analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://cdn.discordapp.com/attachments/972462409266655305/977438551669108766/File.7z?file=181.zip

Full analysis: https://app.any.run/tasks/1366a8a3-7aaa-44c1-ad3e-9d5882eea485
Verdict: Malicious activity
Threats:

Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.

Analysis date: May 21, 2022, 06:22:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
trojan
socelars
stealer
loader
rat
redline
tofsee
amadey
opendir
ransomware
stop
miner
Indicators:
MD5:

46821FD3FF1E4E87DBA6BEC314D2F029

SHA1:

2615BB8D62A375881BDE41AA4999D6B4D874B1CE

SHA256:

E1C605EBC3E29A930CFC9504C0FCC6B705BE9983A893A8B5C0077FBC0705F930

SSDEEP:

3:N8cCWdy6//jB1VcrFWVfjiblB3gGjIAjIADn:2cry6XjD2lhB3x9jIADn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • WinRAR.exe (PID: 4032)
      • NiceProcessX32.bmp.exe (PID: 2912)
      • File.exe (PID: 3152)
      • 13.php.exe (PID: 1832)
      • cmd.exe (PID: 3916)
      • Service.bmp.exe (PID: 3984)
      • fxdd.bmp.exe (PID: 1000)
      • hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
      • test33.bmp.exe (PID: 908)
      • mixinte2001.bmp.exe (PID: 4008)
      • random.exe.exe (PID: 3272)
      • real2001.bmp.exe (PID: 2268)
      • test33.bmp.exe (PID: 1036)
      • IQwqPtAU3c7.exe (PID: 2464)
      • gYaqqhiDI.exe (PID: 2736)
      • download2.exe.exe (PID: 4084)
      • utube2005.bmp.exe (PID: 3752)
      • setup.exe (PID: 3132)
      • TrdngAnlzr22649.exe.exe (PID: 2660)
      • Install.exe (PID: 2208)
      • setup.tmp (PID: 1256)
      • setup.exe (PID: 3984)
      • setup.tmp (PID: 3064)
      • Congiunto.exe.pif (PID: 3480)
      • orxds.exe (PID: 1208)
      • build2.exe (PID: 2656)
      • GF6GB.exe (PID: 3316)
      • Install.exe (PID: 1808)
      • Congiunto.exe.pif (PID: 3756)
      • AppLaunch.exe (PID: 1600)
      • lokes_1.bmp.exe (PID: 3928)
      • IsrGSPs.exe (PID: 5912)
      • eCYGTdT.exe (PID: 4528)
    • Changes settings of System certificates

      • File.exe (PID: 3152)
      • Service.bmp.exe (PID: 3984)
      • test33.bmp.exe (PID: 908)
      • wam.exe.exe (PID: 1104)
      • svchost.exe (PID: 2468)
    • Application was dropped or rewritten from another process

      • File.exe (PID: 3152)
      • File.exe (PID: 116)
      • NiceProcessX32.bmp.exe (PID: 2912)
      • Service.bmp.exe (PID: 3984)
      • 13.php.exe (PID: 1832)
      • SetupMEXX.exe.exe (PID: 2496)
      • Offscum.exe.exe (PID: 2200)
      • rrmix.exe.exe (PID: 2356)
      • file1.exe.exe (PID: 1980)
      • wam.exe.exe (PID: 1104)
      • mxsfsaaa.exe (PID: 2428)
      • 6523.exe.exe (PID: 2548)
      • FJEfRXZ.exe.exe (PID: 1048)
      • prolivv.bmp.exe (PID: 2336)
      • test33.bmp.exe (PID: 3676)
      • real2001.bmp.exe (PID: 2268)
      • mixinte2001.bmp.exe (PID: 4008)
      • olympteam_build_crypted_2.bmp.exe (PID: 2420)
      • test33.bmp.exe (PID: 908)
      • norm2.bmp.exe (PID: 2552)
      • hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
      • fxdd.bmp.exe (PID: 1000)
      • lokes_1.bmp.exe (PID: 3928)
      • unmatured.bmp.exe (PID: 2120)
      • arabcode_crypted_3.bmp.exe (PID: 1224)
      • ShortnessUnsol.bmp.exe (PID: 3108)
      • Fenix_7.bmp.exe (PID: 3744)
      • orxds.exe (PID: 1208)
      • TrdngAnlzr22649.exe.exe (PID: 2660)
      • NiceProcessX32.bmp.exe (PID: 2380)
      • setup777.exe.exe (PID: 780)
      • random.exe.exe (PID: 1972)
      • test33.bmp.exe (PID: 3972)
      • random.exe.exe (PID: 3272)
      • 0pbZ7.exe (PID: 3020)
      • FJEfRXZ.exe.exe (PID: 4044)
      • mixinte2001.bmp.exe (PID: 2448)
      • test33.bmp.exe (PID: 1036)
      • IQwqPtAU3c7.exe (PID: 2464)
      • search_hyperfs_310.exe.exe (PID: 2168)
      • gYaqqhiDI.exe (PID: 2736)
      • utube2005.bmp.exe (PID: 3752)
      • strongix.exe (PID: 2548)
      • Install.exe (PID: 2208)
      • ll.exe (PID: 1764)
      • ll.exe (PID: 2516)
      • build2.exe (PID: 2664)
      • download2.exe.exe (PID: 4084)
      • H2506.exe (PID: 3244)
      • Cleaner.exe (PID: 2416)
      • setup331.exe (PID: 4092)
      • setup.exe (PID: 3132)
      • Install.exe (PID: 1808)
      • InvisBrowser45856.exe (PID: 2064)
      • build2.exe (PID: 2656)
      • Tabivuz.exe (PID: 1312)
      • orxds.exe (PID: 3348)
      • setup.exe (PID: 3984)
      • 1A2C2.exe (PID: 2124)
      • GF6GB.exe (PID: 3316)
      • 1K9D4.exe (PID: 1292)
      • svmine.exe (PID: 3592)
      • orxds.exe (PID: 5952)
      • IsrGSPs.exe (PID: 5912)
      • 9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
      • eCYGTdT.exe (PID: 4528)
      • orxds.exe (PID: 4612)
      • Cleaner.exe (PID: 4732)
    • Disables Windows Defender

      • File.exe (PID: 3152)
      • hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
    • SOCELARS was detected

      • File.exe (PID: 3152)
      • hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
    • Connects to CnC server

      • File.exe (PID: 3152)
      • Offscum.exe.exe (PID: 2200)
      • rrmix.exe.exe (PID: 2356)
      • AppLaunch.exe (PID: 916)
      • AppLaunch.exe (PID: 3712)
      • Service.bmp.exe (PID: 3984)
      • SetupMEXX.exe.exe (PID: 2496)
      • Fenix_7.bmp.exe (PID: 3744)
      • AppLaunch.exe (PID: 3564)
      • hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
      • AppLaunch.exe (PID: 1600)
      • orxds.exe (PID: 1208)
      • lokes_1.bmp.exe (PID: 3928)
      • ShortnessUnsol.bmp.exe (PID: 3108)
      • svchost.exe (PID: 3296)
      • strongix.exe (PID: 2548)
      • rundll32.exe (PID: 5772)
      • H2506.exe (PID: 3244)
      • 1A2C2.exe (PID: 2124)
      • 9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
    • REDLINE was detected

      • Offscum.exe.exe (PID: 2200)
      • rrmix.exe.exe (PID: 2356)
      • AppLaunch.exe (PID: 916)
      • AppLaunch.exe (PID: 3712)
      • SetupMEXX.exe.exe (PID: 2496)
      • Fenix_7.bmp.exe (PID: 3744)
      • AppLaunch.exe (PID: 3564)
      • AppLaunch.exe (PID: 1600)
      • lokes_1.bmp.exe (PID: 3928)
      • ShortnessUnsol.bmp.exe (PID: 3108)
      • strongix.exe (PID: 2548)
      • H2506.exe (PID: 3244)
      • 1A2C2.exe (PID: 2124)
      • 9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
    • Actions looks like stealing of personal data

      • Offscum.exe.exe (PID: 2200)
      • rrmix.exe.exe (PID: 2356)
      • AppLaunch.exe (PID: 3712)
      • Fenix_7.bmp.exe (PID: 3744)
      • ShortnessUnsol.bmp.exe (PID: 3108)
      • SetupMEXX.exe.exe (PID: 2496)
      • AppLaunch.exe (PID: 916)
      • AppLaunch.exe (PID: 1600)
      • real2001.bmp.exe (PID: 2268)
      • lokes_1.bmp.exe (PID: 3928)
      • download2.exe.exe (PID: 4084)
      • InvisBrowser45856.exe (PID: 2064)
      • setup.tmp (PID: 1256)
      • svchost.exe (PID: 2468)
      • rundll32.exe (PID: 5772)
      • build2.exe (PID: 2656)
      • AppLaunch.exe (PID: 3564)
      • H2506.exe (PID: 3244)
      • strongix.exe (PID: 2548)
      • 1A2C2.exe (PID: 2124)
      • 9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
      • eCYGTdT.exe (PID: 4528)
    • Steals credentials from Web Browsers

      • Offscum.exe.exe (PID: 2200)
      • rrmix.exe.exe (PID: 2356)
      • AppLaunch.exe (PID: 3712)
      • Fenix_7.bmp.exe (PID: 3744)
      • ShortnessUnsol.bmp.exe (PID: 3108)
      • real2001.bmp.exe (PID: 2268)
      • AppLaunch.exe (PID: 1600)
      • lokes_1.bmp.exe (PID: 3928)
      • svchost.exe (PID: 2468)
      • build2.exe (PID: 2656)
      • strongix.exe (PID: 2548)
      • AppLaunch.exe (PID: 916)
      • SetupMEXX.exe.exe (PID: 2496)
      • AppLaunch.exe (PID: 3564)
      • 1A2C2.exe (PID: 2124)
      • H2506.exe (PID: 3244)
      • 9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
      • eCYGTdT.exe (PID: 4528)
    • Changes the autorun value in the registry

      • FJEfRXZ.exe.exe (PID: 1048)
      • test33.bmp.exe (PID: 908)
      • FJEfRXZ.exe.exe (PID: 4044)
      • GF6GB.exe (PID: 3316)
    • Uses SVCHOST.EXE for hidden code execution

      • mxsfsaaa.exe (PID: 2428)
      • svchost.exe (PID: 2652)
    • Runs app for hidden code execution

      • cmd.exe (PID: 2144)
      • cmd.exe (PID: 2844)
    • Uses TASKLIST.EXE to query information about running processes

      • cmd.exe (PID: 4056)
      • cmd.exe (PID: 2116)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 4056)
      • cmd.exe (PID: 2116)
    • REDLINE detected by memory dumps

      • rrmix.exe.exe (PID: 2356)
      • AppLaunch.exe (PID: 916)
      • AppLaunch.exe (PID: 3712)
      • norm2.bmp.exe (PID: 2552)
      • AppLaunch.exe (PID: 2584)
      • AppLaunch.exe (PID: 3564)
      • AppLaunch.exe (PID: 1600)
      • 9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
    • Uses Task Scheduler to run other applications

      • Service.bmp.exe (PID: 3984)
      • Service.bmp.exe (PID: 3984)
      • orxds.exe (PID: 1208)
      • cmd.exe (PID: 3584)
      • Install.exe (PID: 1808)
      • IsrGSPs.exe (PID: 5912)
      • eCYGTdT.exe (PID: 4528)
      • eCYGTdT.exe (PID: 4528)
      • rundll32.EXE (PID: 2880)
    • TOFSEE detected by memory dumps

      • svchost.exe (PID: 2652)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 2352)
      • schtasks.exe (PID: 2632)
      • schtasks.exe (PID: 3220)
      • test33.bmp.exe (PID: 908)
      • test33.bmp.exe (PID: 1036)
      • schtasks.exe (PID: 3048)
      • schtasks.exe (PID: 4748)
      • schtasks.exe (PID: 1760)
      • schtasks.exe (PID: 5336)
      • schtasks.exe (PID: 2804)
      • schtasks.exe (PID: 3328)
      • svchost.exe (PID: 872)
      • schtasks.exe (PID: 1576)
      • schtasks.exe (PID: 5900)
      • schtasks.exe (PID: 4076)
      • schtasks.exe (PID: 5068)
      • schtasks.exe (PID: 2052)
      • schtasks.exe (PID: 4872)
      • schtasks.exe (PID: 5368)
      • schtasks.exe (PID: 5444)
      • schtasks.exe (PID: 3620)
      • schtasks.exe (PID: 4568)
      • schtasks.exe (PID: 2268)
      • schtasks.exe (PID: 3048)
      • schtasks.exe (PID: 4080)
    • Changes the Startup folder

      • reg.exe (PID: 3992)
    • AMADEY was detected

      • orxds.exe (PID: 1208)
    • AMADEY detected by memory dumps

      • orxds.exe (PID: 1208)
      • orxds.exe (PID: 3348)
    • Loads dropped or rewritten executable

      • rundll32.exe (PID: 2172)
      • real2001.bmp.exe (PID: 2268)
      • Cleaner.exe (PID: 2416)
      • rundll32.exe (PID: 3444)
      • fxdd.bmp.exe (PID: 1000)
      • conhost.exe (PID: 2952)
      • DllHost.exe (PID: 2268)
      • msiexec.exe (PID: 572)
      • iexplore.exe (PID: 1332)
      • setup331.exe (PID: 4092)
      • 13.php.exe (PID: 1832)
      • DllHost.exe (PID: 832)
      • Service.bmp.exe (PID: 3984)
      • build2.exe (PID: 2656)
      • conhost.exe (PID: 3912)
      • cmd.exe (PID: 4000)
      • reg.exe (PID: 3992)
      • iexplore.exe (PID: 964)
      • ntvdm.exe (PID: 3160)
      • test33.bmp.exe (PID: 1036)
      • WerFault.exe (PID: 3608)
      • DllHost.exe (PID: 148)
      • AppLaunch.exe (PID: 3564)
      • rrmix.exe.exe (PID: 2356)
      • svchost.exe (PID: 2468)
      • NiceProcessX32.bmp.exe (PID: 2912)
      • cmd.exe (PID: 3920)
      • File.exe (PID: 3152)
      • schtasks.exe (PID: 2352)
      • cmd.exe (PID: 2844)
      • File.exe (PID: 116)
      • schtasks.exe (PID: 4748)
      • forfiles.exe (PID: 1024)
      • search_hyperfs_310.exe.exe (PID: 2168)
      • Offscum.exe.exe (PID: 2200)
      • file1.exe.exe (PID: 1980)
      • sc.exe (PID: 3516)
      • conhost.exe (PID: 3780)
      • cmd.exe (PID: 3980)
      • WinRAR.exe (PID: 4032)
      • conhost.exe (PID: 3452)
      • conhost.exe (PID: 3180)
      • ll.exe (PID: 2516)
      • conhost.exe (PID: 4004)
      • tasklist.exe (PID: 3136)
      • conhost.exe (PID: 2348)
      • consent.exe (PID: 3044)
      • Congiunto.exe.pif (PID: 3756)
      • orxds.exe (PID: 3348)
      • DllHost.exe (PID: 2288)
      • unmatured.bmp.exe (PID: 2120)
      • Install.exe (PID: 1808)
      • Install.exe (PID: 2208)
      • cmd.exe (PID: 3916)
      • mxsfsaaa.exe (PID: 2428)
      • conhost.exe (PID: 2968)
      • find.exe (PID: 3472)
      • DllHost.exe (PID: 3668)
      • conhost.exe (PID: 2392)
      • FJEfRXZ.exe.exe (PID: 1048)
      • cmd.exe (PID: 3120)
      • prolivv.bmp.exe (PID: 2336)
      • cmd.exe (PID: 3584)
      • svchost.exe (PID: 2652)
      • findstr.exe (PID: 3068)
      • AppLaunch.exe (PID: 2584)
      • mixinte2001.bmp.exe (PID: 2448)
      • wmiprvse.exe (PID: 2852)
      • svchost.exe (PID: 2420)
      • AppLaunch.exe (PID: 3712)
      • Fenix_7.bmp.exe (PID: 3744)
      • cmd.exe (PID: 2768)
      • TrdngAnlzr22649.exe.exe (PID: 2660)
      • conhost.exe (PID: 2580)
      • conhost.exe (PID: 3780)
      • conhost.exe (PID: 2068)
      • conhost.exe (PID: 2340)
      • schtasks.exe (PID: 3220)
      • AppLaunch.exe (PID: 916)
      • cmd.exe (PID: 2116)
      • taskkill.exe (PID: 3088)
      • ftp.exe (PID: 3636)
      • DllHost.exe (PID: 3360)
      • control.exe (PID: 1340)
      • cmd.exe (PID: 1556)
      • build2.exe (PID: 2664)
      • conhost.exe (PID: 4056)
      • find.exe (PID: 2528)
      • 6523.exe.exe (PID: 2548)
      • schtasks.exe (PID: 2632)
      • random.exe.exe (PID: 1972)
      • ShortnessUnsol.bmp.exe (PID: 3108)
      • H2506.exe (PID: 3244)
      • arabcode_crypted_3.bmp.exe (PID: 1224)
      • ll.exe (PID: 1764)
      • WerFault.exe (PID: 1760)
      • IQwqPtAU3c7.exe (PID: 2464)
      • conhost.exe (PID: 2536)
      • conhost.exe (PID: 852)
      • reg.exe (PID: 3132)
      • SetupMEXX.exe.exe (PID: 2496)
      • cmd.exe (PID: 2144)
      • norm2.bmp.exe (PID: 2552)
      • DllHost.exe (PID: 1812)
      • DllHost.exe (PID: 2560)
      • orxds.exe (PID: 1208)
      • setup.exe (PID: 3132)
      • taskkill.exe (PID: 2964)
      • DllHost.exe (PID: 2480)
      • 1A2C2.exe (PID: 2124)
      • svchost.exe (PID: 3296)
      • findstr.exe (PID: 3364)
      • tasklist.exe (PID: 3156)
      • InvisBrowser45856.exe (PID: 2064)
      • icacls.exe (PID: 3256)
      • hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
      • tasklist.exe (PID: 2680)
      • 1K9D4.exe (PID: 1292)
      • FJEfRXZ.exe.exe (PID: 4044)
      • netsh.exe (PID: 584)
      • find.exe (PID: 2724)
      • mixinte2001.bmp.exe (PID: 4008)
      • find.exe (PID: 604)
      • Congiunto.exe.pif (PID: 3480)
      • NiceProcessX32.bmp.exe (PID: 2380)
      • conhost.exe (PID: 3372)
      • lokes_1.bmp.exe (PID: 3928)
      • olympteam_build_crypted_2.bmp.exe (PID: 2420)
      • conhost.exe (PID: 3516)
      • SearchFilterHost.exe (PID: 1148)
      • WerFault.exe (PID: 3912)
      • WerFault.exe (PID: 2108)
      • WerFault.exe (PID: 2248)
      • test33.bmp.exe (PID: 908)
      • schtasks.exe (PID: 3048)
      • DllHost.exe (PID: 2384)
      • utube2005.bmp.exe (PID: 3752)
      • test33.bmp.exe (PID: 3676)
      • download2.exe.exe (PID: 4084)
      • conhost.exe (PID: 3176)
      • strongix.exe (PID: 2548)
      • DllHost.exe (PID: 2480)
      • conhost.exe (PID: 3660)
      • conhost.exe (PID: 2956)
      • cmd.exe (PID: 4056)
      • cmd.exe (PID: 2364)
      • timeout.exe (PID: 3956)
      • random.exe.exe (PID: 3272)
      • rundll32.exe (PID: 2192)
      • sc.exe (PID: 3372)
      • tasklist.exe (PID: 3720)
      • PING.EXE (PID: 3484)
      • reg.exe (PID: 2696)
      • test33.bmp.exe (PID: 3972)
      • conhost.exe (PID: 2964)
      • setup.exe (PID: 3984)
      • conhost.exe (PID: 456)
      • conhost.exe (PID: 3988)
      • PING.EXE (PID: 3668)
      • sc.exe (PID: 3824)
      • conhost.exe (PID: 2760)
      • AppLaunch.exe (PID: 1600)
      • ftp.exe (PID: 2476)
      • 0pbZ7.exe (PID: 3020)
      • conhost.exe (PID: 4804)
      • gYaqqhiDI.exe (PID: 2736)
      • setup777.exe.exe (PID: 780)
      • forfiles.exe (PID: 2300)
      • conhost.exe (PID: 2424)
      • conhost.exe (PID: 3524)
      • msiexec.exe (PID: 5684)
      • svchost.exe (PID: 148)
      • wam.exe.exe (PID: 1104)
      • GF6GB.exe (PID: 3316)
      • conhost.exe (PID: 1544)
      • DllHost.exe (PID: 4104)
      • cmd.exe (PID: 752)
      • conhost.exe (PID: 1384)
      • Tabivuz.exe (PID: 1312)
      • taskkill.exe (PID: 1204)
      • schtasks.exe (PID: 1760)
      • Congiunto.exe.pif (PID: 4816)
      • powershell.EXE (PID: 5144)
      • conhost.exe (PID: 5424)
      • rundll32.exe (PID: 5772)
      • DllHost.exe (PID: 2044)
      • schtasks.exe (PID: 5336)
      • conhost.exe (PID: 5360)
      • conhost.exe (PID: 5912)
      • schtasks.exe (PID: 5672)
      • svmine.exe (PID: 3592)
      • taskeng.exe (PID: 5784)
      • IsrGSPs.exe (PID: 5912)
      • orxds.exe (PID: 5952)
      • schtasks.exe (PID: 2804)
      • conhost.exe (PID: 1412)
      • schtasks.exe (PID: 3328)
      • conhost.exe (PID: 1940)
      • Congiunto.exe.pif (PID: 1540)
      • conhost.exe (PID: 4360)
      • powershell.EXE (PID: 4156)
      • 9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
      • gpupdate.exe (PID: 5808)
      • conhost.exe (PID: 5876)
      • gpupdate.exe (PID: 5800)
      • conhost.exe (PID: 6048)
      • gpscript.exe (PID: 4068)
      • gpscript.exe (PID: 4196)
      • schtasks.exe (PID: 1576)
      • cmd.exe (PID: 4024)
      • svchost.exe (PID: 5280)
      • conhost.exe (PID: 4128)
      • conhost.exe (PID: 5000)
      • reg.exe (PID: 5124)
      • cmd.exe (PID: 5132)
      • cmd.exe (PID: 3812)
      • conhost.exe (PID: 2732)
      • reg.exe (PID: 2164)
      • reg.exe (PID: 5944)
      • conhost.exe (PID: 5440)
      • reg.exe (PID: 920)
      • conhost.exe (PID: 5768)
      • conhost.exe (PID: 5240)
      • reg.exe (PID: 6032)
      • wscript.exe (PID: 5416)
      • reg.exe (PID: 5996)
      • conhost.exe (PID: 4228)
      • conhost.exe (PID: 3504)
      • conhost.exe (PID: 1340)
      • reg.exe (PID: 4404)
      • reg.exe (PID: 3432)
      • conhost.exe (PID: 3004)
      • conhost.exe (PID: 2544)
      • reg.exe (PID: 3048)
      • reg.exe (PID: 2196)
      • reg.exe (PID: 1828)
      • conhost.exe (PID: 4220)
      • reg.exe (PID: 1204)
      • conhost.exe (PID: 2036)
      • reg.exe (PID: 4300)
      • conhost.exe (PID: 3192)
      • conhost.exe (PID: 4744)
      • reg.exe (PID: 2444)
      • conhost.exe (PID: 4924)
      • conhost.exe (PID: 2588)
      • conhost.exe (PID: 940)
      • reg.exe (PID: 4216)
      • reg.exe (PID: 4888)
      • reg.exe (PID: 5216)
      • conhost.exe (PID: 3712)
      • reg.exe (PID: 5460)
      • conhost.exe (PID: 2788)
      • schtasks.exe (PID: 3096)
      • conhost.exe (PID: 4312)
      • schtasks.exe (PID: 5900)
      • conhost.exe (PID: 5828)
      • eCYGTdT.exe (PID: 4528)
      • cmd.exe (PID: 4084)
      • schtasks.exe (PID: 4076)
      • conhost.exe (PID: 2268)
      • conhost.exe (PID: 3352)
      • reg.exe (PID: 1948)
      • cmd.exe (PID: 4148)
      • conhost.exe (PID: 2664)
      • reg.exe (PID: 2336)
      • schtasks.exe (PID: 4336)
      • conhost.exe (PID: 4348)
      • conhost.exe (PID: 5084)
      • conhost.exe (PID: 1856)
      • schtasks.exe (PID: 5068)
      • schtasks.exe (PID: 2052)
      • conhost.exe (PID: 5188)
      • schtasks.exe (PID: 4872)
      • schtasks.exe (PID: 5368)
      • conhost.exe (PID: 2428)
      • conhost.exe (PID: 5308)
      • schtasks.exe (PID: 5444)
      • schtasks.exe (PID: 3620)
      • conhost.exe (PID: 5636)
      • DllHost.exe (PID: 5856)
      • conhost.exe (PID: 3312)
      • schtasks.exe (PID: 4568)
      • schtasks.exe (PID: 4812)
      • conhost.exe (PID: 4116)
      • schtasks.exe (PID: 2268)
      • conhost.exe (PID: 1412)
      • cmd.exe (PID: 4236)
      • conhost.exe (PID: 4876)
      • conhost.exe (PID: 5336)
      • reg.exe (PID: 4448)
      • cmd.exe (PID: 4484)
      • schtasks.exe (PID: 3048)
      • reg.exe (PID: 5876)
      • rundll32.EXE (PID: 2880)
      • conhost.exe (PID: 4784)
      • conhost.exe (PID: 5240)
      • schtasks.exe (PID: 4080)
      • orxds.exe (PID: 4612)
      • Cleaner.exe (PID: 4732)
      • DllHost.exe (PID: 1576)
      • WerFault.exe (PID: 2020)
      • svchost.exe (PID: 1204)
      • opera.exe (PID: 5440)
    • Runs injected code in another process

      • rundll32.exe (PID: 2172)
      • rundll32.exe (PID: 3444)
    • Application was injected by another process

      • svchost.exe (PID: 872)
    • Stealing of credential data

      • real2001.bmp.exe (PID: 2268)
      • InvisBrowser45856.exe (PID: 2064)
      • svchost.exe (PID: 2468)
      • build2.exe (PID: 2656)
    • STOP was detected

      • test33.bmp.exe (PID: 1036)
    • MINER was detected

      • svchost.exe (PID: 3296)
    • TOFSEE was detected

      • svchost.exe (PID: 2652)
    • Modifies exclusions in Windows Defender

      • svchost.exe (PID: 2652)
      • reg.exe (PID: 5124)
      • reg.exe (PID: 920)
      • reg.exe (PID: 2164)
      • reg.exe (PID: 5944)
      • reg.exe (PID: 4404)
      • reg.exe (PID: 3432)
      • reg.exe (PID: 5996)
      • reg.exe (PID: 3048)
      • reg.exe (PID: 2196)
    • Loads the Task Scheduler DLL interface

      • schtasks.exe (PID: 5672)
      • schtasks.exe (PID: 3096)
      • schtasks.exe (PID: 4336)
      • schtasks.exe (PID: 4812)
    • Modifies files in Chrome extension folder

      • eCYGTdT.exe (PID: 4528)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 964)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4032)
      • NiceProcessX32.bmp.exe (PID: 2912)
      • File.exe (PID: 3152)
      • 13.php.exe (PID: 1832)
      • cmd.exe (PID: 3916)
      • Service.bmp.exe (PID: 3984)
      • fxdd.bmp.exe (PID: 1000)
      • test33.bmp.exe (PID: 908)
      • hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
      • mixinte2001.bmp.exe (PID: 4008)
      • random.exe.exe (PID: 3272)
      • real2001.bmp.exe (PID: 2268)
      • IQwqPtAU3c7.exe (PID: 2464)
      • gYaqqhiDI.exe (PID: 2736)
      • download2.exe.exe (PID: 4084)
      • utube2005.bmp.exe (PID: 3752)
      • test33.bmp.exe (PID: 1036)
      • setup.exe (PID: 3132)
      • TrdngAnlzr22649.exe.exe (PID: 2660)
      • Install.exe (PID: 2208)
      • setup.tmp (PID: 1256)
      • setup.exe (PID: 3984)
      • setup.tmp (PID: 3064)
      • Congiunto.exe.pif (PID: 3480)
      • orxds.exe (PID: 1208)
      • GF6GB.exe (PID: 3316)
      • build2.exe (PID: 2656)
      • Install.exe (PID: 1808)
      • Congiunto.exe.pif (PID: 3756)
      • AppLaunch.exe (PID: 1600)
      • lokes_1.bmp.exe (PID: 3928)
      • IsrGSPs.exe (PID: 5912)
      • eCYGTdT.exe (PID: 4528)
    • Reads the computer name

      • WinRAR.exe (PID: 4032)
      • File.exe (PID: 3152)
      • Service.bmp.exe (PID: 3984)
      • Offscum.exe.exe (PID: 2200)
      • rrmix.exe.exe (PID: 2356)
      • wam.exe.exe (PID: 1104)
      • 13.php.exe (PID: 1832)
      • wmiprvse.exe (PID: 2852)
      • mxsfsaaa.exe (PID: 2428)
      • AppLaunch.exe (PID: 916)
      • AppLaunch.exe (PID: 3712)
      • Congiunto.exe.pif (PID: 3480)
      • norm2.bmp.exe (PID: 2552)
      • SetupMEXX.exe.exe (PID: 2496)
      • test33.bmp.exe (PID: 908)
      • hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
      • Fenix_7.bmp.exe (PID: 3744)
      • AppLaunch.exe (PID: 2584)
      • AppLaunch.exe (PID: 3564)
      • fxdd.bmp.exe (PID: 1000)
      • orxds.exe (PID: 1208)
      • AppLaunch.exe (PID: 1600)
      • mixinte2001.bmp.exe (PID: 4008)
      • setup777.exe.exe (PID: 780)
      • random.exe.exe (PID: 1972)
      • real2001.bmp.exe (PID: 2268)
      • random.exe.exe (PID: 3272)
      • lokes_1.bmp.exe (PID: 3928)
      • 0pbZ7.exe (PID: 3020)
      • test33.bmp.exe (PID: 1036)
      • search_hyperfs_310.exe.exe (PID: 2168)
      • ShortnessUnsol.bmp.exe (PID: 3108)
      • TrdngAnlzr22649.exe.exe (PID: 2660)
      • IQwqPtAU3c7.exe (PID: 2464)
      • Congiunto.exe.pif (PID: 3756)
      • gYaqqhiDI.exe (PID: 2736)
      • download2.exe.exe (PID: 4084)
      • InvisBrowser45856.exe (PID: 2064)
      • setup331.exe (PID: 4092)
      • ll.exe (PID: 1764)
      • ll.exe (PID: 2516)
      • setup.tmp (PID: 1256)
      • Cleaner.exe (PID: 2416)
      • Install.exe (PID: 1808)
      • build2.exe (PID: 2656)
      • mixinte2001.bmp.exe (PID: 2448)
      • setup.tmp (PID: 3064)
      • 1K9D4.exe (PID: 1292)
      • strongix.exe (PID: 2548)
      • orxds.exe (PID: 3348)
      • GF6GB.exe (PID: 3316)
      • H2506.exe (PID: 3244)
      • powershell.EXE (PID: 5144)
      • 1A2C2.exe (PID: 2124)
      • powershell.EXE (PID: 4156)
      • orxds.exe (PID: 5952)
      • 9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
      • wscript.exe (PID: 5416)
      • eCYGTdT.exe (PID: 4528)
      • Cleaner.exe (PID: 4732)
      • orxds.exe (PID: 4612)
    • Checks supported languages

      • WinRAR.exe (PID: 4032)
      • File.exe (PID: 3152)
      • NiceProcessX32.bmp.exe (PID: 2912)
      • Service.bmp.exe (PID: 3984)
      • 13.php.exe (PID: 1832)
      • Offscum.exe.exe (PID: 2200)
      • rrmix.exe.exe (PID: 2356)
      • SetupMEXX.exe.exe (PID: 2496)
      • conhost.exe (PID: 2760)
      • file1.exe.exe (PID: 1980)
      • wam.exe.exe (PID: 1104)
      • cmd.exe (PID: 2364)
      • conhost.exe (PID: 2392)
      • cmd.exe (PID: 3916)
      • wmiprvse.exe (PID: 2852)
      • conhost.exe (PID: 4056)
      • conhost.exe (PID: 3524)
      • conhost.exe (PID: 3780)
      • conhost.exe (PID: 4004)
      • mxsfsaaa.exe (PID: 2428)
      • conhost.exe (PID: 3660)
      • 6523.exe.exe (PID: 2548)
      • FJEfRXZ.exe.exe (PID: 1048)
      • conhost.exe (PID: 3176)
      • conhost.exe (PID: 3988)
      • prolivv.bmp.exe (PID: 2336)
      • cmd.exe (PID: 4056)
      • conhost.exe (PID: 2068)
      • cmd.exe (PID: 2144)
      • AppLaunch.exe (PID: 916)
      • AppLaunch.exe (PID: 3712)
      • Congiunto.exe.pif (PID: 3480)
      • mixinte2001.bmp.exe (PID: 4008)
      • test33.bmp.exe (PID: 3676)
      • conhost.exe (PID: 2536)
      • norm2.bmp.exe (PID: 2552)
      • real2001.bmp.exe (PID: 2268)
      • fxdd.bmp.exe (PID: 1000)
      • olympteam_build_crypted_2.bmp.exe (PID: 2420)
      • lokes_1.bmp.exe (PID: 3928)
      • test33.bmp.exe (PID: 908)
      • hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
      • conhost.exe (PID: 852)
      • arabcode_crypted_3.bmp.exe (PID: 1224)
      • conhost.exe (PID: 3780)
      • unmatured.bmp.exe (PID: 2120)
      • conhost.exe (PID: 456)
      • ShortnessUnsol.bmp.exe (PID: 3108)
      • conhost.exe (PID: 3452)
      • Fenix_7.bmp.exe (PID: 3744)
      • AppLaunch.exe (PID: 2584)
      • AppLaunch.exe (PID: 3564)
      • conhost.exe (PID: 3180)
      • TrdngAnlzr22649.exe.exe (PID: 2660)
      • orxds.exe (PID: 1208)
      • conhost.exe (PID: 2968)
      • conhost.exe (PID: 2348)
      • AppLaunch.exe (PID: 1600)
      • cmd.exe (PID: 4000)
      • NiceProcessX32.bmp.exe (PID: 2380)
      • random.exe.exe (PID: 1972)
      • setup777.exe.exe (PID: 780)
      • random.exe.exe (PID: 3272)
      • test33.bmp.exe (PID: 3972)
      • 0pbZ7.exe (PID: 3020)
      • FJEfRXZ.exe.exe (PID: 4044)
      • mixinte2001.bmp.exe (PID: 2448)
      • conhost.exe (PID: 3372)
      • conhost.exe (PID: 2952)
      • cmd.exe (PID: 2844)
      • cmd.exe (PID: 2116)
      • test33.bmp.exe (PID: 1036)
      • IQwqPtAU3c7.exe (PID: 2464)
      • search_hyperfs_310.exe.exe (PID: 2168)
      • gYaqqhiDI.exe (PID: 2736)
      • Congiunto.exe.pif (PID: 3756)
      • utube2005.bmp.exe (PID: 3752)
      • strongix.exe (PID: 2548)
      • conhost.exe (PID: 2956)
      • cmd.exe (PID: 3584)
      • download2.exe.exe (PID: 4084)
      • setup331.exe (PID: 4092)
      • InvisBrowser45856.exe (PID: 2064)
      • ll.exe (PID: 1764)
      • Install.exe (PID: 2208)
      • ll.exe (PID: 2516)
      • build2.exe (PID: 2664)
      • setup.tmp (PID: 1256)
      • setup.exe (PID: 3132)
      • H2506.exe (PID: 3244)
      • conhost.exe (PID: 2964)
      • cmd.exe (PID: 2768)
      • Install.exe (PID: 1808)
      • Cleaner.exe (PID: 2416)
      • conhost.exe (PID: 2340)
      • conhost.exe (PID: 2580)
      • cmd.exe (PID: 3980)
      • cmd.exe (PID: 3920)
      • build2.exe (PID: 2656)
      • orxds.exe (PID: 3348)
      • setup.exe (PID: 3984)
      • setup.tmp (PID: 3064)
      • GF6GB.exe (PID: 3316)
      • 1A2C2.exe (PID: 2124)
      • 1K9D4.exe (PID: 1292)
      • conhost.exe (PID: 2424)
      • conhost.exe (PID: 3516)
      • conhost.exe (PID: 3912)
      • conhost.exe (PID: 4804)
      • conhost.exe (PID: 1544)
      • conhost.exe (PID: 1384)
      • cmd.exe (PID: 752)
      • Congiunto.exe.pif (PID: 4816)
      • conhost.exe (PID: 5424)
      • powershell.EXE (PID: 5144)
      • conhost.exe (PID: 5360)
      • conhost.exe (PID: 5912)
      • Tabivuz.exe (PID: 1312)
      • svmine.exe (PID: 3592)
      • IsrGSPs.exe (PID: 5912)
      • orxds.exe (PID: 5952)
      • conhost.exe (PID: 1412)
      • Congiunto.exe.pif (PID: 1540)
      • conhost.exe (PID: 1940)
      • conhost.exe (PID: 4360)
      • powershell.EXE (PID: 4156)
      • conhost.exe (PID: 5876)
      • 9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
      • conhost.exe (PID: 6048)
      • conhost.exe (PID: 4128)
      • conhost.exe (PID: 5000)
      • cmd.exe (PID: 4024)
      • cmd.exe (PID: 5132)
      • conhost.exe (PID: 2732)
      • cmd.exe (PID: 3812)
      • conhost.exe (PID: 5440)
      • conhost.exe (PID: 5768)
      • wscript.exe (PID: 5416)
      • conhost.exe (PID: 5240)
      • conhost.exe (PID: 3004)
      • conhost.exe (PID: 4228)
      • conhost.exe (PID: 3504)
      • conhost.exe (PID: 1340)
      • conhost.exe (PID: 2544)
      • conhost.exe (PID: 3192)
      • conhost.exe (PID: 4220)
      • conhost.exe (PID: 2036)
      • conhost.exe (PID: 4744)
      • conhost.exe (PID: 2588)
      • conhost.exe (PID: 4924)
      • conhost.exe (PID: 940)
      • conhost.exe (PID: 3712)
      • conhost.exe (PID: 4312)
      • conhost.exe (PID: 2788)
      • conhost.exe (PID: 5828)
      • eCYGTdT.exe (PID: 4528)
      • conhost.exe (PID: 3352)
      • conhost.exe (PID: 2268)
      • cmd.exe (PID: 4084)
      • conhost.exe (PID: 2664)
      • cmd.exe (PID: 4148)
      • conhost.exe (PID: 4348)
      • conhost.exe (PID: 5084)
      • conhost.exe (PID: 5188)
      • conhost.exe (PID: 1856)
      • conhost.exe (PID: 2428)
      • conhost.exe (PID: 5636)
      • conhost.exe (PID: 5308)
      • conhost.exe (PID: 3312)
      • conhost.exe (PID: 1412)
      • conhost.exe (PID: 4116)
      • conhost.exe (PID: 4876)
      • cmd.exe (PID: 4236)
      • cmd.exe (PID: 4484)
      • conhost.exe (PID: 5336)
      • conhost.exe (PID: 4784)
      • conhost.exe (PID: 5240)
      • orxds.exe (PID: 4612)
      • Cleaner.exe (PID: 4732)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 4032)
      • NiceProcessX32.bmp.exe (PID: 2912)
      • File.exe (PID: 3152)
      • 13.php.exe (PID: 1832)
      • cmd.exe (PID: 3916)
      • Service.bmp.exe (PID: 3984)
      • fxdd.bmp.exe (PID: 1000)
      • hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
      • test33.bmp.exe (PID: 908)
      • mixinte2001.bmp.exe (PID: 4008)
      • random.exe.exe (PID: 3272)
      • real2001.bmp.exe (PID: 2268)
      • test33.bmp.exe (PID: 1036)
      • IQwqPtAU3c7.exe (PID: 2464)
      • gYaqqhiDI.exe (PID: 2736)
      • download2.exe.exe (PID: 4084)
      • utube2005.bmp.exe (PID: 3752)
      • setup.exe (PID: 3132)
      • TrdngAnlzr22649.exe.exe (PID: 2660)
      • Install.exe (PID: 2208)
      • setup.tmp (PID: 1256)
      • setup.exe (PID: 3984)
      • setup.tmp (PID: 3064)
      • Congiunto.exe.pif (PID: 3480)
      • orxds.exe (PID: 1208)
      • GF6GB.exe (PID: 3316)
      • build2.exe (PID: 2656)
      • Install.exe (PID: 1808)
      • Congiunto.exe.pif (PID: 3756)
      • AppLaunch.exe (PID: 1600)
      • lokes_1.bmp.exe (PID: 3928)
      • IsrGSPs.exe (PID: 5912)
      • eCYGTdT.exe (PID: 4528)
    • Checks for external IP

      • File.exe (PID: 3152)
      • Service.bmp.exe (PID: 3984)
      • hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
      • svchost.exe (PID: 2468)
    • Adds / modifies Windows certificates

      • File.exe (PID: 3152)
      • Service.bmp.exe (PID: 3984)
      • test33.bmp.exe (PID: 908)
      • wam.exe.exe (PID: 1104)
    • Starts CMD.EXE for commands execution

      • 13.php.exe (PID: 1832)
      • FJEfRXZ.exe.exe (PID: 1048)
      • cmd.exe (PID: 2144)
      • orxds.exe (PID: 1208)
      • FJEfRXZ.exe.exe (PID: 4044)
      • cmd.exe (PID: 2844)
      • gYaqqhiDI.exe (PID: 2736)
      • mixinte2001.bmp.exe (PID: 4008)
      • real2001.bmp.exe (PID: 2268)
      • forfiles.exe (PID: 2300)
      • forfiles.exe (PID: 1024)
      • mixinte2001.bmp.exe (PID: 2448)
      • IsrGSPs.exe (PID: 5912)
      • eCYGTdT.exe (PID: 4528)
    • Reads Environment values

      • Offscum.exe.exe (PID: 2200)
      • netsh.exe (PID: 584)
      • rrmix.exe.exe (PID: 2356)
      • AppLaunch.exe (PID: 916)
      • AppLaunch.exe (PID: 3712)
      • wam.exe.exe (PID: 1104)
      • AppLaunch.exe (PID: 1600)
      • SetupMEXX.exe.exe (PID: 2496)
      • Fenix_7.bmp.exe (PID: 3744)
      • AppLaunch.exe (PID: 3564)
      • IQwqPtAU3c7.exe (PID: 2464)
      • ShortnessUnsol.bmp.exe (PID: 3108)
      • gYaqqhiDI.exe (PID: 2736)
      • lokes_1.bmp.exe (PID: 3928)
      • real2001.bmp.exe (PID: 2268)
      • Cleaner.exe (PID: 2416)
      • GF6GB.exe (PID: 3316)
      • build2.exe (PID: 2656)
      • H2506.exe (PID: 3244)
      • strongix.exe (PID: 2548)
      • 1A2C2.exe (PID: 2124)
      • InvisBrowser45856.exe (PID: 2064)
      • 9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
      • Cleaner.exe (PID: 4732)
    • Starts SC.EXE for service management

      • 13.php.exe (PID: 1832)
    • Reads the cookies of Google Chrome

      • Offscum.exe.exe (PID: 2200)
      • rrmix.exe.exe (PID: 2356)
      • AppLaunch.exe (PID: 3712)
      • Fenix_7.bmp.exe (PID: 3744)
      • ShortnessUnsol.bmp.exe (PID: 3108)
      • gYaqqhiDI.exe (PID: 2736)
      • AppLaunch.exe (PID: 1600)
      • lokes_1.bmp.exe (PID: 3928)
    • Reads the cookies of Mozilla Firefox

      • Offscum.exe.exe (PID: 2200)
      • rrmix.exe.exe (PID: 2356)
      • AppLaunch.exe (PID: 3712)
      • Fenix_7.bmp.exe (PID: 3744)
      • ShortnessUnsol.bmp.exe (PID: 3108)
      • AppLaunch.exe (PID: 1600)
      • lokes_1.bmp.exe (PID: 3928)
      • AppLaunch.exe (PID: 916)
      • SetupMEXX.exe.exe (PID: 2496)
      • strongix.exe (PID: 2548)
      • AppLaunch.exe (PID: 3564)
      • 1A2C2.exe (PID: 2124)
      • H2506.exe (PID: 3244)
      • 9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
    • Reads CPU info

      • wmiprvse.exe (PID: 2852)
      • IQwqPtAU3c7.exe (PID: 2464)
      • gYaqqhiDI.exe (PID: 2736)
      • real2001.bmp.exe (PID: 2268)
      • build2.exe (PID: 2656)
      • InvisBrowser45856.exe (PID: 2064)
    • Searches for installed software

      • Offscum.exe.exe (PID: 2200)
      • rrmix.exe.exe (PID: 2356)
      • Fenix_7.bmp.exe (PID: 3744)
      • gYaqqhiDI.exe (PID: 2736)
      • real2001.bmp.exe (PID: 2268)
      • AppLaunch.exe (PID: 3564)
      • svchost.exe (PID: 2468)
      • build2.exe (PID: 2656)
      • AppLaunch.exe (PID: 1600)
      • AppLaunch.exe (PID: 3712)
      • lokes_1.bmp.exe (PID: 3928)
      • ShortnessUnsol.bmp.exe (PID: 3108)
      • strongix.exe (PID: 2548)
      • H2506.exe (PID: 3244)
      • SetupMEXX.exe.exe (PID: 2496)
      • InvisBrowser45856.exe (PID: 2064)
      • AppLaunch.exe (PID: 916)
      • 9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
      • 1A2C2.exe (PID: 2124)
    • Uses NETSH.EXE for network configuration

      • 13.php.exe (PID: 1832)
    • Executed as Windows Service

      • mxsfsaaa.exe (PID: 2428)
    • Creates or modifies windows services

      • svchost.exe (PID: 2652)
    • Application launched itself

      • cmd.exe (PID: 2144)
      • test33.bmp.exe (PID: 3676)
      • test33.bmp.exe (PID: 908)
      • random.exe.exe (PID: 1972)
      • cmd.exe (PID: 2844)
      • test33.bmp.exe (PID: 3972)
      • ll.exe (PID: 1764)
      • build2.exe (PID: 2664)
      • svchost.exe (PID: 2652)
      • Congiunto.exe.pif (PID: 3480)
      • Congiunto.exe.pif (PID: 3756)
    • Reads the date of Windows installation

      • wmiprvse.exe (PID: 2852)
      • powershell.EXE (PID: 5144)
      • powershell.EXE (PID: 4156)
    • Uses TASKLIST.EXE to query information about running processes

      • cmd.exe (PID: 4056)
      • cmd.exe (PID: 2116)
    • Reads mouse settings

      • Congiunto.exe.pif (PID: 3480)
      • Congiunto.exe.pif (PID: 3756)
      • Tabivuz.exe (PID: 1312)
    • Starts application with an unusual extension

      • cmd.exe (PID: 4056)
      • cmd.exe (PID: 2116)
      • Congiunto.exe.pif (PID: 3480)
      • Congiunto.exe.pif (PID: 3756)
    • Creates files in the program directory

      • Service.bmp.exe (PID: 3984)
      • WerFault.exe (PID: 3912)
      • WerFault.exe (PID: 3608)
      • WerFault.exe (PID: 2248)
      • real2001.bmp.exe (PID: 2268)
      • WerFault.exe (PID: 1760)
      • WerFault.exe (PID: 2108)
      • build2.exe (PID: 2656)
      • svchost.exe (PID: 872)
      • eCYGTdT.exe (PID: 4528)
    • Creates a directory in Program Files

      • Service.bmp.exe (PID: 3984)
      • eCYGTdT.exe (PID: 4528)
    • Reads the Windows organization settings

      • wmiprvse.exe (PID: 2852)
      • setup.tmp (PID: 1256)
      • setup.tmp (PID: 3064)
    • Reads Windows Product ID

      • wmiprvse.exe (PID: 2852)
    • Reads Windows owner or organization settings

      • wmiprvse.exe (PID: 2852)
      • setup.tmp (PID: 1256)
      • setup.tmp (PID: 3064)
    • Starts itself from another location

      • fxdd.bmp.exe (PID: 1000)
      • utube2005.bmp.exe (PID: 3752)
    • Creates files in the Windows directory

      • svchost.exe (PID: 872)
      • svchost.exe (PID: 2652)
      • svchost.exe (PID: 2468)
      • schtasks.exe (PID: 5672)
      • cmd.exe (PID: 3812)
      • schtasks.exe (PID: 3096)
      • IsrGSPs.exe (PID: 5912)
      • schtasks.exe (PID: 4336)
      • eCYGTdT.exe (PID: 4528)
      • schtasks.exe (PID: 4812)
    • Uses REG.EXE to modify Windows registry

      • cmd.exe (PID: 4000)
      • cmd.exe (PID: 1556)
      • cmd.exe (PID: 3120)
      • cmd.exe (PID: 4024)
      • cmd.exe (PID: 5132)
      • wscript.exe (PID: 5416)
      • cmd.exe (PID: 4084)
      • cmd.exe (PID: 4148)
      • cmd.exe (PID: 4236)
      • cmd.exe (PID: 4484)
    • Uses ICACLS.EXE to modify access control list

      • test33.bmp.exe (PID: 908)
    • Creates files in the user directory

      • mixinte2001.bmp.exe (PID: 4008)
      • real2001.bmp.exe (PID: 2268)
      • IQwqPtAU3c7.exe (PID: 2464)
      • gYaqqhiDI.exe (PID: 2736)
      • orxds.exe (PID: 1208)
      • svchost.exe (PID: 2468)
      • GF6GB.exe (PID: 3316)
      • powershell.EXE (PID: 5144)
      • powershell.EXE (PID: 4156)
      • eCYGTdT.exe (PID: 4528)
    • Removes files from Windows directory

      • svchost.exe (PID: 872)
      • IsrGSPs.exe (PID: 5912)
    • Executed via WMI

      • rundll32.exe (PID: 2172)
      • rundll32.exe (PID: 3444)
    • Uses RUNDLL32.EXE to load library

      • wmiprvse.exe (PID: 2852)
      • control.exe (PID: 1340)
      • orxds.exe (PID: 1208)
      • taskeng.exe (PID: 5784)
    • Executes application which crashes

      • TrdngAnlzr22649.exe.exe (PID: 2660)
    • Loads DLL from Mozilla Firefox

      • InvisBrowser45856.exe (PID: 2064)
    • Starts CMD.EXE for self-deleting

      • real2001.bmp.exe (PID: 2268)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 3920)
      • cmd.exe (PID: 3980)
      • cmd.exe (PID: 752)
    • Executed via Task Scheduler

      • Tabivuz.exe (PID: 1312)
      • orxds.exe (PID: 3348)
      • powershell.EXE (PID: 5144)
      • orxds.exe (PID: 5952)
      • IsrGSPs.exe (PID: 5912)
      • powershell.EXE (PID: 4156)
      • orxds.exe (PID: 4612)
    • Reads default file associations for system extensions

      • setup331.exe (PID: 4092)
    • Executes PowerShell scripts

      • powershell.EXE (PID: 5144)
      • powershell.EXE (PID: 4156)
    • Executes scripts

      • IsrGSPs.exe (PID: 5912)
    • Creates a software uninstall entry

      • eCYGTdT.exe (PID: 4528)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 1332)
      • iexplore.exe (PID: 964)
      • DllHost.exe (PID: 148)
      • consent.exe (PID: 3044)
      • DllHost.exe (PID: 2268)
      • DllHost.exe (PID: 832)
      • DllHost.exe (PID: 2288)
      • sc.exe (PID: 3516)
      • sc.exe (PID: 3824)
      • sc.exe (PID: 3372)
      • netsh.exe (PID: 584)
      • ftp.exe (PID: 3636)
      • svchost.exe (PID: 2652)
      • find.exe (PID: 2724)
      • find.exe (PID: 2528)
      • tasklist.exe (PID: 3156)
      • findstr.exe (PID: 3364)
      • tasklist.exe (PID: 2680)
      • svchost.exe (PID: 148)
      • PING.EXE (PID: 3484)
      • WerFault.exe (PID: 2248)
      • DllHost.exe (PID: 2480)
      • WerFault.exe (PID: 3608)
      • schtasks.exe (PID: 2632)
      • schtasks.exe (PID: 2352)
      • DllHost.exe (PID: 3360)
      • svchost.exe (PID: 872)
      • schtasks.exe (PID: 3220)
      • reg.exe (PID: 3992)
      • icacls.exe (PID: 3256)
      • DllHost.exe (PID: 2560)
      • WerFault.exe (PID: 3912)
      • DllHost.exe (PID: 2480)
      • ftp.exe (PID: 2476)
      • tasklist.exe (PID: 3720)
      • find.exe (PID: 3472)
      • find.exe (PID: 604)
      • rundll32.exe (PID: 2172)
      • tasklist.exe (PID: 3136)
      • svchost.exe (PID: 2468)
      • findstr.exe (PID: 3068)
      • PING.EXE (PID: 3668)
      • DllHost.exe (PID: 2384)
      • schtasks.exe (PID: 3048)
      • msiexec.exe (PID: 572)
      • ntvdm.exe (PID: 3160)
      • WerFault.exe (PID: 1760)
      • taskkill.exe (PID: 2964)
      • taskkill.exe (PID: 3088)
      • DllHost.exe (PID: 3668)
      • SearchFilterHost.exe (PID: 1148)
      • DllHost.exe (PID: 1812)
      • WerFault.exe (PID: 2108)
      • control.exe (PID: 1340)
      • rundll32.exe (PID: 2192)
      • timeout.exe (PID: 3956)
      • svchost.exe (PID: 3296)
      • svchost.exe (PID: 2420)
      • forfiles.exe (PID: 2300)
      • cmd.exe (PID: 1556)
      • forfiles.exe (PID: 1024)
      • cmd.exe (PID: 3120)
      • reg.exe (PID: 2696)
      • reg.exe (PID: 3132)
      • rundll32.exe (PID: 3444)
      • schtasks.exe (PID: 4748)
      • msiexec.exe (PID: 5684)
      • DllHost.exe (PID: 4104)
      • taskkill.exe (PID: 1204)
      • schtasks.exe (PID: 1760)
      • rundll32.exe (PID: 5772)
      • DllHost.exe (PID: 2044)
      • schtasks.exe (PID: 5336)
      • schtasks.exe (PID: 5672)
      • taskeng.exe (PID: 5784)
      • schtasks.exe (PID: 2804)
      • schtasks.exe (PID: 3328)
      • gpscript.exe (PID: 4068)
      • gpscript.exe (PID: 4196)
      • gpupdate.exe (PID: 5800)
      • gpupdate.exe (PID: 5808)
      • svchost.exe (PID: 5280)
      • schtasks.exe (PID: 1576)
      • reg.exe (PID: 5124)
      • reg.exe (PID: 920)
      • reg.exe (PID: 6032)
      • reg.exe (PID: 5944)
      • reg.exe (PID: 2164)
      • reg.exe (PID: 4404)
      • reg.exe (PID: 5996)
      • reg.exe (PID: 3432)
      • reg.exe (PID: 3048)
      • reg.exe (PID: 1204)
      • reg.exe (PID: 2196)
      • reg.exe (PID: 1828)
      • reg.exe (PID: 4300)
      • reg.exe (PID: 4888)
      • reg.exe (PID: 2444)
      • reg.exe (PID: 5216)
      • reg.exe (PID: 4216)
      • schtasks.exe (PID: 3096)
      • reg.exe (PID: 5460)
      • schtasks.exe (PID: 5900)
      • schtasks.exe (PID: 4076)
      • reg.exe (PID: 1948)
      • reg.exe (PID: 2336)
      • schtasks.exe (PID: 4336)
      • schtasks.exe (PID: 5068)
      • schtasks.exe (PID: 2052)
      • schtasks.exe (PID: 4872)
      • schtasks.exe (PID: 5368)
      • schtasks.exe (PID: 5444)
      • schtasks.exe (PID: 3620)
      • DllHost.exe (PID: 5856)
      • schtasks.exe (PID: 4568)
      • schtasks.exe (PID: 4812)
      • schtasks.exe (PID: 2268)
      • reg.exe (PID: 4448)
      • reg.exe (PID: 5876)
      • schtasks.exe (PID: 3048)
      • rundll32.EXE (PID: 2880)
      • schtasks.exe (PID: 4080)
      • DllHost.exe (PID: 1576)
      • svchost.exe (PID: 1204)
      • WerFault.exe (PID: 2020)
      • opera.exe (PID: 5440)
    • Reads the computer name

      • iexplore.exe (PID: 964)
      • iexplore.exe (PID: 1332)
      • DllHost.exe (PID: 148)
      • DllHost.exe (PID: 2268)
      • consent.exe (PID: 3044)
      • DllHost.exe (PID: 832)
      • DllHost.exe (PID: 2288)
      • sc.exe (PID: 3516)
      • sc.exe (PID: 3824)
      • netsh.exe (PID: 584)
      • sc.exe (PID: 3372)
      • svchost.exe (PID: 2652)
      • ftp.exe (PID: 3636)
      • tasklist.exe (PID: 2680)
      • tasklist.exe (PID: 3156)
      • svchost.exe (PID: 148)
      • PING.EXE (PID: 3484)
      • WerFault.exe (PID: 2248)
      • DllHost.exe (PID: 2480)
      • WerFault.exe (PID: 3608)
      • schtasks.exe (PID: 2632)
      • schtasks.exe (PID: 2352)
      • DllHost.exe (PID: 3360)
      • schtasks.exe (PID: 3220)
      • DllHost.exe (PID: 2560)
      • WerFault.exe (PID: 3912)
      • icacls.exe (PID: 3256)
      • DllHost.exe (PID: 2480)
      • ftp.exe (PID: 2476)
      • tasklist.exe (PID: 3720)
      • tasklist.exe (PID: 3136)
      • svchost.exe (PID: 2468)
      • rundll32.exe (PID: 2172)
      • PING.EXE (PID: 3668)
      • DllHost.exe (PID: 2384)
      • schtasks.exe (PID: 3048)
      • WerFault.exe (PID: 1760)
      • taskkill.exe (PID: 2964)
      • taskkill.exe (PID: 3088)
      • DllHost.exe (PID: 3668)
      • SearchFilterHost.exe (PID: 1148)
      • WerFault.exe (PID: 2108)
      • DllHost.exe (PID: 1812)
      • control.exe (PID: 1340)
      • svchost.exe (PID: 2420)
      • svchost.exe (PID: 3296)
      • rundll32.exe (PID: 3444)
      • schtasks.exe (PID: 4748)
      • DllHost.exe (PID: 4104)
      • taskkill.exe (PID: 1204)
      • schtasks.exe (PID: 1760)
      • rundll32.exe (PID: 5772)
      • DllHost.exe (PID: 2044)
      • schtasks.exe (PID: 5672)
      • schtasks.exe (PID: 5336)
      • taskeng.exe (PID: 5784)
      • schtasks.exe (PID: 2804)
      • schtasks.exe (PID: 3328)
      • gpupdate.exe (PID: 5800)
      • gpupdate.exe (PID: 5808)
      • svchost.exe (PID: 5280)
      • schtasks.exe (PID: 1576)
      • schtasks.exe (PID: 3096)
      • schtasks.exe (PID: 5900)
      • schtasks.exe (PID: 4076)
      • schtasks.exe (PID: 4336)
      • schtasks.exe (PID: 2052)
      • schtasks.exe (PID: 5068)
      • schtasks.exe (PID: 4872)
      • schtasks.exe (PID: 5368)
      • schtasks.exe (PID: 5444)
      • DllHost.exe (PID: 5856)
      • schtasks.exe (PID: 3620)
      • schtasks.exe (PID: 4568)
      • schtasks.exe (PID: 4812)
      • schtasks.exe (PID: 2268)
      • schtasks.exe (PID: 3048)
      • rundll32.EXE (PID: 2880)
      • schtasks.exe (PID: 4080)
      • DllHost.exe (PID: 1576)
      • svchost.exe (PID: 1204)
      • WerFault.exe (PID: 2020)
      • opera.exe (PID: 5440)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1332)
      • iexplore.exe (PID: 964)
      • File.exe (PID: 3152)
      • Offscum.exe.exe (PID: 2200)
      • Service.bmp.exe (PID: 3984)
      • test33.bmp.exe (PID: 908)
      • hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
      • wam.exe.exe (PID: 1104)
      • random.exe.exe (PID: 3272)
      • real2001.bmp.exe (PID: 2268)
      • test33.bmp.exe (PID: 1036)
      • ll.exe (PID: 2516)
      • svchost.exe (PID: 2468)
      • build2.exe (PID: 2656)
      • GF6GB.exe (PID: 3316)
      • lokes_1.bmp.exe (PID: 3928)
      • InvisBrowser45856.exe (PID: 2064)
      • eCYGTdT.exe (PID: 4528)
    • Application launched itself

      • iexplore.exe (PID: 1332)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 964)
      • iexplore.exe (PID: 1332)
      • consent.exe (PID: 3044)
      • File.exe (PID: 3152)
      • test33.bmp.exe (PID: 908)
      • hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
      • real2001.bmp.exe (PID: 2268)
      • test33.bmp.exe (PID: 1036)
      • svchost.exe (PID: 2468)
      • build2.exe (PID: 2656)
      • powershell.EXE (PID: 5144)
      • powershell.EXE (PID: 4156)
      • wscript.exe (PID: 5416)
      • eCYGTdT.exe (PID: 4528)
    • Reads internet explorer settings

      • iexplore.exe (PID: 964)
    • Changes internet zones settings

      • iexplore.exe (PID: 1332)
    • Reads the date of Windows installation

      • iexplore.exe (PID: 1332)
      • opera.exe (PID: 5440)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 1332)
    • Creates files in the user directory

      • iexplore.exe (PID: 1332)
      • opera.exe (PID: 5440)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1332)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1332)
    • Reads CPU info

      • svchost.exe (PID: 2468)
    • Application was dropped or rewritten from another process

      • setup.tmp (PID: 1256)
      • setup.tmp (PID: 3064)
    • Loads dropped or rewritten executable

      • setup.tmp (PID: 1256)
      • setup.tmp (PID: 3064)
    • Creates a software uninstall entry

      • setup.tmp (PID: 3064)
    • Manual execution by user

      • Cleaner.exe (PID: 4732)
      • opera.exe (PID: 5440)
    • Check for Java to be installed

      • opera.exe (PID: 5440)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

RedLine

(PID) Process(2356) rrmix.exe.exe
C2 (1)193.233.48.58:38989
BotnetRuzki
Err_msg
Auth_value80c38cc7772c328c028b0e4f42a3fac6
US (200)
LEnvironmentogiEnvironmentn DatEnvironmenta
Environment
WSystem.Texteb DatSystem.Texta
System.Text
CoCryptographyokieCryptographys
Cryptography
ExtGenericension CooGenerickies
Generic
OFileInfopeFileInfora GFileInfoX StabFileInfole
FileInfo
OpLinqera GLinqX
Linq
ApGenericpDaGenericta\RGenericoamiGenericng\
Network
Extension
UNKNOWN
.
1
cFileStreamredFileStreamit_cFileStreamardFileStreams
FileStream
\
Network\
Host
Port
:
User
Pass
cookies.sqlite
%USEDisposeRPROFILE%\AppDaDisposeta\LDisposeocal
Dispose
String.Replace
String.Remove
bcrFileStream.IOypt.dFileStream.IOll
FileStream.IO
BCrstring.EmptyyptOpestring.EmptynAlgorithmProvistring.Emptyder
string.Empty
BCruintyptCloseAlgorituinthmProvuintider
uint
BCrUnmanagedTypeyptDecrUnmanagedTypeypt
UnmanagedType
BCrbyte[]yptDesbyte[]troyKbyte[]ey
byte[]
BCpszPropertyryptGepszPropertytPropepszPropertyrty
pszProperty
BCEncodingryptSEncodingetPrEncodingoperEncodingty
Encoding
BCrbMasterKeyyptImbMasterKeyportKbMasterKeyey
bMasterKey
windows-1251
AES
Microsoft Primitive Provider
ChainingModeGCM
AuthTagLength
ChainingMode
ObjectLength
KeyDataBlob
-
{0}
net.tcp://
/
localhost
80c38cc7772c328c028b0e4f42a3fac6
Authorization
ns1
UNKNWON
GSYCFyEDJx0ZC11dIipaVhs2BhciLQVTGyNUUA==
ARw/WwxbBVo=
Trimming
Yandex\YaAddon
ToString
asf
*wallet*
ZmZuYmVsZmRvZWlvaGVua2ppYm5tYWRqaWVoamhhamJ8WW9yb2lXYWxsZXQKaWJuZWpkZmptbWtwY25scGVia2xtbmtvZW9paG9mZWN8VHJvbmxpbmsKamJkYW9jbmVpaWlubWpiamxnYWxoY2VsZ2Jlam1uaWR8TmlmdHlXYWxsZXQKbmtiaWhmYmVvZ2FlYW9laGxlZm5rb2RiZWZncGdrbm58TWV0YW1hc2sKYWZiY2JqcGJwZmFkbGttaG1jbGhrZWVvZG1hbWNmbGN8TWF0aFdhbGxldApobmZhbmtu...
_
T
e
l
gr
am
ex
\TeEnvironmentlegraEnvironmentm DEnvironmentesktoEnvironmentp\tdEnvironmentata
String
Replace
string.Replace
%USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng
File.Write
Handler
npvo*
%USERPserviceInterface.ExtensionROFILE%\ApserviceInterface.ExtensionpData\LocaserviceInterface.Extensionl
serviceInterface.Extension
ProldCharotonVoldCharPN
oldChar
nSystem.CollectionspvoSystem.Collections*
System.Collections
(
UNIQUE
cstringmstringd
string
/ProcessC Process
Process
|
"
Armenia
Azerbaijan
Belarus
Kazakhstan
Kyrgyzstan
Moldova
Tajikistan
Uzbekistan
Ukraine
Russia
gasdl94ja;sdiasdl94ja;s32
asdl94ja;s
Gasdl94jlajsdetDevasdl94jlajsdiceCapasdl94jlajsds
asdl94jlajsd
Width
Height
CopyFromScreen
https://api.ip.sb/ip
80
81
0.0.0.0
SELSystem.Windows.FormsECT * FRSystem.Windows.FormsOM WinSystem.Windows.Forms32_ProcSystem.Windows.Formsessor
System.Windows.Forms
Name
NumberOfCores
roSystem.Linqot\CISystem.LinqMV2
System.Linq
SELSystem.LinqECT * FRSystem.LinqOM WinSystem.Linq32_VideoCoSystem.Linqntroller
AdapterRAM
SOFTWARE\WOW6432Node\Clients\StartMenuInternet
SOFTWARE\Clients\StartMenuInternet
shell\open\command
Unknown Version
SELESystem.ManagementCT * FRSystem.ManagementOM WiSystem.Managementn32_DisSystem.ManagementkDrivSystem.Managemente
System.Management
SerialNumber
SELSystem.Text.RegularExpressionsECT * FRSystem.Text.RegularExpressionsOM Win32_PSystem.Text.RegularExpressionsrocess WSystem.Text.RegularExpressionshere SessSystem.Text.RegularExpressionsionId='
'
FileSystem
SSystem.ELECT * FRSystem.OM WiSystem.n32_ProcSystem.ess WherSystem.e SessiSystem.onId='
System.
ExecutablePath
[
]
Concat0 MConcatb oConcatr Concat0
Concat
SELEMemoryCT * FMemoryROM WiMemoryn32_OperMemoryatingSMemoryystem
Memory
{0}{1}{2}
x32
x64
x86
SOFTWARE\Microsoft\Windows NT\CurrentVersion
ProductName
CSDVersion
Unknown
_[
System.Core, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
System.Security.Cryptography.AesCryptoServiceProvider
9b0k‰•‘˜gil4ep7Ž†.rmtpkx’ubžprxrd9
{11111-22222-10009-11111}
{11111-22222-50001-00000}
GetDelegateForFunctionPointer
švŸ4wb—21iq4l—82.Ÿv4a4Ž4yl6‡žŠtx
m_ptr
System.Reflection.RuntimeModule
m_pData
clrjit.dll
System.Reflection.ReflectionContext
__
file:///
Location
Find
ResourceA
Virtual
Alloc
Write
Process
Protect
Open
Close
Handle
kernel
32.dll
{11111-22222-10001-00001}
{11111-22222-10001-00002}
{11111-22222-20001-00001}
{11111-22222-20001-00002}
{11111-22222-40001-00001}
{11111-22222-40001-00002}
{11111-22222-50001-00001}
{11111-22222-50001-00002}
(PID) Process(916) AppLaunch.exe
C2 (1)91.211.251.186:41933
Botnetruz
Err_msg
Auth_valueb5178f81ea8830c13e88c402dccf09f0
US (165)
LEnvironmentogiEnvironmentn DatEnvironmenta
Environment
WSystem.Texteb DatSystem.Texta
System.Text
CoCryptographyokieCryptographys
Cryptography
ExtGenericension CooGenerickies
Generic
OFileInfopeFileInfora GFileInfoX StabFileInfole
FileInfo
OpLinqera GLinqX
Linq
ApGenericpDaGenericta\RGenericoamiGenericng\
Network
Extension
UNKNOWN
.
1
cFileStreamredFileStreamit_cFileStreamardFileStreams
FileStream
\
Host
Port
:
User
Pass
cookies.sqlite
%USEDisposeRPROFILE%\AppDaDisposeta\LDisposeocal
Dispose
String.Replace
String.Remove
bcrFileStream.IOypt.dFileStream.IOll
FileStream.IO
BCrstring.EmptyyptOpestring.EmptynAlgorithmProvistring.Emptyder
string.Empty
BCruintyptCloseAlgorituinthmProvuintider
uint
BCrUnmanagedTypeyptDecrUnmanagedTypeypt
UnmanagedType
BCrbyte[]yptDesbyte[]troyKbyte[]ey
byte[]
BCpszPropertyryptGepszPropertytPropepszPropertyrty
pszProperty
BCEncodingryptSEncodingetPrEncodingoperEncodingty
Encoding
BCrbMasterKeyyptImbMasterKeyportKbMasterKeyey
bMasterKey
windows-1251
AES
Microsoft Primitive Provider
ChainingModeGCM
AuthTagLength
ChainingMode
ObjectLength
KeyDataBlob
-
{0}
net.tcp://
/
localhost
b5178f81ea8830c13e88c402dccf09f0
Authorization
ns1
UNKNWON
GTUpAzgGIAsaCyVHOD9RCxklNUA7KCBGGxshSw==
NQ86QA==
Valvules
Yandex\YaAddon
ToString
asf
*wallet*
ZmZuYmVsZmRvZWlvaGVua2ppYm5tYWRqaWVoamhhamJ8WW9yb2lXYWxsZXQKaWJuZWpkZmptbWtwY25scGVia2xtbmtvZW9paG9mZWN8VHJvbmxpbmsKamJkYW9jbmVpaWlubWpiamxnYWxoY2VsZ2Jlam1uaWR8TmlmdHlXYWxsZXQKbmtiaWhmYmVvZ2FlYW9laGxlZm5rb2RiZWZncGdrbm58TWV0YW1hc2sKYWZiY2JqcGJwZmFkbGttaG1jbGhrZWVvZG1hbWNmbGN8TWF0aFdhbGxldApobmZhbmtu...
_
T
e
l
gr
am
ex
\TeEnvironmentlegraEnvironmentm DEnvironmentesktoEnvironmentp\tdEnvironmentata
string.Replace
%USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng
File.Write
Handler
npvo*
%USERPserviceInterface.ExtensionROFILE%\ApserviceInterface.ExtensionpData\LocaserviceInterface.Extensionl
serviceInterface.Extension
ProldCharotonVoldCharPN
oldChar
nSystem.CollectionspvoSystem.Collections*
System.Collections
(
UNIQUE
cstringmstringd
string
/ProcessC Process
Process
|
"
Armenia
Azerbaijan
Belarus
Kazakhstan
Kyrgyzstan
Moldova
Tajikistan
Uzbekistan
Ukraine
Russia
gasdl94ja;sdiasdl94ja;s32
asdl94ja;s
Gasdl94jlajsdetDevasdl94jlajsdiceCapasdl94jlajsds
asdl94jlajsd
Width
Height
CopyFromScreen
https://api.ip.sb/ip
SELSystem.Windows.FormsECT * FRSystem.Windows.FormsOM WinSystem.Windows.Forms32_ProcSystem.Windows.Formsessor
System.Windows.Forms
Name
NumberOfCores
roSystem.Linqot\CISystem.LinqMV2
System.Linq
SELSystem.LinqECT * FRSystem.LinqOM WinSystem.Linq32_VideoCoSystem.Linqntroller
AdapterRAM
SOFTWARE\WOW6432Node\Clients\StartMenuInternet
SOFTWARE\Clients\StartMenuInternet
shell\open\command
Unknown Version
SELESystem.ManagementCT * FRSystem.ManagementOM WiSystem.Managementn32_DisSystem.ManagementkDrivSystem.Managemente
System.Management
SerialNumber
SELSystem.Text.RegularExpressionsECT * FRSystem.Text.RegularExpressionsOM Win32_PSystem.Text.RegularExpressionsrocess WSystem.Text.RegularExpressionshere SessSystem.Text.RegularExpressionsionId='
'
FileSystem
SSystem.ELECT * FRSystem.OM WiSystem.n32_ProcSystem.ess WherSystem.e SessiSystem.onId='
System.
ExecutablePath
[
]
Concat0 MConcatb oConcatr Concat0
Concat
SELEMemoryCT * FMemoryROM WiMemoryn32_OperMemoryatingSMemoryystem
Memory
{0}{1}{2}
x32
x64
x86
SOFTWARE\Microsoft\Windows NT\CurrentVersion
ProductName
CSDVersion
Unknown
_[
Network\
String
Replace
80
81
0.0.0.0
(PID) Process(3712) AppLaunch.exe
C2 (1)65.108.101.231:14648
BotnetSUSHI
Err_msg
Auth_value26bcdf6ae8358a98f24ebd4bd8ec3714
US (165)
LEnvironmentogiEnvironmentn DatEnvironmenta
Environment
WSystem.Texteb DatSystem.Texta
System.Text
CoCryptographyokieCryptographys
Cryptography
ExtGenericension CooGenerickies
Generic
OFileInfopeFileInfora GFileInfoX StabFileInfole
FileInfo
OpLinqera GLinqX
Linq
ApGenericpDaGenericta\RGenericoamiGenericng\
Network
Extension
UNKNOWN
.
1
cFileStreamredFileStreamit_cFileStreamardFileStreams
FileStream
\
Network\
Host
Port
:
User
Pass
cookies.sqlite
%USEDisposeRPROFILE%\AppDaDisposeta\LDisposeocal
Dispose
String.Replace
String.Remove
bcrFileStream.IOypt.dFileStream.IOll
FileStream.IO
BCrstring.EmptyyptOpestring.EmptynAlgorithmProvistring.Emptyder
string.Empty
BCruintyptCloseAlgorituinthmProvuintider
uint
BCrUnmanagedTypeyptDecrUnmanagedTypeypt
UnmanagedType
BCrbyte[]yptDesbyte[]troyKbyte[]ey
byte[]
BCpszPropertyryptGepszPropertytPropepszPropertyrty
pszProperty
BCEncodingryptSEncodingetPrEncodingoperEncodingty
Encoding
BCrbMasterKeyyptImbMasterKeyportKbMasterKeyey
bMasterKey
windows-1251
AES
Microsoft Primitive Provider
ChainingModeGCM
AuthTagLength
ChainingMode
ObjectLength
KeyDataBlob
-
{0}
net.tcp://
/
localhost
26bcdf6ae8358a98f24ebd4bd8ec3714
Authorization
ns1
UNKNWON
HA8lBygnMl0iDRcSPSFRCj4TK1EfMSFAKzcUVA==
B1QmJjY2GFQ=
Repressing
Yandex\YaAddon
ToString
asf
*wallet*
ZmZuYmVsZmRvZWlvaGVua2ppYm5tYWRqaWVoamhhamJ8WW9yb2lXYWxsZXQKaWJuZWpkZmptbWtwY25scGVia2xtbmtvZW9paG9mZWN8VHJvbmxpbmsKamJkYW9jbmVpaWlubWpiamxnYWxoY2VsZ2Jlam1uaWR8TmlmdHlXYWxsZXQKbmtiaWhmYmVvZ2FlYW9laGxlZm5rb2RiZWZncGdrbm58TWV0YW1hc2sKYWZiY2JqcGJwZmFkbGttaG1jbGhrZWVvZG1hbWNmbGN8TWF0aFdhbGxldApobmZhbmtu...
_
T
e
l
gr
am
ex
\TeEnvironmentlegraEnvironmentm DEnvironmentesktoEnvironmentp\tdEnvironmentata
String
Replace
string.Replace
%USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng
File.Write
Handler
npvo*
%USERPserviceInterface.ExtensionROFILE%\ApserviceInterface.ExtensionpData\LocaserviceInterface.Extensionl
serviceInterface.Extension
ProldCharotonVoldCharPN
oldChar
nSystem.CollectionspvoSystem.Collections*
System.Collections
(
UNIQUE
cstringmstringd
string
/ProcessC Process
Process
|
"
Armenia
Azerbaijan
Belarus
Kazakhstan
Kyrgyzstan
Moldova
Tajikistan
Uzbekistan
Ukraine
Russia
gasdl94ja;sdiasdl94ja;s32
asdl94ja;s
Gasdl94jlajsdetDevasdl94jlajsdiceCapasdl94jlajsds
asdl94jlajsd
Width
Height
CopyFromScreen
https://api.ip.sb/ip
80
81
0.0.0.0
SELSystem.Windows.FormsECT * FRSystem.Windows.FormsOM WinSystem.Windows.Forms32_ProcSystem.Windows.Formsessor
System.Windows.Forms
Name
NumberOfCores
roSystem.Linqot\CISystem.LinqMV2
System.Linq
SELSystem.LinqECT * FRSystem.LinqOM WinSystem.Linq32_VideoCoSystem.Linqntroller
AdapterRAM
SOFTWARE\WOW6432Node\Clients\StartMenuInternet
SOFTWARE\Clients\StartMenuInternet
shell\open\command
Unknown Version
SELESystem.ManagementCT * FRSystem.ManagementOM WiSystem.Managementn32_DisSystem.ManagementkDrivSystem.Managemente
System.Management
SerialNumber
SELSystem.Text.RegularExpressionsECT * FRSystem.Text.RegularExpressionsOM Win32_PSystem.Text.RegularExpressionsrocess WSystem.Text.RegularExpressionshere SessSystem.Text.RegularExpressionsionId='
'
FileSystem
SSystem.ELECT * FRSystem.OM WiSystem.n32_ProcSystem.ess WherSystem.e SessiSystem.onId='
System.
ExecutablePath
[
]
Concat0 MConcatb oConcatr Concat0
Concat
SELEMemoryCT * FMemoryROM WiMemoryn32_OperMemoryatingSMemoryystem
Memory
{0}{1}{2}
x32
x64
x86
SOFTWARE\Microsoft\Windows NT\CurrentVersion
ProductName
CSDVersion
Unknown
_[
(PID) Process(2584) AppLaunch.exe
C2 (1)194.36.177.138:81
BotnetROK
Err_msg
Auth_value17f65f419822bba9db958b4ac6cc9f05
US (163)
LEnvironmentogiEnvironmentn DatEnvironmenta
Environment
WSystem.Texteb DatSystem.Texta
System.Text
CoCryptographyokieCryptographys
Cryptography
ExtGenericension CooGenerickies
Generic
OFileInfopeFileInfora GFileInfoX StabFileInfole
FileInfo
OpLinqera GLinqX
Linq
ApGenericpDaGenericta\RGenericoamiGenericng\
Network
Extension
UNKNOWN
.
1
cFileStreamredFileStreamit_cFileStreamardFileStreams
FileStream
\
Host
Port
:
User
Pass
cookies.sqlite
%USEDisposeRPROFILE%\AppDaDisposeta\LDisposeocal
Dispose
String.Replace
String.Remove
bcrFileStream.IOypt.dFileStream.IOll
FileStream.IO
BCrstring.EmptyyptOpestring.EmptynAlgorithmProvistring.Emptyder
string.Empty
BCruintyptCloseAlgorituinthmProvuintider
uint
BCrUnmanagedTypeyptDecrUnmanagedTypeypt
UnmanagedType
BCrbyte[]yptDesbyte[]troyKbyte[]ey
byte[]
BCpszPropertyryptGepszPropertytPropepszPropertyrty
pszProperty
BCEncodingryptSEncodingetPrEncodingoperEncodingty
Encoding
BCrbMasterKeyyptImbMasterKeyportKbMasterKeyey
bMasterKey
windows-1251
AES
Microsoft Primitive Provider
ChainingModeGCM
AuthTagLength
ChainingMode
ObjectLength
KeyDataBlob
-
{0}
net.tcp://
/
localhost
17f65f419822bba9db958b4ac6cc9f05
Authorization
ns1
UNKNWON
DzUMQCUaKEA/KCRUPhBEHT8JJVcoNCxN
FwpePA==
Bagpipers
Yandex\YaAddon
ToString
asf
*wallet*
ZmZuYmVsZmRvZWlvaGVua2ppYm5tYWRqaWVoamhhamJ8WW9yb2lXYWxsZXQKaWJuZWpkZmptbWtwY25scGVia2xtbmtvZW9paG9mZWN8VHJvbmxpbmsKamJkYW9jbmVpaWlubWpiamxnYWxoY2VsZ2Jlam1uaWR8TmlmdHlXYWxsZXQKbmtiaWhmYmVvZ2FlYW9laGxlZm5rb2RiZWZncGdrbm58TWV0YW1hc2sKYWZiY2JqcGJwZmFkbGttaG1jbGhrZWVvZG1hbWNmbGN8TWF0aFdhbGxldApobmZhbmtu...
_
T
e
l
gr
am
ex
\TeEnvironmentlegraEnvironmentm DEnvironmentesktoEnvironmentp\tdEnvironmentata
string.Replace
%USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng
File.Write
Handler
npvo*
%USERPserviceInterface.ExtensionROFILE%\ApserviceInterface.ExtensionpData\LocaserviceInterface.Extensionl
serviceInterface.Extension
ProldCharotonVoldCharPN
oldChar
nSystem.CollectionspvoSystem.Collections*
System.Collections
(
UNIQUE
cstringmstringd
string
/ProcessC Process
Process
|
"
Armenia
Azerbaijan
Belarus
Kazakhstan
Kyrgyzstan
Moldova
Tajikistan
Uzbekistan
Ukraine
Russia
gasdl94ja;sdiasdl94ja;s32
asdl94ja;s
Gasdl94jlajsdetDevasdl94jlajsdiceCapasdl94jlajsds
asdl94jlajsd
Width
Height
CopyFromScreen
https://api.ip.sb/ip
SELSystem.Windows.FormsECT * FRSystem.Windows.FormsOM WinSystem.Windows.Forms32_ProcSystem.Windows.Formsessor
System.Windows.Forms
Name
NumberOfCores
roSystem.Linqot\CISystem.LinqMV2
System.Linq
SELSystem.LinqECT * FRSystem.LinqOM WinSystem.Linq32_VideoCoSystem.Linqntroller
AdapterRAM
SOFTWARE\WOW6432Node\Clients\StartMenuInternet
SOFTWARE\Clients\StartMenuInternet
shell\open\command
Unknown Version
SELESystem.ManagementCT * FRSystem.ManagementOM WiSystem.Managementn32_DisSystem.ManagementkDrivSystem.Managemente
System.Management
SerialNumber
SELSystem.Text.RegularExpressionsECT * FRSystem.Text.RegularExpressionsOM Win32_PSystem.Text.RegularExpressionsrocess WSystem.Text.RegularExpressionshere SessSystem.Text.RegularExpressionsionId='
'
FileSystem
SSystem.ELECT * FRSystem.OM WiSystem.n32_ProcSystem.ess WherSystem.e SessiSystem.onId='
System.
ExecutablePath
[
]
Concat0 MConcatb oConcatr Concat0
Concat
SELEMemoryCT * FMemoryROM WiMemoryn32_OperMemoryatingSMemoryystem
Memory
{0}{1}{2}
x32
x64
x86
SOFTWARE\Microsoft\Windows NT\CurrentVersion
ProductName
CSDVersion
Unknown
_[
Network\
String
Replace
80
81
0.0.0.0
(PID) Process(3564) AppLaunch.exe
C2 (1)185.215.113.24:15994
Botnet@humus228p
Err_msg
Auth_valuebb99a32fdff98741feb69d524760afae
US (165)
LEnvironmentogiEnvironmentn DatEnvironmenta
Environment
WSystem.Texteb DatSystem.Texta
System.Text
CoCryptographyokieCryptographys
Cryptography
ExtGenericension CooGenerickies
Generic
OFileInfopeFileInfora GFileInfoX StabFileInfole
FileInfo
OpLinqera GLinqX
Linq
ApGenericpDaGenericta\RGenericoamiGenericng\
Network
Extension
UNKNOWN
.
1
cFileStreamredFileStreamit_cFileStreamardFileStreams
FileStream
\
Network\
Host
Port
:
User
Pass
cookies.sqlite
%USEDisposeRPROFILE%\AppDaDisposeta\LDisposeocal
Dispose
String.Replace
String.Remove
bcrFileStream.IOypt.dFileStream.IOll
FileStream.IO
BCrstring.EmptyyptOpestring.EmptynAlgorithmProvistring.Emptyder
string.Empty
BCruintyptCloseAlgorituinthmProvuintider
uint
BCrUnmanagedTypeyptDecrUnmanagedTypeypt
UnmanagedType
BCrbyte[]yptDesbyte[]troyKbyte[]ey
byte[]
BCpszPropertyryptGepszPropertytPropepszPropertyrty
pszProperty
BCEncodingryptSEncodingetPrEncodingoperEncodingty
Encoding
BCrbMasterKeyyptImbMasterKeyportKbMasterKeyey
bMasterKey
windows-1251
AES
Microsoft Primitive Provider
ChainingModeGCM
AuthTagLength
ChainingMode
ObjectLength
KeyDataBlob
-
{0}
net.tcp://
/
localhost
bb99a32fdff98741feb69d524760afae
Authorization
ns1
UNKNWON
HCEIRTkHGA0hJ0EVHCEiATgHAEMiICBYHiE+SQ==
ADIHRRc1Bw8iHjxZMjRSSQ==
Quotum
Yandex\YaAddon
ToString
asf
*wallet*
ZmZuYmVsZmRvZWlvaGVua2ppYm5tYWRqaWVoamhhamJ8WW9yb2lXYWxsZXQKaWJuZWpkZmptbWtwY25scGVia2xtbmtvZW9paG9mZWN8VHJvbmxpbmsKamJkYW9jbmVpaWlubWpiamxnYWxoY2VsZ2Jlam1uaWR8TmlmdHlXYWxsZXQKbmtiaWhmYmVvZ2FlYW9laGxlZm5rb2RiZWZncGdrbm58TWV0YW1hc2sKYWZiY2JqcGJwZmFkbGttaG1jbGhrZWVvZG1hbWNmbGN8TWF0aFdhbGxldApobmZhbmtu...
_
T
e
l
gr
am
ex
\TeEnvironmentlegraEnvironmentm DEnvironmentesktoEnvironmentp\tdEnvironmentata
String
Replace
string.Replace
%USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng
File.Write
Handler
npvo*
%USERPserviceInterface.ExtensionROFILE%\ApserviceInterface.ExtensionpData\LocaserviceInterface.Extensionl
serviceInterface.Extension
ProldCharotonVoldCharPN
oldChar
nSystem.CollectionspvoSystem.Collections*
System.Collections
(
UNIQUE
cstringmstringd
string
/ProcessC Process
Process
|
"
Armenia
Azerbaijan
Belarus
Kazakhstan
Kyrgyzstan
Moldova
Tajikistan
Uzbekistan
Ukraine
Russia
gasdl94ja;sdiasdl94ja;s32
asdl94ja;s
Gasdl94jlajsdetDevasdl94jlajsdiceCapasdl94jlajsds
asdl94jlajsd
Width
Height
CopyFromScreen
https://api.ip.sb/ip
80
81
0.0.0.0
SELSystem.Windows.FormsECT * FRSystem.Windows.FormsOM WinSystem.Windows.Forms32_ProcSystem.Windows.Formsessor
System.Windows.Forms
Name
NumberOfCores
roSystem.Linqot\CISystem.LinqMV2
System.Linq
SELSystem.LinqECT * FRSystem.LinqOM WinSystem.Linq32_VideoCoSystem.Linqntroller
AdapterRAM
SOFTWARE\WOW6432Node\Clients\StartMenuInternet
SOFTWARE\Clients\StartMenuInternet
shell\open\command
Unknown Version
SELESystem.ManagementCT * FRSystem.ManagementOM WiSystem.Managementn32_DisSystem.ManagementkDrivSystem.Managemente
System.Management
SerialNumber
SELSystem.Text.RegularExpressionsECT * FRSystem.Text.RegularExpressionsOM Win32_PSystem.Text.RegularExpressionsrocess WSystem.Text.RegularExpressionshere SessSystem.Text.RegularExpressionsionId='
'
FileSystem
SSystem.ELECT * FRSystem.OM WiSystem.n32_ProcSystem.ess WherSystem.e SessiSystem.onId='
System.
ExecutablePath
[
]
Concat0 MConcatb oConcatr Concat0
Concat
SELEMemoryCT * FMemoryROM WiMemoryn32_OperMemoryatingSMemoryystem
Memory
{0}{1}{2}
x32
x64
x86
SOFTWARE\Microsoft\Windows NT\CurrentVersion
ProductName
CSDVersion
Unknown
_[
(PID) Process(1600) AppLaunch.exe
C2 (1)193.124.22.34:19489
Botnetruz19489
Err_msg
Auth_value2b3af4bdf5e7f4f41faf1150d1660073
US (163)
LEnvironmentogiEnvironmentn DatEnvironmenta
Environment
WSystem.Texteb DatSystem.Texta
System.Text
CoCryptographyokieCryptographys
Cryptography
ExtGenericension CooGenerickies
Generic
OFileInfopeFileInfora GFileInfoX StabFileInfole
FileInfo
OpLinqera GLinqX
Linq
ApGenericpDaGenericta\RGenericoamiGenericng\
Network
Extension
UNKNOWN
.
1
cFileStreamredFileStreamit_cFileStreamardFileStreams
FileStream
\
Host
Port
:
User
Pass
cookies.sqlite
%USEDisposeRPROFILE%\AppDaDisposeta\LDisposeocal
Dispose
String.Replace
String.Remove
bcrFileStream.IOypt.dFileStream.IOll
FileStream.IO
BCrstring.EmptyyptOpestring.EmptynAlgorithmProvistring.Emptyder
string.Empty
BCruintyptCloseAlgorituinthmProvuintider
uint
BCrUnmanagedTypeyptDecrUnmanagedTypeypt
UnmanagedType
BCrbyte[]yptDesbyte[]troyKbyte[]ey
byte[]
BCpszPropertyryptGepszPropertytPropepszPropertyrty
pszProperty
BCEncodingryptSEncodingetPrEncodingoperEncodingty
Encoding
BCrbMasterKeyyptImbMasterKeyportKbMasterKeyey
bMasterKey
windows-1251
AES
Microsoft Primitive Provider
ChainingModeGCM
AuthTagLength
ChainingMode
ObjectLength
KeyDataBlob
-
{0}
net.tcp://
/
localhost
2b3af4bdf5e7f4f41faf1150d1660073
Authorization
ns1
UNKNWON
HzEdEyAPISsrNV0VKA1mHzgtAx0rBjRCJj1YWQ==
MQsgXyExD2IqMgJR
Reviled
Yandex\YaAddon
ToString
asf
*wallet*
ZmZuYmVsZmRvZWlvaGVua2ppYm5tYWRqaWVoamhhamJ8WW9yb2lXYWxsZXQKaWJuZWpkZmptbWtwY25scGVia2xtbmtvZW9paG9mZWN8VHJvbmxpbmsKamJkYW9jbmVpaWlubWpiamxnYWxoY2VsZ2Jlam1uaWR8TmlmdHlXYWxsZXQKbmtiaWhmYmVvZ2FlYW9laGxlZm5rb2RiZWZncGdrbm58TWV0YW1hc2sKYWZiY2JqcGJwZmFkbGttaG1jbGhrZWVvZG1hbWNmbGN8TWF0aFdhbGxldApobmZhbmtu...
_
T
e
l
gr
am
ex
\TeEnvironmentlegraEnvironmentm DEnvironmentesktoEnvironmentp\tdEnvironmentata
string.Replace
%USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng
File.Write
Handler
npvo*
%USERPserviceInterface.ExtensionROFILE%\ApserviceInterface.ExtensionpData\LocaserviceInterface.Extensionl
serviceInterface.Extension
ProldCharotonVoldCharPN
oldChar
nSystem.CollectionspvoSystem.Collections*
System.Collections
(
UNIQUE
cstringmstringd
string
/ProcessC Process
Process
|
"
Armenia
Azerbaijan
Belarus
Kazakhstan
Kyrgyzstan
Moldova
Tajikistan
Uzbekistan
Ukraine
Russia
gasdl94ja;sdiasdl94ja;s32
asdl94ja;s
Gasdl94jlajsdetDevasdl94jlajsdiceCapasdl94jlajsds
asdl94jlajsd
Width
Height
CopyFromScreen
https://api.ip.sb/ip
SELSystem.Windows.FormsECT * FRSystem.Windows.FormsOM WinSystem.Windows.Forms32_ProcSystem.Windows.Formsessor
System.Windows.Forms
Name
NumberOfCores
roSystem.Linqot\CISystem.LinqMV2
System.Linq
SELSystem.LinqECT * FRSystem.LinqOM WinSystem.Linq32_VideoCoSystem.Linqntroller
AdapterRAM
SOFTWARE\WOW6432Node\Clients\StartMenuInternet
SOFTWARE\Clients\StartMenuInternet
shell\open\command
Unknown Version
SELESystem.ManagementCT * FRSystem.ManagementOM WiSystem.Managementn32_DisSystem.ManagementkDrivSystem.Managemente
System.Management
SerialNumber
SELSystem.Text.RegularExpressionsECT * FRSystem.Text.RegularExpressionsOM Win32_PSystem.Text.RegularExpressionsrocess WSystem.Text.RegularExpressionshere SessSystem.Text.RegularExpressionsionId='
'
FileSystem
SSystem.ELECT * FRSystem.OM WiSystem.n32_ProcSystem.ess WherSystem.e SessiSystem.onId='
System.
ExecutablePath
[
]
Concat0 MConcatb oConcatr Concat0
Concat
SELEMemoryCT * FMemoryROM WiMemoryn32_OperMemoryatingSMemoryystem
Memory
{0}{1}{2}
x32
x64
x86
SOFTWARE\Microsoft\Windows NT\CurrentVersion
ProductName
CSDVersion
Unknown
_[
Network\
String
Replace
80
81
0.0.0.0
(PID) Process(3248) 9817bcdf33322e8fbc1670e731c76126.exe
C2 (1)elew3le3lanle.freeddns.org:4633
Botnetn1k0y11
Err_msg
Auth_value5b8edd43c63faa6789619650019aee17
US (163)
LEnvironmentogiEnvironmentn DatEnvironmenta
Environment
WSystem.Texteb DatSystem.Texta
System.Text
CoCryptographyokieCryptographys
Cryptography
ExtGenericension CooGenerickies
Generic
OFileInfopeFileInfora GFileInfoX StabFileInfole
FileInfo
OpLinqera GLinqX
Linq
ApGenericpDaGenericta\RGenericoamiGenericng\
Network
Extension
UNKNOWN
.
1
cFileStreamredFileStreamit_cFileStreamardFileStreams
FileStream
\
Host
Port
:
User
Pass
cookies.sqlite
%USEDisposeRPROFILE%\AppDaDisposeta\LDisposeocal
Dispose
String.Replace
String.Remove
bcrFileStream.IOypt.dFileStream.IOll
FileStream.IO
BCrstring.EmptyyptOpestring.EmptynAlgorithmProvistring.Emptyder
string.Empty
BCruintyptCloseAlgorituinthmProvuintider
uint
BCrUnmanagedTypeyptDecrUnmanagedTypeypt
UnmanagedType
BCrbyte[]yptDesbyte[]troyKbyte[]ey
byte[]
BCpszPropertyryptGepszPropertytPropepszPropertyrty
pszProperty
BCEncodingryptSEncodingetPrEncodingoperEncodingty
Encoding
BCrbMasterKeyyptImbMasterKeyportKbMasterKeyey
bMasterKey
windows-1251
AES
Microsoft Primitive Provider
ChainingModeGCM
AuthTagLength
ChainingMode
ObjectLength
KeyDataBlob
-
{0}
net.tcp://
/
localhost
5b8edd43c63faa6789619650019aee17
Authorization
ns1
UNKNWON
GTgfAgsMJwcpFyEUNzhDGi4gdgIEAzkaMzMhNgweWxkVBBdFDSs+FCIBVEk=
IQUhHCI+Agw+ElJa
Cognovits
Yandex\YaAddon
ToString
asf
*wallet*
ZmZuYmVsZmRvZWlvaGVua2ppYm5tYWRqaWVoamhhamJ8WW9yb2lXYWxsZXQKaWJuZWpkZmptbWtwY25scGVia2xtbmtvZW9paG9mZWN8VHJvbmxpbmsKamJkYW9jbmVpaWlubWpiamxnYWxoY2VsZ2Jlam1uaWR8TmlmdHlXYWxsZXQKbmtiaWhmYmVvZ2FlYW9laGxlZm5rb2RiZWZncGdrbm58TWV0YW1hc2sKYWZiY2JqcGJwZmFkbGttaG1jbGhrZWVvZG1hbWNmbGN8TWF0aFdhbGxldApobmZhbmtu...
_
T
e
l
gr
am
ex
\TeEnvironmentlegraEnvironmentm DEnvironmentesktoEnvironmentp\tdEnvironmentata
string.Replace
%USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng
File.Write
Handler
npvo*
%USERPserviceInterface.ExtensionROFILE%\ApserviceInterface.ExtensionpData\LocaserviceInterface.Extensionl
serviceInterface.Extension
ProldCharotonVoldCharPN
oldChar
nSystem.CollectionspvoSystem.Collections*
System.Collections
(
UNIQUE
cstringmstringd
string
/ProcessC Process
Process
|
"
Armenia
Azerbaijan
Belarus
Kazakhstan
Kyrgyzstan
Moldova
Tajikistan
Uzbekistan
Ukraine
Russia
gasdl94ja;sdiasdl94ja;s32
asdl94ja;s
Gasdl94jlajsdetDevasdl94jlajsdiceCapasdl94jlajsds
asdl94jlajsd
Width
Height
CopyFromScreen
https://api.ip.sb/ip
SELSystem.Windows.FormsECT * FRSystem.Windows.FormsOM WinSystem.Windows.Forms32_ProcSystem.Windows.Formsessor
System.Windows.Forms
Name
NumberOfCores
roSystem.Linqot\CISystem.LinqMV2
System.Linq
SELSystem.LinqECT * FRSystem.LinqOM WinSystem.Linq32_VideoCoSystem.Linqntroller
AdapterRAM
SOFTWARE\WOW6432Node\Clients\StartMenuInternet
SOFTWARE\Clients\StartMenuInternet
shell\open\command
Unknown Version
SELESystem.ManagementCT * FRSystem.ManagementOM WiSystem.Managementn32_DisSystem.ManagementkDrivSystem.Managemente
System.Management
SerialNumber
SELSystem.Text.RegularExpressionsECT * FRSystem.Text.RegularExpressionsOM Win32_PSystem.Text.RegularExpressionsrocess WSystem.Text.RegularExpressionshere SessSystem.Text.RegularExpressionsionId='
'
FileSystem
SSystem.ELECT * FRSystem.OM WiSystem.n32_ProcSystem.ess WherSystem.e SessiSystem.onId='
System.
ExecutablePath
[
]
Concat0 MConcatb oConcatr Concat0
Concat
SELEMemoryCT * FMemoryROM WiMemoryn32_OperMemoryatingSMemoryystem
Memory
{0}{1}{2}
x32
x64
x86
SOFTWARE\Microsoft\Windows NT\CurrentVersion
ProductName
CSDVersion
Unknown
_[
Network\
String
Replace
80
81
0.0.0.0

Tofsee

(PID) Process(2652) svchost.exe
C2 (2)niflheimr.cn
jotunheim.name
Encrypted Strings (59)c:\Windows
\system32\
ImagePath
.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MSConfig
/r
.exe
cmd /C move /Y "%s" %s sc config %s binPath= "%s%s /d\"%s\"" sc start %s
svchost.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
ConsentPromptBehaviorAdmin
PromptOnSecureDesktop
MSConfig
:.repos
USERPROFILE
\Local Settings:.repos
USERPROFILE
\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.repos
USERPROFILE
\wincookie.repos
TMP
Config
Control Panel\Buses
Config
SOFTWARE\Microsoft\Buses
Config
Control Panel\Buses
Config
SOFTWARE\Microsoft\Buses
SYSTEM\CurrentControlSet\services
ImagePath
SYSTEM\CurrentControlSet\services
SYSTEM\CurrentControlSet\services
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
.exe
qazwsxed
%s%i%i%i%i.bat
@echo off :next_try del "%s">nul if exist "%s" ( ping 127.0.0.1 >nul goto next_try ) del %%0
svchost.exe
.exe
/u
USERPROFILE
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
/d
/e
/d
/e
.exe
"%s" /u"%s"
USERPROFILE
.exe
USERPROFILE
USERPROFILE
ver=%d lid=%d win=%X/%d sid=%s rep=%s

Amadey

(PID) Process(1208) orxds.exe
C2 (1)185.215.113.38/f8dfksdj3/index.php
Version3.10
Strings (92)8c7aecc852
orxds.exe
SCHTASKS
/Create /SC MINUTE /MO 1 /TN
/TR "
" /F
/C REG ADD "HKCU\Software\Micro=oft\Windows\CurrentVersion\Expl9rer\User Shell Folders" /f /v S>artup /t REG_SZ /d
cmd
SOFTWARE\Microsoft\Windows\Curr/ntVersion\Explorer\Shell Folder=
Startup
/C REG ADD "HKCU\SOFTWARE\Micro=oft\Windows\CurrentVersion\RunO8ce" /f /v rem /t REG_SZ /d
"cmd /C RMDIR /s/q "
SOFTWARE\Microsoft\Windows\Curr/ntVersion\Run
rundll32
/Delete /TN "
powershell
-Command $action = New-Schedule.TaskAction -Execute '
'; $time = New-TimeSpan -Minute= 1; $trigger = New-ScheduledTas5Trigger -Once -At 0:00 -Repetit3onInterval $time; Register-Sche.uledTask -Action $action -Trigg/r $trigger -TaskName '
-Command $action = Unregister-S-heduledTask -TaskName '
-Confirm: $false
POST
GET
id=
&vs=
&sd=
&os=
&bi=
&ar=
&pc=
&un=
&dm=
&av=
&lv=
cred.dll|
Main
http://
https://
exe
dll
<c>
<d>
Plugins/
+++
&unit=
shell32.dll
kernel32.dll
GetNativeSystemInfo
ProgramData\
AVAST Software
Avira
Kaspersky Lab
ESET
Panda Security
Doctor Web
AVG
360TotalSecurity
Bitdefender
Norton
Sophos
Comodo
WinDefender
0123456789
Content-Type: multipart/form-da>a; boundary=----
------
?scr=1
.jpg
Content-Type: application/x-www÷form-urlencoded
SYSTEM\CurrentControlSet\Contro6\ComputerName\ComputerName
ComputerName
-unicode-
SYSTEM\CurrentControlSet\Contro6\UnitedVideo\CONTROL\VIDEO\
SYSTEM\ControlSet001\Services\B+sicDisplay\Video
VideoID
\0000
DefaultSettings.XResolution
DefaultSettings.YResolution
SOFTWARE\Microsoft\Windows NT\C?rrentVersion
ProductName
2019
2022
2016
CurrentBuild
cmd.exe
/c echo Y|CACLS "
" /P "
:N"
/c CACLS "
:R" /E
:F" /E
AppData
:::
rundll32.exe
(PID) Process(3348) orxds.exe
C2 (1)185.215.113.38/f8dfksdj3/index.php
Version3.10
Strings (92)8c7aecc852
orxds.exe
SCHTASKS
/Create /SC MINUTE /MO 1 /TN
/TR "
" /F
/C REG ADD "HKCU\Software\Micro=oft\Windows\CurrentVersion\Expl9rer\User Shell Folders" /f /v S>artup /t REG_SZ /d
cmd
SOFTWARE\Microsoft\Windows\Curr/ntVersion\Explorer\Shell Folder=
Startup
/C REG ADD "HKCU\SOFTWARE\Micro=oft\Windows\CurrentVersion\RunO8ce" /f /v rem /t REG_SZ /d
"cmd /C RMDIR /s/q "
SOFTWARE\Microsoft\Windows\Curr/ntVersion\Run
rundll32
/Delete /TN "
powershell
-Command $action = New-Schedule.TaskAction -Execute '
'; $time = New-TimeSpan -Minute= 1; $trigger = New-ScheduledTas5Trigger -Once -At 0:00 -Repetit3onInterval $time; Register-Sche.uledTask -Action $action -Trigg/r $trigger -TaskName '
-Command $action = Unregister-S-heduledTask -TaskName '
-Confirm: $false
POST
GET
id=
&vs=
&sd=
&os=
&bi=
&ar=
&pc=
&un=
&dm=
&av=
&lv=
cred.dll|
Main
http://
https://
exe
dll
<c>
<d>
Plugins/
+++
&unit=
shell32.dll
kernel32.dll
GetNativeSystemInfo
ProgramData\
AVAST Software
Avira
Kaspersky Lab
ESET
Panda Security
Doctor Web
AVG
360TotalSecurity
Bitdefender
Norton
Sophos
Comodo
WinDefender
0123456789
Content-Type: multipart/form-da>a; boundary=----
------
?scr=1
.jpg
Content-Type: application/x-www÷form-urlencoded
SYSTEM\CurrentControlSet\Contro6\ComputerName\ComputerName
ComputerName
-unicode-
SYSTEM\CurrentControlSet\Contro6\UnitedVideo\CONTROL\VIDEO\
SYSTEM\ControlSet001\Services\B+sicDisplay\Video
VideoID
\0000
DefaultSettings.XResolution
DefaultSettings.YResolution
SOFTWARE\Microsoft\Windows NT\C?rrentVersion
ProductName
2019
2022
2016
CurrentBuild
cmd.exe
/c echo Y|CACLS "
" /P "
:N"
/c CACLS "
:R" /E
:F" /E
AppData
:::
rundll32.exe
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
337
Monitored processes
306
Malicious processes
121
Suspicious processes
50

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start inject iexplore.exe iexplore.exe winrar.exe file.exe no specs #SOCELARS file.exe niceprocessx32.bmp.exe service.bmp.exe #REDLINE offscum.exe.exe #REDLINE rrmix.exe.exe #REDLINE setupmexx.exe.exe 13.php.exe file1.exe.exe no specs wam.exe.exe cmd.exe no specs cmd.exe sc.exe no specs sc.exe no specs sc.exe no specs mxsfsaaa.exe no specs 6523.exe.exe netsh.exe no specs fjefrxz.exe.exe ftp.exe no specs prolivv.bmp.exe no specs cmd.exe no specs #TOFSEE svchost.exe cmd.exe no specs #REDLINE applaunch.exe #REDLINE applaunch.exe tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs findstr.exe no specs congiunto.exe.pif ping.exe no specs test33.bmp.exe no specs mixinte2001.bmp.exe real2001.bmp.exe olympteam_build_crypted_2.bmp.exe no specs #REDLINE norm2.bmp.exe #REDLINE lokes_1.bmp.exe fxdd.bmp.exe test33.bmp.exe arabcode_crypted_3.bmp.exe no specs unmatured.bmp.exe no specs #SOCELARS hyzk5okajqjyyx5kruskitei.exe schtasks.exe no specs schtasks.exe no specs #REDLINE fenix_7.bmp.exe #REDLINE shortnessunsol.bmp.exe #REDLINE applaunch.exe #REDLINE applaunch.exe trdnganlzr22649.exe.exe #AMADEY orxds.exe cmd.exe no specs schtasks.exe no specs #REDLINE applaunch.exe reg.exe niceprocessx32.bmp.exe no specs icacls.exe no specs setup777.exe.exe no specs random.exe.exe no specs random.exe.exe test33.bmp.exe no specs 0pbz7.exe no specs fjefrxz.exe.exe mixinte2001.bmp.exe ftp.exe no specs cmd.exe no specs cmd.exe no specs tasklist.exe no specs find.exe no specs #STOP test33.bmp.exe search_hyperfs_310.exe.exe no specs iqwqptau3c7.exe gyaqqhidi.exe rundll32.exe no specs tasklist.exe no specs find.exe no specs findstr.exe no specs congiunto.exe.pif ping.exe no specs utube2005.bmp.exe cmd.exe no specs #REDLINE strongix.exe download2.exe.exe schtasks.exe no specs invisbrowser45856.exe setup331.exe no specs msiexec.exe no specs ntvdm.exe no specs install.exe ll.exe no specs setup.exe ll.exe build2.exe no specs setup.tmp #REDLINE h2506.exe cmd.exe no specs install.exe cleaner.exe cmd.exe no specs cmd.exe no specs taskkill.exe no specs taskkill.exe no specs build2.exe tabivuz.exe no specs #AMADEY orxds.exe no specs setup.exe setup.tmp #REDLINE 1a2c2.exe gf6gb.exe control.exe no specs rundll32.exe no specs timeout.exe no specs #MINER svchost.exe 1k9d4.exe no specs forfiles.exe no specs forfiles.exe no specs cmd.exe no specs reg.exe no specs rundll32.exe no specs cmd.exe no specs reg.exe no specs svchost.exe schtasks.exe no specs congiunto.exe.pif no specs msiexec.exe no specs DllHost.exe no specs consent.exe no specs Profile Notification Host no specs PSIProfileNotify no specs DllHost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs wmiprvse.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs svchost.exe no specs werfault.exe no specs DllHost.exe no specs conhost.exe no specs werfault.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs DllHost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs DllHost.exe no specs werfault.exe no specs DllHost.exe no specs conhost.exe no specs conhost.exe no specs svchost.exe DllHost.exe no specs conhost.exe no specs werfault.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs Thumbnail Cache Class Factory for Out of Proc Server no specs searchfilterhost.exe no specs DllHost.exe no specs werfault.exe no specs conhost.exe no specs svchost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs DllHost.exe no specs taskkill.exe no specs schtasks.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs rundll32.exe Thumbnail Cache Class Factory for Out of Proc Server no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs congiunto.exe.pif no specs svmine.exe no specs taskeng.exe no specs isrgsps.exe orxds.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs #REDLINE 9817bcdf33322e8fbc1670e731c76126.exe gpupdate.exe no specs gpupdate.exe no specs conhost.exe no specs conhost.exe no specs gpscript.exe no specs gpscript.exe no specs svchost.exe no specs schtasks.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs wscript.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs conhost.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs reg.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs conhost.exe no specs reg.exe no specs reg.exe no specs conhost.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs ecygtdt.exe schtasks.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs DllHost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs schtasks.exe no specs conhost.exe no specs rundll32.exe schtasks.exe no specs conhost.exe no specs orxds.exe no specs cleaner.exe DllHost.exe no specs svchost.exe no specs werfault.exe no specs opera.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1332"C:\Program Files\Internet Explorer\iexplore.exe" "https://cdn.discordapp.com/attachments/972462409266655305/977438551669108766/File.7z?file=181.zip"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
964"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1332 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
4032"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\File.7z"C:\Program Files\WinRAR\WinRAR.exe
iexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\program files\winrar\winrar.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
116"C:\Users\admin\AppData\Local\Temp\Rar$EXb4032.31638\File.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb4032.31638\File.exeWinRAR.exe
User:
admin
Company:
ForceMin
Integrity Level:
MEDIUM
Description:
ForceMin
Exit code:
3221226540
Version:
1.3.21001.2
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb4032.31638\file.exe
c:\windows\system32\ntdll.dll
3152"C:\Users\admin\AppData\Local\Temp\Rar$EXb4032.31638\File.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb4032.31638\File.exe
WinRAR.exe
User:
admin
Company:
ForceMin
Integrity Level:
HIGH
Description:
ForceMin
Exit code:
0
Version:
1.3.21001.2
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb4032.31638\file.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
2912"C:\Users\admin\Pictures\Adobe Films\NiceProcessX32.bmp.exe" C:\Users\admin\Pictures\Adobe Films\NiceProcessX32.bmp.exe
File.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\pictures\adobe films\niceprocessx32.bmp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
3984"C:\Users\admin\Pictures\Adobe Films\Service.bmp.exe" C:\Users\admin\Pictures\Adobe Films\Service.bmp.exe
File.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\shlwapi.dll
c:\users\admin\pictures\adobe films\service.bmp.exe
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\user32.dll
2200"C:\Users\admin\Pictures\Adobe Films\Offscum.exe.exe" C:\Users\admin\Pictures\Adobe Films\Offscum.exe.exe
File.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\pictures\adobe films\offscum.exe.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2356"C:\Users\admin\Pictures\Adobe Films\rrmix.exe.exe" C:\Users\admin\Pictures\Adobe Films\rrmix.exe.exe
File.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\users\admin\pictures\adobe films\rrmix.exe.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
RedLine
(PID) Process(2356) rrmix.exe.exe
C2 (1)193.233.48.58:38989
BotnetRuzki
Err_msg
Auth_value80c38cc7772c328c028b0e4f42a3fac6
US (200)
LEnvironmentogiEnvironmentn DatEnvironmenta
Environment
WSystem.Texteb DatSystem.Texta
System.Text
CoCryptographyokieCryptographys
Cryptography
ExtGenericension CooGenerickies
Generic
OFileInfopeFileInfora GFileInfoX StabFileInfole
FileInfo
OpLinqera GLinqX
Linq
ApGenericpDaGenericta\RGenericoamiGenericng\
Network
Extension
UNKNOWN
.
1
cFileStreamredFileStreamit_cFileStreamardFileStreams
FileStream
\
Network\
Host
Port
:
User
Pass
cookies.sqlite
%USEDisposeRPROFILE%\AppDaDisposeta\LDisposeocal
Dispose
String.Replace
String.Remove
bcrFileStream.IOypt.dFileStream.IOll
FileStream.IO
BCrstring.EmptyyptOpestring.EmptynAlgorithmProvistring.Emptyder
string.Empty
BCruintyptCloseAlgorituinthmProvuintider
uint
BCrUnmanagedTypeyptDecrUnmanagedTypeypt
UnmanagedType
BCrbyte[]yptDesbyte[]troyKbyte[]ey
byte[]
BCpszPropertyryptGepszPropertytPropepszPropertyrty
pszProperty
BCEncodingryptSEncodingetPrEncodingoperEncodingty
Encoding
BCrbMasterKeyyptImbMasterKeyportKbMasterKeyey
bMasterKey
windows-1251
AES
Microsoft Primitive Provider
ChainingModeGCM
AuthTagLength
ChainingMode
ObjectLength
KeyDataBlob
-
{0}
net.tcp://
/
localhost
80c38cc7772c328c028b0e4f42a3fac6
Authorization
ns1
UNKNWON
GSYCFyEDJx0ZC11dIipaVhs2BhciLQVTGyNUUA==
ARw/WwxbBVo=
Trimming
Yandex\YaAddon
ToString
asf
*wallet*
ZmZuYmVsZmRvZWlvaGVua2ppYm5tYWRqaWVoamhhamJ8WW9yb2lXYWxsZXQKaWJuZWpkZmptbWtwY25scGVia2xtbmtvZW9paG9mZWN8VHJvbmxpbmsKamJkYW9jbmVpaWlubWpiamxnYWxoY2VsZ2Jlam1uaWR8TmlmdHlXYWxsZXQKbmtiaWhmYmVvZ2FlYW9laGxlZm5rb2RiZWZncGdrbm58TWV0YW1hc2sKYWZiY2JqcGJwZmFkbGttaG1jbGhrZWVvZG1hbWNmbGN8TWF0aFdhbGxldApobmZhbmtu...
_
T
e
l
gr
am
ex
\TeEnvironmentlegraEnvironmentm DEnvironmentesktoEnvironmentp\tdEnvironmentata
String
Replace
string.Replace
%USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng
File.Write
Handler
npvo*
%USERPserviceInterface.ExtensionROFILE%\ApserviceInterface.ExtensionpData\LocaserviceInterface.Extensionl
serviceInterface.Extension
ProldCharotonVoldCharPN
oldChar
nSystem.CollectionspvoSystem.Collections*
System.Collections
(
UNIQUE
cstringmstringd
string
/ProcessC Process
Process
|
"
Armenia
Azerbaijan
Belarus
Kazakhstan
Kyrgyzstan
Moldova
Tajikistan
Uzbekistan
Ukraine
Russia
gasdl94ja;sdiasdl94ja;s32
asdl94ja;s
Gasdl94jlajsdetDevasdl94jlajsdiceCapasdl94jlajsds
asdl94jlajsd
Width
Height
CopyFromScreen
https://api.ip.sb/ip
80
81
0.0.0.0
SELSystem.Windows.FormsECT * FRSystem.Windows.FormsOM WinSystem.Windows.Forms32_ProcSystem.Windows.Formsessor
System.Windows.Forms
Name
NumberOfCores
roSystem.Linqot\CISystem.LinqMV2
System.Linq
SELSystem.LinqECT * FRSystem.LinqOM WinSystem.Linq32_VideoCoSystem.Linqntroller
AdapterRAM
SOFTWARE\WOW6432Node\Clients\StartMenuInternet
SOFTWARE\Clients\StartMenuInternet
shell\open\command
Unknown Version
SELESystem.ManagementCT * FRSystem.ManagementOM WiSystem.Managementn32_DisSystem.ManagementkDrivSystem.Managemente
System.Management
SerialNumber
SELSystem.Text.RegularExpressionsECT * FRSystem.Text.RegularExpressionsOM Win32_PSystem.Text.RegularExpressionsrocess WSystem.Text.RegularExpressionshere SessSystem.Text.RegularExpressionsionId='
'
FileSystem
SSystem.ELECT * FRSystem.OM WiSystem.n32_ProcSystem.ess WherSystem.e SessiSystem.onId='
System.
ExecutablePath
[
]
Concat0 MConcatb oConcatr Concat0
Concat
SELEMemoryCT * FMemoryROM WiMemoryn32_OperMemoryatingSMemoryystem
Memory
{0}{1}{2}
x32
x64
x86
SOFTWARE\Microsoft\Windows NT\CurrentVersion
ProductName
CSDVersion
Unknown
_[
System.Core, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
System.Security.Cryptography.AesCryptoServiceProvider
9b0k‰•‘˜gil4ep7Ž†.rmtpkx’ubžprxrd9
{11111-22222-10009-11111}
{11111-22222-50001-00000}
GetDelegateForFunctionPointer
švŸ4wb—21iq4l—82.Ÿv4a4Ž4yl6‡žŠtx
m_ptr
System.Reflection.RuntimeModule
m_pData
clrjit.dll
System.Reflection.ReflectionContext
__
file:///
Location
Find
ResourceA
Virtual
Alloc
Write
Process
Protect
Open
Close
Handle
kernel
32.dll
{11111-22222-10001-00001}
{11111-22222-10001-00002}
{11111-22222-20001-00001}
{11111-22222-20001-00002}
{11111-22222-40001-00001}
{11111-22222-40001-00002}
{11111-22222-50001-00001}
{11111-22222-50001-00002}
2496"C:\Users\admin\Pictures\Adobe Films\SetupMEXX.exe.exe" C:\Users\admin\Pictures\Adobe Films\SetupMEXX.exe.exe
File.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\pictures\adobe films\setupmexx.exe.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
Total events
128 199
Read events
126 342
Write events
0
Delete events
0

Modification events

No data
Executable files
118
Suspicious files
135
Text files
168
Unknown types
62

Dropped files

PID
Process
Filename
Type
1332iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\File.7zcompressed
MD5:4BAE0558EF80F6E0522E7A0F9FC9F782
SHA256:2278C8C48B2BF0E8080776FB52F09DF454454F4731E322174EBDC3E622D3E102
1332iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFA3BACC2551A769D2.TMPgmc
MD5:FDB1A76553F84CBB680AA10CD10A03F3
SHA256:F2EF4B6EF5D006535CD234B47F1BA33F7FFE2267978634AFED3E05264CC70D08
1332iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8Fder
MD5:5C1113B7526A7723B64400D44129FA78
SHA256:9ECC27C740862AB2712DA2C4FF31592E2C0A8643576E64551EE344A73FBE2494
964iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\File.7z.6hl2w22.partialcompressed
MD5:4BAE0558EF80F6E0522E7A0F9FC9F782
SHA256:2278C8C48B2BF0E8080776FB52F09DF454454F4731E322174EBDC3E622D3E102
1332iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{610823CE-D8CE-11EC-8C9F-1203334A04AF}.datbinary
MD5:F7F68AB8F8B7ECB5E22E69FD480A5854
SHA256:0FDB6EB7B7F68B180ADE1CF9E2BFC9C8D40331959E71AF2F789D7086B2176C5C
1332iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{579430FB-D8CE-11EC-8C9F-1203334A04AF}.datbinary
MD5:AF2A32167EA10127915FA80C355A8AEC
SHA256:5517F4D521B91BC76230AFDAD4EF1A1F8CB0C8E5CD58C81A4521D60F0AFC56D7
1332iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:FB556B29CF85FEBA074A7A9C533A9DD5
SHA256:A5C3DA1D77363370C17378DE40A54362C8FAD5E0CEDE1FEFD4AFF6C8BC3D9439
964iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\File[1].7zcompressed
MD5:4BAE0558EF80F6E0522E7A0F9FC9F782
SHA256:2278C8C48B2BF0E8080776FB52F09DF454454F4731E322174EBDC3E622D3E102
1332iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:2882B4E1BCD1DC9B6E11CE82EA02AD8A
SHA256:F6BBA592ECC53DC92CE56A2D83E1F96EAA60ADD54E53BA13983260C79F502285
1332iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
133
TCP/UDP connections
335
DNS requests
105
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3152
File.exe
HEAD
200
45.144.225.57:80
http://45.144.225.57/download/Service.bmp
unknown
malicious
3152
File.exe
HEAD
200
45.144.225.57:80
http://45.144.225.57/download/NiceProcessX32.bmp
unknown
malicious
3152
File.exe
HEAD
200
193.233.48.74:80
http://193.233.48.74/rrmix.exe
RU
suspicious
3152
File.exe
GET
400
212.193.30.45:80
http://212.193.30.45/proxies.txt
RU
html
301 b
malicious
1332
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
1332
iexplore.exe
GET
200
93.184.220.29:80
http://crl3.digicert.com/Omniroot2025.crl
US
der
7.78 Kb
whitelisted
3152
File.exe
GET
200
212.193.30.21:80
http://212.193.30.21/base/api/statistics.php
RU
binary
94 b
malicious
1332
iexplore.exe
GET
200
95.140.236.0:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?47b6269f74ea1b6f
GB
compressed
4.70 Kb
whitelisted
3152
File.exe
GET
200
45.144.225.57:80
http://45.144.225.57/download/NiceProcessX32.bmp
unknown
executable
259 Kb
malicious
3152
File.exe
POST
200
212.193.30.21:80
http://212.193.30.21/base/api/getData.php
RU
text
108 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1332
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1332
iexplore.exe
95.140.236.0:80
ctldl.windowsupdate.com
Limelight Networks, Inc.
GB
whitelisted
964
iexplore.exe
162.159.130.233:443
cdn.discordapp.com
Cloudflare Inc
shared
964
iexplore.exe
162.159.134.233:443
cdn.discordapp.com
Cloudflare Inc
shared
3152
File.exe
212.193.30.45:80
RU
malicious
1332
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
1332
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3152
File.exe
45.144.225.57:80
malicious
3152
File.exe
212.193.30.21:80
RU
malicious
3152
File.exe
162.159.134.233:80
cdn.discordapp.com
Cloudflare Inc
shared

DNS requests

Domain
IP
Reputation
cdn.discordapp.com
  • 162.159.134.233
  • 162.159.130.233
  • 162.159.129.233
  • 162.159.135.233
  • 162.159.133.233
shared
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 95.140.236.0
  • 67.27.157.126
  • 8.248.141.254
  • 8.241.121.254
  • 8.248.147.254
  • 67.27.159.126
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
crl3.digicert.com
  • 93.184.220.29
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
pastebin.com
  • 104.20.67.143
  • 172.67.34.170
  • 104.20.68.143
shared
ipinfo.io
  • 34.117.59.81
shared

Threats

PID
Process
Class
Message
964
iexplore.exe
Misc activity
ET INFO Observed Discord Domain (discordapp .com in TLS SNI)
964
iexplore.exe
Misc activity
ET INFO Observed Discord Domain (discordapp .com in TLS SNI)
3152
File.exe
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
3152
File.exe
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
3152
File.exe
Generic Protocol Command Decode
SURICATA Applayer Mismatch protocol both directions
3152
File.exe
Misc activity
ET INFO Observed Discord Domain (discordapp .com in TLS SNI)
3152
File.exe
Generic Protocol Command Decode
SURICATA Applayer Mismatch protocol both directions
3152
File.exe
Misc activity
ET INFO Observed Discord Domain (discordapp .com in TLS SNI)
3152
File.exe
Misc activity
ET INFO Observed Discord Domain (discordapp .com in TLS SNI)
3152
File.exe
A Network Trojan was detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
214 ETPRO signatures available at the full report
No debug info