershell.exe no specs conhost.exe no specs installsetup2.exe no specs installsetup2.exe rundll32.exe no specs rundll32.exe no specs powershell.exe no specs conhost.exe no specs installutil.exe cmd.exe no specs conhost.exe no specs netsh.exe no specs powershell.exe no specs conhost.exe no specs azulucsyxptkatsnadtux6dk.exe f305ba-b4b69ab5.exe powershell.exe no specs conhost.exe no specs regasm.exe winsat.exe no specs winsat.exe powershell.exe no specs conhost.exe no specs conhost.exe no specs wlanext.exe 473892748329d.exe no specs werfault.exe rby1.exe no specs powershell.exe no specs conhost.exe no specs installutil.exe 8ris9ou7du0nox04qpnabkmr.exe broomsetup.exe no specs u7lzj7xttryluws7h5rftbhm.exe cv4qetduovr6c2jsujedc3z5.exe u7lzj7xttryluws7h5rftbhm.exe u7lzj7xttryluws7h5rftbhm.exe no specs u7lzj7xttryluws7h5rftbhm.exe 7qy2pj51.exe no specs u7lzj7xttryluws7h5rftbhm.exe powershell.exe no specs conhost.exe no specs #GLUPTEBA csrss.exe #STEALC nsja6d4.tmp powershell.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs schtasks.exe no specs schtasks.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs rjcq1eowwa1w1vhpa0sdesms.exe no specs 7xuijhzf5nuci3jiic0api5a.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs m9pyttbq42t8d78caimhjecx.exe lqlwqxex3dd4jiaxzisetbkx.exe broomsetup.exe no specs d2c3.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs #REDLINE regasm.exe cmd.exe no specs ptkwzjmrdf2mzzxeocrmy80e.exe werfault.exe conhost.exe no specs ptkwzjmrdf2mzzxeocrmy80e.exe timeout.exe no specs ptkwzjmrdf2mzzxeocrmy80e.exe no specs rjcq1eowwa1w1vhpa0sdesms.exe #STEALC nsdd7f6.tmp powershell.exe no specs conhost.exe no specs mountvol.exe no specs conhost.exe no specs mountvol.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs 7xuijhzf5nuci3jiic0api5a.exe cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs powershell.exe no specs conhost.exe no specs huldhm6dstehlk6bdfkthd3h.exe no specs w4kiea8avkk03clwsskfaqgk.exe no specs qemu-ga.exe no specs cmd.exe no specs conhost.exe no specs fodhelper.exe no specs cmd.exe no specs conhost.exe no specs fodhelper.exe no specs fodhelper.exe no specs fodhelper.exe no specs fodhelper.exe fodhelper.exe suzmjrw0veyb7shkm0budole.exe no specs w4kiea8avkk03clwsskfaqgk.exe no specs suzmjrw0veyb7shkm0budole.exe utsysc.exe no specs d4zqx6ukjqwqxy3t3p6sjn6x.exe no specs powershell.exe no specs conhost.exe no specs werfault.exe tiworker.exe no specs install.exe no specs install.exe no specs forfiles.exe no specs conhost.exe no specs forfiles.exe no specs conhost.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs w4kiea8avkk03clwsskfaqgk.exe schtasks.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs werfault.exe 15b8.exe no specs conhost.exe no specs schtasks.exe no specs regasm.exe conhost.exe no specs schtasks.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs windefender.exe no specs conhost.exe no specs cmd.exe no specs sc.exe no specs windefender.exe no specs gpupdate.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs svchost.exe 4e6d.exe no specs #LUMMA 53ae.exe schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs regsvcs.exe no specs regsvcs.exe no specs #LUMMA regsvcs.exe werfault.exe a0e4.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs #REDLINE a4ae.exe reg.exe no specs conhost.exe no specs iojmibhyhiws.exe no specs cmd.exe no specs reg.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe choice.exe no specs be52.exe cheat.exe no specs cheat.tmp no specs #HAVOC updatecheck.exe cheat.exe cheat.tmp no specs #NEOREKLAMI rkfnnyx.exe utsysc.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs updater.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs adelrcp.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs #REMCOS acrobroker.exe svchost.exe no specs acrobroker.exe acrobroker.exe no specs acrobroker.exe acrobroker.exe svchost.exe no specs etopt.exe no specs etopt.exe svchost.exe no specs svchost.exe no specs svchost.exe no specs svchost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs vgrjsaq.exe schtasks.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs schtasks.exe no specs conhost.exe no specs svchost.exe no specs svchost.exe no specs svchost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs svchost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs rundll32.exe no specs #NEOREKLAMI rundll32.exe schtasks.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs schtasks.exe no specs conhost.exe no specs svchost.exe no specs svchost.exe no specs svchost.exe no specs #SMOKE explorer.exe svchost.exe no specs svchost.exe no specs svchost.exe no specs svchost.exe no specs forrock.exe no specs svchost.exe no specs installsetup8.exe no specs installsetup8.exe toolspub2.exe no specs 31839b57a4f11171d6abc8bbc4451ee4.exe no specs broomsetup.exe no specs tuc4.exe no specs ww.exe tuc4.tmp no specs toolspub2.exe no specs etopt.exe no specs svchost.exe no specs etopt.exe tuc4.exe tuc4.tmp no specs ~tla253.tmp no specs #STEALC nsm9e2f.tmp.exe svchost.exe no specs cmd.exe no specs svchost.exe no specs conhost.exe no specs svchost.exe no specs #RHADAMANTHYS dialer.exe filecoauth.exe no specs adobe.exe no specs svchost.exe no specs fodhelper.exe no specs adobe.tmp no specs werfault.exe no specs werfault.exe svchost.exe no specs fodhelper.exe no specs utsysc.exe no specs net.exe no specs conhost.exe no specs adobe.exe fodhelper.exe svchost.exe no specs adobe.tmp no specs net1.exe no specs datapumpcrt.exe no specs 31839b57a4f11171d6abc8bbc4451ee4.exe no specs svchost.exe no specs assistant_106.0.4998.16_setup.exe_sfx.exe no specs svchost.exe no specs powershell.exe no specs datapumpcrt.exe no specs assistant_installer.exe conhost.exe no specs assistant_installer.exe cloudpanelcrt.exe no specs cloudpanelcrt.exe no specs #RISEPRO rest.exe svchost.exe no specs build_2023-12-19_21-29.exe svchost.exe no specs 31839b57a4f11171d6abc8bbc4451ee4.exe ma.exe no specs svchost.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs timeout.exe no specs conhost.exe no specs svchost.exe no specs openwith.exe svchost.exe no specs onedrive.exe schtasks.exe no specs conhost.exe no specs svchost.exe no specs werfault.exe svchost.exe no specs cp.exe no specs againn.exe conhost.exe no specs crypted.exe no specs svchost.exe no specs applaunch.exe #MINER vbc.exe powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs svchost.exe no specs conhost.exe no specs timeout.exe no specs svchost.exe no specs v1220-55000.exe #AMADEY build3.exe svchost.exe no specs schtasks.exe no specs conhost.exe no specs xrjnzc.exe no specs svchost.exe no specs wmplayer.exe no specs schtasks.exe no specs conhost.exe no specs svchost.exe no specs schtasks.exe no specs conhost.exe no specs svchost.exe no specs svchost.exe no specs svchost.exe no specs e0cbefcb1af40c7d4aff4aca26621a98.exe no specs svchost.exe no specs creal.exe no specs svchost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
208"C:\Users\admin\Desktop\a\foxi.exe" C:\Users\admin\Desktop\a\foxi.exeNew Text Document mod.bin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Win32 Cabinet Self-Extractor
Exit code:
0
Version:
11.00.17763.1 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\desktop\a\foxi.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
232powershell -nologo -noprofileC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.execsrss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
304"C:\WINDOWS\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PFyMVQBTqyMfTHrGChR" /t REG_DWORD /d 0 /reg:64C:\Windows\SysWOW64\reg.exepowershell.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\advapi32.dll
320\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
360"C:\WINDOWS\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64C:\Windows\SysWOW64\reg.exepowershell.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\advapi32.dll
480C:\WINDOWS\Temp\UzbGweNWhjQHFrIg\dVezHpaBnwUcBiC\vGRJSaQ.exe 71 /rMsite_idsMa 385118 /SC:\Windows\Temp\UzbGweNWhjQHFrIg\dVezHpaBnwUcBiC\vGRJSaQ.exe
svchost.exe
User:
SYSTEM
Company:
Field Occasion Rot
Integrity Level:
SYSTEM
Description:
Aisle lazy at the moment act prominent shower
Exit code:
0
Version:
646.927.380.528
Modules
Images
c:\windows\temp\uzbgwenwhjqhfrig\dvezhpabnwucbic\vgrjsaq.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
512"C:\Windows \System32\winSAT.exe" formalC:\Windows \System32\winSAT.exe473892748329d.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows System Assessment Tool
Exit code:
3221226540
Version:
10.0.19041.207 (WinBuild.160101.0800)
Modules
Images
c:\windows \system32\winsat.exe
c:\windows\system32\ntdll.dll
540"C:\Users\admin\Desktop\New Text Document mod.bin.exe" C:\Users\admin\Desktop\New Text Document mod.bin.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\new text document mod.bin.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
640"C:\Users\admin\Desktop\a\updater_3.exe" C:\Users\admin\Desktop\a\updater_3.exeNew Text Document mod.bin.exe
User:
admin
Company:
updater
Integrity Level:
MEDIUM
Description:
updater is a video game
Exit code:
0
Version:
1.0.0
Modules
Images
c:\users\admin\desktop\a\updater_3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
644"C:\WINDOWS\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zOWWuTQUU" /t REG_DWORD /d 0 /reg:64C:\Windows\SysWOW64\reg.exepowershell.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\advapi32.dll
Total events
314 081
Read events
313 216
Write events
827
Delete events
38

Modification events

(PID) Process:(4500) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconLayouts
Value:
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
(PID) Process:(4500) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconNameVersion
Value:
1
(PID) Process:(4500) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconLayouts
Value:
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
(PID) Process:(4500) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconLayouts
Value:
00000000000000000000000000000000030001000100010014000000000000002C000000000000003A003A007B00360034003500460046003000340030002D0035003000380031002D0031003000310042002D0039004600300038002D003000300041004100300030003200460039003500340045007D003E002000200000001000000000000000430043006C00650061006E00650072002E006C006E006B003E0020007C00000019000000000000004100630072006F0062006100740020005200650061006400650072002000440043002E006C006E006B003E0020007C0000000F00000000000000460069007200650066006F0078002E006C006E006B003E0020007C000000150000000000000047006F006F0067006C00650020004300680072006F006D0065002E006C006E006B003E0020007C000000180000000000000056004C00430020006D006500640069006100200070006C0061007900650072002E006C006E006B003E0020007C00000016000000000000004D006900630072006F0073006F0066007400200045006400670065002E006C006E006B003E0020007C0000000D0000000000000053006B007900700065002E006C006E006B003E0020007C00000014000000000000006100630074006900760069007400790062006F00790073002E007200740066003E0020002000000013000000000000006A006500770065006C007200790062006F00790073002E0070006E0067003E0020002000000014000000000000006C0061006E00670075006100670065007200650061006C002E007200740066003E0020002000000010000000000000006C006500650077006F0072006C0064002E0070006E0067003E0020002000000016000000000000006D006F00620069006C006500650076006900640065006E00630065002E006A00700067003E0020002000000014000000000000006D00750073007400670072006100700068006900630073002E0070006E0067003E0020002000000015000000000000006E006F0074006500730069006E006400750073007400720079002E007200740066003E0020002000000017000000000000006F0066006600650072006500640061007000700072006F006100630068002E007200740066003E0020002000000017000000000000006F00750074007000750074006600720061006E0063006900730063006F002E0070006E0067003E002000200000001600000000000000720065006700690073007400650072006500640063006F006C0064002E0070006E0067003E0020002000000021000000000000004E006500770020005400650078007400200044006F00630075006D0065006E00740020006D006F0064002E00620069006E002E006500780065003E00200020000000050000000000000061003E005C0020000000010000000000000002000100000000000000000001000000000000000200010000000000000000001100000006000000010000001400000000000000000000000000000000000000803F0000004008000000803F0000404009000000803F000080400A000000803F0000A0400B0000000040000000000C00000000400000803F0D0000000040000000400E0000000040000040400F0000000040000080401000000000400000A0401100000000000000803F0100000000000000004002000000000000004040030000000000000080400400000000000000A04005000000803F0000000006000000803F0000803F0700000080410000A0401300000070410000A0401200
(PID) Process:(4500) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconLayouts
Value:
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
(PID) Process:(4500) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
Operation:writeName:LastUpdate
Value:
3F97796500000000
(PID) Process:(4500) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{DE7B24EA-73C8-4A09-985D-5BDADCFA9017}.check.800
Operation:writeName:CheckSetting
Value:
23004100430042006C006F006200000000000000010000008000000073006F0067FBAA064038DA01000000007B00440045003700420032003400450041002D0037003300430038002D0034004100300039002D0039003800350044002D003500420044004100440043004600410039003000310037007D002E006E006F00740069006600690063006100740069006F006E002E003200000000000000000000006E0065
(PID) Process:(4500) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(4500) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
04000000030000000E000000000000000C0000000D0000000B000000050000000A000000090000000800000001000000070000000600000002000000FFFFFFFF
(PID) Process:(4500) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar
Operation:writeName:Locked
Value:
1
Executable files
415
Suspicious files
475
Text files
763
Unknown types
10

Dropped files

PID
Process
Filename
Type
640updater_3.exeC:\Users\admin\AppData\Local\Temp\nsfEB52.tmp\app-64.7z
MD5:
SHA256:
640updater_3.exeC:\Users\admin\AppData\Local\Temp\nsfEB52.tmp\7z-out\icudtl.dat
MD5:
SHA256:
640updater_3.exeC:\Users\admin\AppData\Local\Temp\nsfEB52.tmp\7z-out\LICENSES.chromium.html
MD5:
SHA256:
640updater_3.exeC:\Users\admin\AppData\Local\Temp\nsfEB52.tmp\nsis7z.dllexecutable
MD5:80E44CE4895304C6A3A831310FBF8CD0
SHA256:B393F05E8FF919EF071181050E1873C9A776E1A0AE8329AEFFF7007D0CADF592
4500explorer.exeC:\Users\admin\Desktop\a\ama.exeexecutable
MD5:8040BF334ABB56D0334CB8605F1058E1
SHA256:4CCD029B87117D4B359756D8A03525D54A6DB750C40AD415F3A31D1B92073AE2
640updater_3.exeC:\Users\admin\AppData\Local\Temp\nsfEB52.tmp\System.dllexecutable
MD5:0D7AD4F45DC6F5AA87F606D0331C6901
SHA256:3EB38AE99653A7DBC724132EE240F6E5C4AF4BFE7C01D31D23FAF373F9F2EACA
640updater_3.exeC:\Users\admin\AppData\Local\Temp\nsfEB52.tmp\7z-out\chrome_100_percent.pakbinary
MD5:237CA1BE894F5E09FD1CCB934229C33B
SHA256:F14362449E2A7C940C095EDA9C41AAD5F1E0B1A1B21D1DC911558291C0C36DD2
4500explorer.exeC:\Users\admin\Desktop\a\updater_3.exeexecutable
MD5:77DA9A910787400ED529A30CD7C0B176
SHA256:858C700BA7D85AA2FFCA00A8DABDC63B727D128C9E4EE965F5CDE9C2E1C6447B
640updater_3.exeC:\Users\admin\AppData\Local\Temp\nsfEB52.tmp\7z-out\locales\es.pakbinary
MD5:E9B6D88C4A56B81AA136FBBAFC818BBF
SHA256:07EBBA3CA9248B15BA39C0CC48AEC98A19B4A8F70850AC8CDBDEFC4312F36DD7
640updater_3.exeC:\Users\admin\AppData\Local\Temp\nsfEB52.tmp\7z-out\locales\da.pakbinary
MD5:F5679C4866AF2CEA4CD087567F52288D
SHA256:7BD576C9D4F55C75D05D259EA7A0EA70A4440BFFD4A9E0873E85A7EAF3F5E93B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
285
TCP/UDP connections
698
DNS requests
127
Threats
440

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5484
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D
unknown
binary
314 b
unknown
2624
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
binary
418 b
unknown
5976
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
binary
471 b
unknown
1092
svchost.exe
POST
302
23.35.238.131:80
http://go.microsoft.com/fwlink/?LinkID=252669&clcid=0x409
unknown
unknown
2624
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
binary
409 b
unknown
1092
svchost.exe
POST
302
23.35.238.131:80
http://go.microsoft.com/fwlink/?LinkID=252669&clcid=0x409
unknown
unknown
540
New Text Document mod.bin.exe
GET
200
185.172.128.32:80
http://185.172.128.32/ama.exe
unknown
executable
5.18 Mb
unknown
4056
Utsysc.exe
POST
200
185.172.128.5:80
http://185.172.128.5/v8sjh3hs8/index.php
unknown
text
2 b
unknown
540
New Text Document mod.bin.exe
GET
200
77.91.68.21:80
http://77.91.68.21/nova/foxi.exe
unknown
executable
2.02 Mb
unknown
540
New Text Document mod.bin.exe
GET
200
88.151.192.77:80
http://88.151.192.77/473892748329d.exe
unknown
executable
5.27 Mb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2260
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
540
New Text Document mod.bin.exe
151.101.2.49:443
urlhaus.abuse.ch
FASTLY
US
unknown
540
New Text Document mod.bin.exe
162.159.135.233:443
cdn.discordapp.com
CLOUDFLARENET
shared
896
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5612
MoUsoCoreWorker.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5612
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5976
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5976
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1092
svchost.exe
23.35.238.131:80
go.microsoft.com
AKAMAI-AS
DE
unknown
1092
svchost.exe
138.91.171.81:80
dmd.metaservices.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
urlhaus.abuse.ch
  • 151.101.2.49
  • 151.101.66.49
  • 151.101.130.49
  • 151.101.194.49
whitelisted
cdn.discordapp.com
  • 162.159.135.233
  • 162.159.134.233
  • 162.159.130.233
  • 162.159.129.233
  • 162.159.133.233
shared
login.live.com
  • 40.126.32.74
  • 20.190.160.14
  • 20.190.160.22
  • 40.126.32.76
  • 40.126.32.72
  • 40.126.32.140
  • 20.190.160.20
  • 40.126.32.68
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
dmd.metaservices.microsoft.com
  • 138.91.171.81
  • 20.231.121.79
whitelisted
www.bing.com
  • 104.126.37.178
  • 104.126.37.171
  • 104.126.37.130
  • 104.126.37.131
  • 104.126.37.185
  • 104.126.37.177
  • 104.126.37.186
  • 104.126.37.136
  • 104.126.37.128
  • 92.123.104.64
  • 92.123.104.52
  • 92.123.104.38
  • 92.123.104.8
  • 92.123.104.40
  • 92.123.104.59
  • 92.123.104.34
  • 92.123.104.31
  • 92.123.104.17
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 88.221.169.152
whitelisted

Threats

PID
Process
Class
Message
2136
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discordapp .com)
540
New Text Document mod.bin.exe
Misc activity
ET INFO Observed Discord Domain (discordapp .com in TLS SNI)
540
New Text Document mod.bin.exe
Potential Corporate Privacy Violation
AV POLICY HTTP request for .exe file with no User-Agent
540
New Text Document mod.bin.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
540
New Text Document mod.bin.exe
Potentially Bad Traffic
ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
540
New Text Document mod.bin.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
540
New Text Document mod.bin.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
540
New Text Document mod.bin.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
540
New Text Document mod.bin.exe
Potential Corporate Privacy Violation
AV POLICY HTTP request for .exe file with no User-Agent
540
New Text Document mod.bin.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
34 ETPRO signatures available at the full report
Process
Message
assistant_installer.exe
[1226/221507.311:INFO:assistant_installer_main.cc(177)] Running assistant installer with command line "C:\Users\admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312262212411\assistant\assistant_installer.exe" --version