Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Fabookie is an infostealer malware that was first observed as early as October 2021. The threat is known for targeting account credentials of Facebook users. The collected information is then sold by the attackers to other criminals. Fabookie is often distributed via loaders such as SmokeLoader.
GCleaner is a type of malware loader that has the capability to deliver numerous malicious software programs, which differ based on the location of the targeted victim. This malware is commonly spread through fraudulent websites that advertise free PC optimization tools
A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.
Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.
PrivateLoader is a malware family that is specifically created to infect computer systems and drop additional malicious programs. It operates using a pay-per-install business model, which means that the individuals behind it are paid for each instance of successful deployment of different types of harmful programs, including trojans, stealers, and other ransomware.
Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.
Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.
RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.
The main function of Smoke Loader is dropping other, more destructive malware on infected machines. However, unlike many competing loaders, this one can be extended via plugins to feature destructive, malicious info-stealing functions.
Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.
Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.
Vidar is a dangerous malware that steals information and cryptocurrency from infected users. It derives its name from the ancient Scandinavian god of Vengeance. This stealer has been terrorizing the internet since 2018.
ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
Launch configuration
Task duration:
300 seconds
Heavy Evasion option:
Network geolocation:
off
Additional time used:
240 seconds
MITM proxy:
off
Privacy:
Public submission
Fakenet option:
off
Route via Tor:
off
Autoconfirmation of UAC:
on
Network:
on
Software preset
Internet Explorer 11.0.9600.18860 KB4052978
Adobe Acrobat Reader DC MUI (15.007.20033)
Adobe Flash Player 27 ActiveX (27.0.0.187)
Adobe Flash Player 27 NPAPI (27.0.0.187)
Adobe Flash Player 27 PPAPI (27.0.0.187)
CCleaner (5.35)
Google Chrome (75.0.3770.100)
Google Update Helper (1.3.33.23)
Java 8 Update 92 (64-bit) (8.0.920.14)
Java Auto Updater (2.8.92.14)
Microsoft .NET Framework 4.7.1 (4.7.02558)
Microsoft .NET Framework 4.7.1 (4.7.02558)
Microsoft Office Access MUI (English) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (English) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Groove MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office IME (Japanese) 2010 (14.0.4763.1000)
Microsoft Office IME (Japanese) 2010 (14.0.4763.1000)
Microsoft Office IME (Korean) 2010 (14.0.4763.1000)
Microsoft Office IME (Korean) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (French) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (German) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Language Pack 2010 - French/Français (14.0.4763.1000)
Microsoft Office Language Pack 2010 - German/Deutsch (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Italian/Italiano (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Japanese/日本語 (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Korean/한국어 (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Portuguese/Português (Brasil) (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Russian/русский (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Spanish/Español (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Turkish/Türkçe (14.0.4763.1013)
Microsoft Office O MUI (French) 2010 (14.0.4763.1000)
Microsoft Office O MUI (German) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Office 32-bit Components 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (English) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (French) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (German) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Outlook MUI (English) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office PowerPoint MUI (English) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (French) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (German) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Professional 2010 (14.0.4763.1000)
Microsoft Office Proof (Arabic) 2010 (14.0.4763.1000)
Microsoft Office Proof (Basque) 2010 (14.0.4763.1000)
Microsoft Office Proof (Catalan) 2010 (14.0.4763.1000)
Microsoft Office Proof (Dutch) 2010 (14.0.4763.1000)
Microsoft Office Proof (English) 2010 (14.0.4763.1000)
Microsoft Office Proof (French) 2010 (14.0.4763.1000)
Microsoft Office Proof (Galician) 2010 (14.0.4763.1000)
Microsoft Office Proof (German) 2010 (14.0.4763.1000)
Microsoft Office Proof (Italian) 2010 (14.0.4763.1000)
Microsoft Office Proof (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Proof (Korean) 2010 (14.0.4763.1000)
Microsoft Office Proof (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Proof (Russian) 2010 (14.0.4763.1000)
Microsoft Office Proof (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Proof (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Proof (Ukrainian) 2010 (14.0.4763.1000)
Microsoft Office Proofing (English) 2010 (14.0.4763.1000)
Microsoft Office Proofing (French) 2010 (14.0.4763.1000)
Microsoft Office Proofing (German) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Italian) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Korean) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Russian) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Publisher MUI (English) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office SharePoint Designer MUI (French) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (German) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Shared 32-bit MUI (English) 2010 (14.0.4763.1000)
Microsoft Office Shared 32-bit MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Shared 32-bit MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Shared 32-bit MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Shared 32-bit MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Shared 32-bit MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Shared 32-bit MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Shared 32-bit MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Shared 32-bit MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Shared 32-bit MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Shared MUI (English) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.4763.1000)
Microsoft Office Single Image 2010 (14.0.4763.1000)
Microsoft Office Word MUI (English) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office X MUI (French) 2010 (14.0.4763.1000)
Microsoft Office X MUI (German) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Visual C++ 2005 Redistributable (x64) (8.0.61000)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 (9.0.30729.6161)
Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219 (10.0.40219)
Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.61030 (11.0.61030.0)
Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.61030 (11.0.61030)
Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.61030 (11.0.61030)
Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.30501 (12.0.30501.0)
Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005 (12.0.21005)
Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005 (12.0.21005)
Microsoft Visual C++ 2015-2019 Redistributable (x64) - 14.21.27702 (14.21.27702.2)
Microsoft Visual C++ 2015-2019 Redistributable (x86) - 14.21.27702 (14.21.27702.2)
Microsoft Visual C++ 2019 X64 Additional Runtime - 14.21.27702 (14.21.27702)
Microsoft Visual C++ 2019 X64 Minimum Runtime - 14.21.27702 (14.21.27702)
Microsoft Visual C++ 2019 X86 Additional Runtime - 14.21.27702 (14.21.27702)
Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.21.27702 (14.21.27702)
Mozilla Firefox 67.0.4 (x64 en-US) (67.0.4)
Mozilla Maintenance Service (67.0.4)
Notepad++ (64-bit x64) (7.5.1)
Opera 12.15 (12.15.1748)
Skype™ 7.39 (7.39.102)
Update for Microsoft .NET Framework 4.7.1 (KB4054852) (1)
VLC media player (2.2.6)
WinRAR 5.60 (64-bit) (5.60.0)
MALICIOUS
Creates a writable file the system directory
File.exe (PID: 2412)
7bLPqgAE29n9oU6GE1YnkOFx.exe (PID: 2212)
Actions looks like stealing of personal data
File.exe (PID: 2412)
qfOIPfK6dpmmrpvIxMZTZwT6.exe (PID: 2088)
AppLaunch.exe (PID: 1976)
sxUi8Tz06yKustozuqr9FIE_.exe (PID: 2832)
iK3FNYYWmN0ZQnTtjXew17BN.exe (PID: 2872)
AppLaunch.exe (PID: 1796)
AppLaunch.exe (PID: 2572)
certreq.exe (PID: 1660)
c3418797.exe (PID: 1776)
64D8.exe (PID: 2264)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
BB28.exe (PID: 2816)
uYa76gMuKTb.exe (PID: 1280)
build2.exe (PID: 1604)
build2.exe (PID: 2052)
AppLaunch.exe (PID: 3256)
jklP9z9u5977lOM9Jra3Lt6H.exe (PID: 1172)
JWtU8KbMMiNFD5ZcHJgEt4g7.exe (PID: 3976)
AppLaunch.exe (PID: 3588)
AppLaunch.exe (PID: 2336)
AppLaunch.exe (PID: 3208)
AppLaunch.exe (PID: 616)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
l9jUx7d0.exe (PID: 2776)
Connects to the CnC server
File.exe (PID: 2412)
7bLPqgAE29n9oU6GE1YnkOFx.exe (PID: 2212)
o8BacxcDKYM4CFjxgAGbyc7U.exe (PID: 2360)
qfOIPfK6dpmmrpvIxMZTZwT6.exe (PID: 2088)
iK3FNYYWmN0ZQnTtjXew17BN.exe (PID: 2872)
AppLaunch.exe (PID: 2572)
AppLaunch.exe (PID: 1976)
AppLaunch.exe (PID: 1796)
sxUi8Tz06yKustozuqr9FIE_.exe (PID: 2832)
explorer.exe (PID: 1960)
64D8.exe (PID: 2264)
c3418797.exe (PID: 1776)
RepSpacer78.exe (PID: 2596)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
danke.exe (PID: 2712)
BB28.exe (PID: 2816)
AppLaunch.exe (PID: 2024)
build2.exe (PID: 1604)
oneetx.exe (PID: 3052)
JWtU8KbMMiNFD5ZcHJgEt4g7.exe (PID: 3976)
AppLaunch.exe (PID: 3256)
AppLaunch.exe (PID: 3588)
build2.exe (PID: 2052)
AppLaunch.exe (PID: 3208)
OMphQbCyFcCBtl7DvvxMXYSx.exe (PID: 2476)
jklP9z9u5977lOM9Jra3Lt6H.exe (PID: 1172)
RepSpacer78.exe (PID: 1356)
AppLaunch.exe (PID: 1840)
PRIVATELOADER was detected
File.exe (PID: 2412)
7bLPqgAE29n9oU6GE1YnkOFx.exe (PID: 2212)
o8BacxcDKYM4CFjxgAGbyc7U.exe (PID: 2360)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
OMphQbCyFcCBtl7DvvxMXYSx.exe (PID: 2476)
Application was dropped or rewritten from another process
sxUi8Tz06yKustozuqr9FIE_.exe (PID: 2832)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
UfdXqjmddmTSw4pp9XDFO156.exe (PID: 2840)
Dn6iN06bsqb_g5yKsZOT2Pq0.exe (PID: 2852)
JyihcsQD1yeLr20qD0UiiIa9.exe (PID: 464)
iK3FNYYWmN0ZQnTtjXew17BN.exe (PID: 2872)
W_LA7WppHNUKTAnX9pzbFzJA.exe (PID: 1844)
qfOIPfK6dpmmrpvIxMZTZwT6.exe (PID: 2088)
v3399208.exe (PID: 2868)
v3011165.exe (PID: 2792)
v7644261.exe (PID: 1392)
a6832903.exe (PID: 1768)
b1048830.exe (PID: 700)
SchGOLr.exe (PID: 3040)
c3418797.exe (PID: 1776)
64D8.exe (PID: 2264)
674A.exe (PID: 124)
674A.exe (PID: 2136)
d7969463.exe (PID: 2668)
e4008881.exe (PID: 2988)
danke.exe (PID: 2712)
bRqGy8ZO0L9.exe (PID: 2412)
s1EuMu.exe (PID: 2668)
BB28.exe (PID: 2816)
uYa76gMuKTb.exe (PID: 1280)
674A.exe (PID: 2812)
BCDF.exe (PID: 912)
674A.exe (PID: 2536)
CDD7.exe (PID: 2016)
CDD7.exe (PID: 1928)
p6iLKtOtkvK.exe (PID: 3016)
build2.exe (PID: 2328)
build2.exe (PID: 1604)
CDD7.exe (PID: 2388)
build3.exe (PID: 2648)
CDD7.exe (PID: 412)
oneetx.exe (PID: 3052)
oldplayer.exe (PID: 2180)
XandETC.exe (PID: 504)
XandETC.exe (PID: 1840)
DD78.exe (PID: 2868)
aafg31.exe (PID: 2352)
build2.exe (PID: 1792)
jqwt4qIT1ugnZkmyfERtiBSV.exe (PID: 2188)
TJ6_cQ1YaU5cfvsQEZR56UyP.exe (PID: 2400)
_1jsb9UznTJhOyAZS_Y2ed70.exe (PID: 3224)
jklP9z9u5977lOM9Jra3Lt6H.exe (PID: 1172)
build2.exe (PID: 2052)
build3.exe (PID: 3220)
N5MuUgzv.exe (PID: 3340)
oMY7Im.exe (PID: 3656)
l9jUx7d0.exe (PID: 2776)
mstsca.exe (PID: 3940)
oneetx.exe (PID: 4056)
danke.exe (PID: 1864)
updater.exe (PID: 1792)
K3nsneTyPq.exe (PID: 3668)
Loads dropped or rewritten executable
is-4KIRT.tmp (PID: 1788)
regsvr32.exe (PID: 1740)
uYa76gMuKTb.exe (PID: 1280)
build2.exe (PID: 1604)
is-U2A04.tmp (PID: 3088)
msiexec.exe (PID: 3756)
build2.exe (PID: 2052)
rundll32.exe (PID: 3316)
l9jUx7d0.exe (PID: 2776)
Registers / Runs the DLL via REGSVR32.EXE
UfdXqjmddmTSw4pp9XDFO156.exe (PID: 2840)
Steals credentials from Web Browsers
AppLaunch.exe (PID: 1976)
iK3FNYYWmN0ZQnTtjXew17BN.exe (PID: 2872)
AppLaunch.exe (PID: 1796)
AppLaunch.exe (PID: 2572)
c3418797.exe (PID: 1776)
64D8.exe (PID: 2264)
uYa76gMuKTb.exe (PID: 1280)
build2.exe (PID: 1604)
AppLaunch.exe (PID: 3256)
build2.exe (PID: 2052)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
AppLaunch.exe (PID: 3208)
AppLaunch.exe (PID: 3588)
JWtU8KbMMiNFD5ZcHJgEt4g7.exe (PID: 3976)
l9jUx7d0.exe (PID: 2776)
REDLINE was detected
qfOIPfK6dpmmrpvIxMZTZwT6.exe (PID: 2088)
AppLaunch.exe (PID: 2572)
iK3FNYYWmN0ZQnTtjXew17BN.exe (PID: 2872)
AppLaunch.exe (PID: 1976)
AppLaunch.exe (PID: 1796)
c3418797.exe (PID: 1776)
64D8.exe (PID: 2264)
BB28.exe (PID: 2816)
AppLaunch.exe (PID: 3256)
AppLaunch.exe (PID: 3588)
AppLaunch.exe (PID: 3208)
JWtU8KbMMiNFD5ZcHJgEt4g7.exe (PID: 3976)
Application was injected by another process
explorer.exe (PID: 1960)
Runs injected code in another process
Dn6iN06bsqb_g5yKsZOT2Pq0.exe (PID: 2852)
Disables Windows Defender
a6832903.exe (PID: 1768)
b1048830.exe (PID: 700)
FABOOKIE was detected
sxUi8Tz06yKustozuqr9FIE_.exe (PID: 2832)
jklP9z9u5977lOM9Jra3Lt6H.exe (PID: 1172)
PRIVATELOADER detected by memory dumps
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
o8BacxcDKYM4CFjxgAGbyc7U.exe (PID: 2360)
7bLPqgAE29n9oU6GE1YnkOFx.exe (PID: 2212)
OMphQbCyFcCBtl7DvvxMXYSx.exe (PID: 2476)
SMOKE was detected
explorer.exe (PID: 1960)
Changes the Windows auto-update feature
b1048830.exe (PID: 700)
GCLEANER was detected
RepSpacer78.exe (PID: 2596)
RepSpacer78.exe (PID: 1356)
Changes the autorun value in the registry
danke.exe (PID: 2712)
oneetx.exe (PID: 3052)
Uses Task Scheduler to run other applications
danke.exe (PID: 2712)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
build3.exe (PID: 2648)
oneetx.exe (PID: 3052)
build3.exe (PID: 3220)
mstsca.exe (PID: 3940)
powershell.exe (PID: 4024)
Uses Task Scheduler to autorun other applications
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
powershell.exe (PID: 3444)
AMADEY was detected
danke.exe (PID: 2712)
oneetx.exe (PID: 3052)
Stop is detected
674A.exe (PID: 2812)
CDD7.exe (PID: 412)
AMADEY detected by memory dumps
danke.exe (PID: 2712)
oneetx.exe (PID: 3052)
Steals credentials
uYa76gMuKTb.exe (PID: 1280)
build2.exe (PID: 1604)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
build2.exe (PID: 2052)
l9jUx7d0.exe (PID: 2776)
Starts CMD.EXE for self-deleting
uYa76gMuKTb.exe (PID: 1280)
RepSpacer78.exe (PID: 2596)
l9jUx7d0.exe (PID: 2776)
RepSpacer78.exe (PID: 1356)
VIDAR was detected
build2.exe (PID: 1604)
build2.exe (PID: 2052)
LUMMA detected by memory dumps
AppLaunch.exe (PID: 616)
LUMMA was detected
AppLaunch.exe (PID: 2336)
AppLaunch.exe (PID: 616)
AppLaunch.exe (PID: 3180)
ARKEI was detected
build2.exe (PID: 2052)
l9jUx7d0.exe (PID: 2776)
Adds path to the Windows Defender exclusion list
explorer.exe (PID: 1960)
SUSPICIOUS
Adds/modifies Windows certificates
WinRAR.exe (PID: 2432)
RepSpacer78.exe (PID: 2596)
CDD7.exe (PID: 2016)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
Connects to the server without a host name
File.exe (PID: 2412)
7bLPqgAE29n9oU6GE1YnkOFx.exe (PID: 2212)
o8BacxcDKYM4CFjxgAGbyc7U.exe (PID: 2360)
RepSpacer78.exe (PID: 2596)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
danke.exe (PID: 2712)
explorer.exe (PID: 1960)
oneetx.exe (PID: 3052)
OMphQbCyFcCBtl7DvvxMXYSx.exe (PID: 2476)
RepSpacer78.exe (PID: 1356)
AppLaunch.exe (PID: 1840)
Reads settings of System Certificates
File.exe (PID: 2412)
o8BacxcDKYM4CFjxgAGbyc7U.exe (PID: 2360)
7bLPqgAE29n9oU6GE1YnkOFx.exe (PID: 2212)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
674A.exe (PID: 2812)
uYa76gMuKTb.exe (PID: 1280)
CDD7.exe (PID: 1928)
build2.exe (PID: 1604)
build2.exe (PID: 2052)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
OMphQbCyFcCBtl7DvvxMXYSx.exe (PID: 2476)
l9jUx7d0.exe (PID: 2776)
Executes as Windows Service
raserver.exe (PID: 2880)
raserver.exe (PID: 2912)
raserver.exe (PID: 2692)
raserver.exe (PID: 2488)
raserver.exe (PID: 3524)
Reads the Internet Settings
File.exe (PID: 2412)
sxUi8Tz06yKustozuqr9FIE_.exe (PID: 2832)
UfdXqjmddmTSw4pp9XDFO156.exe (PID: 2840)
RepSpacer78.exe (PID: 2596)
explorer.exe (PID: 1960)
674A.exe (PID: 2136)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
e4008881.exe (PID: 2988)
danke.exe (PID: 2712)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
674A.exe (PID: 2812)
uYa76gMuKTb.exe (PID: 1280)
AppLaunch.exe (PID: 2336)
AppLaunch.exe (PID: 2024)
CDD7.exe (PID: 1928)
CDD7.exe (PID: 412)
DD78.exe (PID: 2868)
AppLaunch.exe (PID: 616)
oldplayer.exe (PID: 2180)
oneetx.exe (PID: 3052)
build2.exe (PID: 1604)
jklP9z9u5977lOM9Jra3Lt6H.exe (PID: 1172)
build2.exe (PID: 2052)
_1jsb9UznTJhOyAZS_Y2ed70.exe (PID: 3224)
RepSpacer78.exe (PID: 1356)
powershell.exe (PID: 3920)
l9jUx7d0.exe (PID: 2776)
AppLaunch.exe (PID: 1840)
AppLaunch.exe (PID: 3180)
Executable content was dropped or overwritten
File.exe (PID: 2412)
JyihcsQD1yeLr20qD0UiiIa9.exe (PID: 464)
W_LA7WppHNUKTAnX9pzbFzJA.exe (PID: 1844)
is-4KIRT.tmp (PID: 1788)
v3399208.exe (PID: 2868)
UfdXqjmddmTSw4pp9XDFO156.exe (PID: 2840)
v3011165.exe (PID: 2792)
v7644261.exe (PID: 1392)
RepSpacer78.exe (PID: 2596)
explorer.exe (PID: 1960)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
e4008881.exe (PID: 2988)
674A.exe (PID: 2136)
674A.exe (PID: 2812)
uYa76gMuKTb.exe (PID: 1280)
build3.exe (PID: 2648)
DD78.exe (PID: 2868)
oldplayer.exe (PID: 2180)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
CDD7.exe (PID: 412)
TJ6_cQ1YaU5cfvsQEZR56UyP.exe (PID: 2400)
_1jsb9UznTJhOyAZS_Y2ed70.exe (PID: 3224)
is-U2A04.tmp (PID: 3088)
RepSpacer78.exe (PID: 1356)
danke.exe (PID: 2712)
XandETC.exe (PID: 1840)
Checks Windows Trust Settings
File.exe (PID: 2412)
674A.exe (PID: 2812)
uYa76gMuKTb.exe (PID: 1280)
CDD7.exe (PID: 1928)
build2.exe (PID: 1604)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
build2.exe (PID: 2052)
l9jUx7d0.exe (PID: 2776)
Reads security settings of Internet Explorer
File.exe (PID: 2412)
674A.exe (PID: 2812)
uYa76gMuKTb.exe (PID: 1280)
CDD7.exe (PID: 1928)
build2.exe (PID: 1604)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
build2.exe (PID: 2052)
l9jUx7d0.exe (PID: 2776)
Process requests binary or script from the Internet
File.exe (PID: 2412)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
explorer.exe (PID: 1960)
674A.exe (PID: 2812)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
CDD7.exe (PID: 412)
danke.exe (PID: 2712)
Connects to unusual port
File.exe (PID: 2412)
AppLaunch.exe (PID: 1976)
iK3FNYYWmN0ZQnTtjXew17BN.exe (PID: 2872)
qfOIPfK6dpmmrpvIxMZTZwT6.exe (PID: 2088)
AppLaunch.exe (PID: 2572)
AppLaunch.exe (PID: 1796)
2XmlBiQgNCJEAQyeCKnWLtBZ.exe (PID: 2120)
c3418797.exe (PID: 1776)
64D8.exe (PID: 2264)
certreq.exe (PID: 1660)
BB28.exe (PID: 2816)
uYa76gMuKTb.exe (PID: 1280)
build2.exe (PID: 1604)
AppLaunch.exe (PID: 3256)
JWtU8KbMMiNFD5ZcHJgEt4g7.exe (PID: 3976)
AppLaunch.exe (PID: 3588)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
build2.exe (PID: 2052)
AppLaunch.exe (PID: 3208)
l9jUx7d0.exe (PID: 2776)
Reads the Windows owner or organization settings
is-4KIRT.tmp (PID: 1788)
is-U2A04.tmp (PID: 3088)
The process checks if it is being run in the virtual environment
regsvr32.exe (PID: 1740)
2XmlBiQgNCJEAQyeCKnWLtBZ.exe (PID: 2120)
msiexec.exe (PID: 3756)
Reads Microsoft Outlook installation path
RepSpacer78.exe (PID: 2596)
RepSpacer78.exe (PID: 1356)
Checks for external IP
7bLPqgAE29n9oU6GE1YnkOFx.exe (PID: 2212)
o8BacxcDKYM4CFjxgAGbyc7U.exe (PID: 2360)
File.exe (PID: 2412)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
OMphQbCyFcCBtl7DvvxMXYSx.exe (PID: 2476)
Searches for installed software
qfOIPfK6dpmmrpvIxMZTZwT6.exe (PID: 2088)
AppLaunch.exe (PID: 1976)
iK3FNYYWmN0ZQnTtjXew17BN.exe (PID: 2872)
AppLaunch.exe (PID: 2572)
AppLaunch.exe (PID: 1796)
certreq.exe (PID: 1660)
c3418797.exe (PID: 1776)
64D8.exe (PID: 2264)
BB28.exe (PID: 2816)
uYa76gMuKTb.exe (PID: 1280)
build2.exe (PID: 1604)
is-U2A04.tmp (PID: 3088)
AppLaunch.exe (PID: 3256)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
build2.exe (PID: 2052)
JWtU8KbMMiNFD5ZcHJgEt4g7.exe (PID: 3976)
AppLaunch.exe (PID: 3208)
AppLaunch.exe (PID: 2336)
AppLaunch.exe (PID: 3588)
l9jUx7d0.exe (PID: 2776)
AppLaunch.exe (PID: 616)
Process communicates with Telegram (possibly using it as an attacker's C2 server)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
uYa76gMuKTb.exe (PID: 1280)
build2.exe (PID: 1604)
build2.exe (PID: 2052)
l9jUx7d0.exe (PID: 2776)
Reads browser cookies
qfOIPfK6dpmmrpvIxMZTZwT6.exe (PID: 2088)
AppLaunch.exe (PID: 1976)
iK3FNYYWmN0ZQnTtjXew17BN.exe (PID: 2872)
AppLaunch.exe (PID: 1796)
AppLaunch.exe (PID: 2572)
64D8.exe (PID: 2264)
c3418797.exe (PID: 1776)
BB28.exe (PID: 2816)
AppLaunch.exe (PID: 3256)
JWtU8KbMMiNFD5ZcHJgEt4g7.exe (PID: 3976)
AppLaunch.exe (PID: 3208)
AppLaunch.exe (PID: 3588)
Application launched itself
674A.exe (PID: 124)
cmd.exe (PID: 2840)
674A.exe (PID: 2536)
674A.exe (PID: 2136)
CDD7.exe (PID: 2016)
build2.exe (PID: 2328)
CDD7.exe (PID: 1928)
CDD7.exe (PID: 2388)
cmd.exe (PID: 2300)
explorer.exe (PID: 1960)
build2.exe (PID: 1792)
Loads DLL from Mozilla Firefox
certreq.exe (PID: 1660)
Accesses Microsoft Outlook profiles
certreq.exe (PID: 1660)
Starts itself from another location
e4008881.exe (PID: 2988)
oldplayer.exe (PID: 2180)
Starts CMD.EXE for commands execution
cmd.exe (PID: 2840)
danke.exe (PID: 2712)
oneetx.exe (PID: 3052)
cmd.exe (PID: 2300)
uYa76gMuKTb.exe (PID: 1280)
RepSpacer78.exe (PID: 2596)
explorer.exe (PID: 1960)
l9jUx7d0.exe (PID: 2776)
RepSpacer78.exe (PID: 1356)
Uses ICACLS.EXE to modify access control lists
cmd.exe (PID: 2840)
674A.exe (PID: 2136)
cmd.exe (PID: 2300)
Reads the BIOS version
bRqGy8ZO0L9.exe (PID: 2412)
s1EuMu.exe (PID: 2668)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
oMY7Im.exe (PID: 3656)
Uses TIMEOUT.EXE to delay execution
cmd.exe (PID: 1732)
cmd.exe (PID: 1524)
Uses TASKKILL.EXE to kill process
cmd.exe (PID: 2776)
cmd.exe (PID: 3152)
Script adds exclusion path to Windows Defender
explorer.exe (PID: 1960)
Starts POWERSHELL.EXE for commands execution
explorer.exe (PID: 1960)
Starts SC.EXE for service management
cmd.exe (PID: 3272)
The process checks if current user has admin rights
explorer.exe (PID: 1960)
Uses powercfg.exe to modify the power settings
cmd.exe (PID: 3296)
The process executes via Task Scheduler
mstsca.exe (PID: 3940)
oneetx.exe (PID: 4056)
danke.exe (PID: 1864)
updater.exe (PID: 1792)
Uses REG/REGEDIT.EXE to modify registry
cmd.exe (PID: 3272)
INFO
Checks supported languages
File.exe (PID: 2412)
sxUi8Tz06yKustozuqr9FIE_.exe (PID: 2832)
UfdXqjmddmTSw4pp9XDFO156.exe (PID: 2840)
iK3FNYYWmN0ZQnTtjXew17BN.exe (PID: 2872)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
JyihcsQD1yeLr20qD0UiiIa9.exe (PID: 464)
qfOIPfK6dpmmrpvIxMZTZwT6.exe (PID: 2088)
sYptvclcwAuqZcxcHTibMmy0.exe (PID: 2280)
vuUG5hnwthvkiqXOCwY0aQ3A.exe (PID: 2892)
o8BacxcDKYM4CFjxgAGbyc7U.exe (PID: 2360)
xSnNTymRtCfk5vjYwOPCv8RO.exe (PID: 2216)
7bLPqgAE29n9oU6GE1YnkOFx.exe (PID: 2212)
W_LA7WppHNUKTAnX9pzbFzJA.exe (PID: 1844)
AppLaunch.exe (PID: 2572)
AppLaunch.exe (PID: 1976)
2XmlBiQgNCJEAQyeCKnWLtBZ.exe (PID: 2120)
AppLaunch.exe (PID: 1796)
is-4KIRT.tmp (PID: 1788)
v3399208.exe (PID: 2868)
Dn6iN06bsqb_g5yKsZOT2Pq0.exe (PID: 2852)
v3011165.exe (PID: 2792)
v7644261.exe (PID: 1392)
RepSpacer78.exe (PID: 2596)
b1048830.exe (PID: 700)
a6832903.exe (PID: 1768)
SchGOLr.exe (PID: 3040)
c3418797.exe (PID: 1776)
64D8.exe (PID: 2264)
674A.exe (PID: 124)
674A.exe (PID: 2136)
d7969463.exe (PID: 2668)
e4008881.exe (PID: 2988)
danke.exe (PID: 2712)
bRqGy8ZO0L9.exe (PID: 2412)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
s1EuMu.exe (PID: 2668)
BCDF.exe (PID: 912)
BB28.exe (PID: 2816)
uYa76gMuKTb.exe (PID: 1280)
674A.exe (PID: 2812)
674A.exe (PID: 2536)
CDD7.exe (PID: 2016)
p6iLKtOtkvK.exe (PID: 3016)
AppLaunch.exe (PID: 2336)
CDD7.exe (PID: 1928)
build2.exe (PID: 2328)
AppLaunch.exe (PID: 2024)
build2.exe (PID: 1604)
CDD7.exe (PID: 2388)
build3.exe (PID: 2648)
CDD7.exe (PID: 412)
DD78.exe (PID: 2868)
oldplayer.exe (PID: 2180)
AppLaunch.exe (PID: 616)
XandETC.exe (PID: 1840)
oneetx.exe (PID: 3052)
build2.exe (PID: 1792)
jqwt4qIT1ugnZkmyfERtiBSV.exe (PID: 2188)
jklP9z9u5977lOM9Jra3Lt6H.exe (PID: 1172)
jMo313G7V5N0k1jaPV9Koe8Y.exe (PID: 3216)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
_1jsb9UznTJhOyAZS_Y2ed70.exe (PID: 3224)
DsvMHMhVvXuG97fFlc1m_w6F.exe (PID: 3352)
sS4189ueVD0iDAx3ShIpPBs0.exe (PID: 3984)
AppLaunch.exe (PID: 3588)
JWtU8KbMMiNFD5ZcHJgEt4g7.exe (PID: 3976)
TJ6_cQ1YaU5cfvsQEZR56UyP.exe (PID: 2400)
build2.exe (PID: 2052)
AppLaunch.exe (PID: 3256)
is-U2A04.tmp (PID: 3088)
AppLaunch.exe (PID: 3208)
OMphQbCyFcCBtl7DvvxMXYSx.exe (PID: 2476)
build3.exe (PID: 3220)
RepSpacer78.exe (PID: 1356)
N5MuUgzv.exe (PID: 3340)
oMY7Im.exe (PID: 3656)
l9jUx7d0.exe (PID: 2776)
danke.exe (PID: 1864)
oneetx.exe (PID: 4056)
mstsca.exe (PID: 3940)
AppLaunch.exe (PID: 1840)
K3nsneTyPq.exe (PID: 3668)
updater.exe (PID: 1792)
AppLaunch.exe (PID: 3180)
The process checks LSA protection
File.exe (PID: 2412)
UfdXqjmddmTSw4pp9XDFO156.exe (PID: 2840)
sxUi8Tz06yKustozuqr9FIE_.exe (PID: 2832)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
is-4KIRT.tmp (PID: 1788)
7bLPqgAE29n9oU6GE1YnkOFx.exe (PID: 2212)
o8BacxcDKYM4CFjxgAGbyc7U.exe (PID: 2360)
iK3FNYYWmN0ZQnTtjXew17BN.exe (PID: 2872)
qfOIPfK6dpmmrpvIxMZTZwT6.exe (PID: 2088)
AppLaunch.exe (PID: 1796)
AppLaunch.exe (PID: 2572)
AppLaunch.exe (PID: 1976)
2XmlBiQgNCJEAQyeCKnWLtBZ.exe (PID: 2120)
RepSpacer78.exe (PID: 2596)
64D8.exe (PID: 2264)
explorer.exe (PID: 1960)
c3418797.exe (PID: 1776)
674A.exe (PID: 2136)
e4008881.exe (PID: 2988)
danke.exe (PID: 2712)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
674A.exe (PID: 2812)
icacls.exe (PID: 2968)
BB28.exe (PID: 2816)
uYa76gMuKTb.exe (PID: 1280)
AppLaunch.exe (PID: 2336)
bRqGy8ZO0L9.exe (PID: 2412)
AppLaunch.exe (PID: 2024)
CDD7.exe (PID: 1928)
CDD7.exe (PID: 412)
s1EuMu.exe (PID: 2668)
AppLaunch.exe (PID: 616)
DD78.exe (PID: 2868)
oneetx.exe (PID: 3052)
oldplayer.exe (PID: 2180)
build2.exe (PID: 1604)
taskkill.exe (PID: 2544)
_1jsb9UznTJhOyAZS_Y2ed70.exe (PID: 3224)
JWtU8KbMMiNFD5ZcHJgEt4g7.exe (PID: 3976)
jklP9z9u5977lOM9Jra3Lt6H.exe (PID: 1172)
AppLaunch.exe (PID: 3208)
AppLaunch.exe (PID: 3256)
is-U2A04.tmp (PID: 3088)
build2.exe (PID: 2052)
AppLaunch.exe (PID: 3588)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
jqwt4qIT1ugnZkmyfERtiBSV.exe (PID: 2188)
OMphQbCyFcCBtl7DvvxMXYSx.exe (PID: 2476)
RepSpacer78.exe (PID: 1356)
l9jUx7d0.exe (PID: 2776)
AppLaunch.exe (PID: 1840)
oMY7Im.exe (PID: 3656)
AppLaunch.exe (PID: 3180)
taskkill.exe (PID: 3252)
Reads the computer name
File.exe (PID: 2412)
sxUi8Tz06yKustozuqr9FIE_.exe (PID: 2832)
AppLaunch.exe (PID: 2572)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
AppLaunch.exe (PID: 1976)
AppLaunch.exe (PID: 1796)
is-4KIRT.tmp (PID: 1788)
iK3FNYYWmN0ZQnTtjXew17BN.exe (PID: 2872)
qfOIPfK6dpmmrpvIxMZTZwT6.exe (PID: 2088)
UfdXqjmddmTSw4pp9XDFO156.exe (PID: 2840)
7bLPqgAE29n9oU6GE1YnkOFx.exe (PID: 2212)
o8BacxcDKYM4CFjxgAGbyc7U.exe (PID: 2360)
a6832903.exe (PID: 1768)
2XmlBiQgNCJEAQyeCKnWLtBZ.exe (PID: 2120)
RepSpacer78.exe (PID: 2596)
b1048830.exe (PID: 700)
64D8.exe (PID: 2264)
c3418797.exe (PID: 1776)
674A.exe (PID: 2136)
e4008881.exe (PID: 2988)
danke.exe (PID: 2712)
bRqGy8ZO0L9.exe (PID: 2412)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
s1EuMu.exe (PID: 2668)
674A.exe (PID: 2812)
BB28.exe (PID: 2816)
uYa76gMuKTb.exe (PID: 1280)
AppLaunch.exe (PID: 2336)
AppLaunch.exe (PID: 2024)
CDD7.exe (PID: 1928)
build2.exe (PID: 1604)
CDD7.exe (PID: 412)
AppLaunch.exe (PID: 616)
DD78.exe (PID: 2868)
oldplayer.exe (PID: 2180)
oneetx.exe (PID: 3052)
jklP9z9u5977lOM9Jra3Lt6H.exe (PID: 1172)
AppLaunch.exe (PID: 3588)
JWtU8KbMMiNFD5ZcHJgEt4g7.exe (PID: 3976)
AppLaunch.exe (PID: 3208)
build2.exe (PID: 2052)
_1jsb9UznTJhOyAZS_Y2ed70.exe (PID: 3224)
is-U2A04.tmp (PID: 3088)
AppLaunch.exe (PID: 3256)
jqwt4qIT1ugnZkmyfERtiBSV.exe (PID: 2188)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
OMphQbCyFcCBtl7DvvxMXYSx.exe (PID: 2476)
RepSpacer78.exe (PID: 1356)
oMY7Im.exe (PID: 3656)
l9jUx7d0.exe (PID: 2776)
AppLaunch.exe (PID: 1840)
AppLaunch.exe (PID: 3180)
Reads the machine GUID from the registry
File.exe (PID: 2412)
sxUi8Tz06yKustozuqr9FIE_.exe (PID: 2832)
iK3FNYYWmN0ZQnTtjXew17BN.exe (PID: 2872)
qfOIPfK6dpmmrpvIxMZTZwT6.exe (PID: 2088)
AppLaunch.exe (PID: 1796)
AppLaunch.exe (PID: 2572)
AppLaunch.exe (PID: 1976)
2XmlBiQgNCJEAQyeCKnWLtBZ.exe (PID: 2120)
o8BacxcDKYM4CFjxgAGbyc7U.exe (PID: 2360)
RepSpacer78.exe (PID: 2596)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
7bLPqgAE29n9oU6GE1YnkOFx.exe (PID: 2212)
64D8.exe (PID: 2264)
c3418797.exe (PID: 1776)
674A.exe (PID: 2136)
e4008881.exe (PID: 2988)
danke.exe (PID: 2712)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
BB28.exe (PID: 2816)
674A.exe (PID: 2812)
uYa76gMuKTb.exe (PID: 1280)
bRqGy8ZO0L9.exe (PID: 2412)
AppLaunch.exe (PID: 2336)
AppLaunch.exe (PID: 2024)
CDD7.exe (PID: 1928)
build2.exe (PID: 1604)
CDD7.exe (PID: 412)
s1EuMu.exe (PID: 2668)
AppLaunch.exe (PID: 616)
oldplayer.exe (PID: 2180)
oneetx.exe (PID: 3052)
JWtU8KbMMiNFD5ZcHJgEt4g7.exe (PID: 3976)
jklP9z9u5977lOM9Jra3Lt6H.exe (PID: 1172)
build2.exe (PID: 2052)
AppLaunch.exe (PID: 3588)
AppLaunch.exe (PID: 3208)
AppLaunch.exe (PID: 3256)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
OMphQbCyFcCBtl7DvvxMXYSx.exe (PID: 2476)
jqwt4qIT1ugnZkmyfERtiBSV.exe (PID: 2188)
RepSpacer78.exe (PID: 1356)
l9jUx7d0.exe (PID: 2776)
AppLaunch.exe (PID: 1840)
oMY7Im.exe (PID: 3656)
AppLaunch.exe (PID: 3180)
Process checks computer location settings
File.exe (PID: 2412)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
Checks proxy server information
File.exe (PID: 2412)
sxUi8Tz06yKustozuqr9FIE_.exe (PID: 2832)
RepSpacer78.exe (PID: 2596)
674A.exe (PID: 2136)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
danke.exe (PID: 2712)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
674A.exe (PID: 2812)
uYa76gMuKTb.exe (PID: 1280)
AppLaunch.exe (PID: 2336)
AppLaunch.exe (PID: 2024)
CDD7.exe (PID: 1928)
CDD7.exe (PID: 412)
AppLaunch.exe (PID: 616)
oneetx.exe (PID: 3052)
build2.exe (PID: 1604)
jklP9z9u5977lOM9Jra3Lt6H.exe (PID: 1172)
build2.exe (PID: 2052)
RepSpacer78.exe (PID: 1356)
l9jUx7d0.exe (PID: 2776)
AppLaunch.exe (PID: 1840)
AppLaunch.exe (PID: 3180)
Creates files or folders in the user directory
File.exe (PID: 2412)
sxUi8Tz06yKustozuqr9FIE_.exe (PID: 2832)
RepSpacer78.exe (PID: 2596)
explorer.exe (PID: 1960)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
674A.exe (PID: 2136)
674A.exe (PID: 2812)
uYa76gMuKTb.exe (PID: 1280)
CDD7.exe (PID: 1928)
build3.exe (PID: 2648)
AppLaunch.exe (PID: 616)
VH1UcyhOpu6QAytAA4bFL3Kg.exe (PID: 556)
AppLaunch.exe (PID: 2336)
CDD7.exe (PID: 412)
jklP9z9u5977lOM9Jra3Lt6H.exe (PID: 1172)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
danke.exe (PID: 2712)
RepSpacer78.exe (PID: 1356)
Create files in a temporary directory
File.exe (PID: 2412)
JyihcsQD1yeLr20qD0UiiIa9.exe (PID: 464)
W_LA7WppHNUKTAnX9pzbFzJA.exe (PID: 1844)
is-4KIRT.tmp (PID: 1788)
v3399208.exe (PID: 2868)
UfdXqjmddmTSw4pp9XDFO156.exe (PID: 2840)
v3011165.exe (PID: 2792)
v7644261.exe (PID: 1392)
explorer.exe (PID: 1960)
e4008881.exe (PID: 2988)
DD78.exe (PID: 2868)
oldplayer.exe (PID: 2180)
TJ6_cQ1YaU5cfvsQEZR56UyP.exe (PID: 2400)
is-U2A04.tmp (PID: 3088)
_1jsb9UznTJhOyAZS_Y2ed70.exe (PID: 3224)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
JWtU8KbMMiNFD5ZcHJgEt4g7.exe (PID: 3976)
Application was dropped or rewritten from another process
is-4KIRT.tmp (PID: 1788)
is-U2A04.tmp (PID: 3088)
Creates files in the program directory
is-4KIRT.tmp (PID: 1788)
XK64lh1fBajdQQmvX9SlTBA2.exe (PID: 1704)
uYa76gMuKTb.exe (PID: 1280)
build2.exe (PID: 1604)
is-U2A04.tmp (PID: 3088)
build2.exe (PID: 2052)
XandETC.exe (PID: 1840)
l9jUx7d0.exe (PID: 2776)
Reads Environment values
qfOIPfK6dpmmrpvIxMZTZwT6.exe (PID: 2088)
AppLaunch.exe (PID: 1976)
AppLaunch.exe (PID: 1796)
iK3FNYYWmN0ZQnTtjXew17BN.exe (PID: 2872)
AppLaunch.exe (PID: 2572)
64D8.exe (PID: 2264)
c3418797.exe (PID: 1776)
BB28.exe (PID: 2816)
uYa76gMuKTb.exe (PID: 1280)
build2.exe (PID: 1604)
AppLaunch.exe (PID: 3256)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
JWtU8KbMMiNFD5ZcHJgEt4g7.exe (PID: 3976)
AppLaunch.exe (PID: 3208)
AppLaunch.exe (PID: 3588)
build2.exe (PID: 2052)
l9jUx7d0.exe (PID: 2776)
Manual execution by a user
certreq.exe (PID: 1660)
Process checks are UAC notifies on
bRqGy8ZO0L9.exe (PID: 2412)
s1EuMu.exe (PID: 2668)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
oMY7Im.exe (PID: 3656)
Reads product name
uYa76gMuKTb.exe (PID: 1280)
build2.exe (PID: 1604)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
build2.exe (PID: 2052)
l9jUx7d0.exe (PID: 2776)
Reads CPU info
uYa76gMuKTb.exe (PID: 1280)
build2.exe (PID: 1604)
g_hoMAUw4VwjOKlYHTY7P3Sg.exe (PID: 3304)
build2.exe (PID: 2052)
l9jUx7d0.exe (PID: 2776)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
PrivateLoader
(PID) Process(1704) XK64lh1fBajdQQmvX9SlTBA2.exe
C2 (4)85.208.136.10
94.142.138.131
94.142.138.113
208.67.104.60
Strings (62)Unknown
SOFTWARE\Microsoft\Cryptography
MachineGuid
telegram.org
twitter.com
yandex.ru
google.com
/api/tracemap.php
http://
15.5pnp.10.lock
data=
/api/firecom.php
ipinfo.io/widget
country
db-ip.com
data-api-key="
/self
countryCode
www.maxmind.com/geoip/v2.1/city/me
iso_code
GetIP
api.ipgeolocation.io/ipgeo?include=hostname&ip=
country_code2
PowerControl
\PowerControl
\PowerControl_Svc.exe
Power monitoring service for your device.
WININET.dll
WINHTTP.dll
85.208.136.10
94.142.138.131
94.142.138.113
208.67.104.60
GetVersion|
GetUpdateLink
https://
Later
" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST
schtasks /create /f /RU "
" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST
WinHttpConnect
WinHttpQueryHeaders
WinHttpOpen
WinHttpOpenRequest
WinHttpQueryDataAvailable
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpReadData
WinHttpCloseHandle
WinHttpSetTimeouts
CharNextA
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36