Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.
Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.
Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.
RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.
Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.
Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.
ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
Launch configuration
Task duration:
300 seconds
Heavy Evasion option:
off
Network geolocation:
off
Additional time used:
240 seconds
MITM proxy:
off
Privacy:
Public submission
Fakenet option:
off
Route via Tor:
off
Autoconfirmation of UAC:
on
Network:
on
Software preset
Internet Explorer 11.0.9600.19596 KB4534251
Adobe Acrobat Reader DC (20.013.20064)
Adobe Flash Player 32 ActiveX (32.0.0.453)
Adobe Flash Player 32 NPAPI (32.0.0.453)
Adobe Flash Player 32 PPAPI (32.0.0.453)
Adobe Refresh Manager (1.8.0)
CCleaner (5.74)
FileZilla Client 3.51.0 (3.51.0)
Google Chrome (86.0.4240.198)
Google Update Helper (1.3.36.31)
Java 8 Update 271 (8.0.2710.9)
Java Auto Updater (2.8.271.9)
Microsoft .NET Framework 4.5.2 (4.5.51209)
Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Access MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Access MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Excel MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Excel MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Groove MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Groove MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office IME (Japanese) 2010 (14.0.4763.1000)
Microsoft Office IME (Korean) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (French) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (German) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office InfoPath MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Language Pack 2010 - French/Français (14.0.4763.1000)
Microsoft Office Language Pack 2010 - German/Deutsch (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Italian/Italiano (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Japanese/日本語 (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Korean/한국어 (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Portuguese/Português (Brasil) (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Russian/русский (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Spanish/Español (14.0.4763.1000)
Microsoft Office Language Pack 2010 - Turkish/Türkçe (14.0.4763.1013)
Microsoft Office O MUI (French) 2010 (14.0.4763.1000)
Microsoft Office O MUI (German) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office O MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
Microsoft Office OneNote MUI (French) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (German) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office OneNote MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Outlook MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Outlook MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
Microsoft Office PowerPoint MUI (French) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (German) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office PowerPoint MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Professional 2010 (14.0.6029.1000)
Microsoft Office Proof (Arabic) 2010 (14.0.4763.1000)
Microsoft Office Proof (Basque) 2010 (14.0.4763.1000)
Microsoft Office Proof (Catalan) 2010 (14.0.4763.1000)
Microsoft Office Proof (Dutch) 2010 (14.0.4763.1000)
Microsoft Office Proof (English) 2010 (14.0.6029.1000)
Microsoft Office Proof (French) 2010 (14.0.6029.1000)
Microsoft Office Proof (Galician) 2010 (14.0.4763.1000)
Microsoft Office Proof (German) 2010 (14.0.4763.1000)
Microsoft Office Proof (Italian) 2010 (14.0.4763.1000)
Microsoft Office Proof (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Proof (Korean) 2010 (14.0.4763.1000)
Microsoft Office Proof (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Proof (Russian) 2010 (14.0.4763.1000)
Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
Microsoft Office Proof (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Proof (Ukrainian) 2010 (14.0.4763.1000)
Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
Microsoft Office Proofing (French) 2010 (14.0.4763.1000)
Microsoft Office Proofing (German) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Italian) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Korean) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Russian) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Proofing (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Publisher MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Publisher MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office SharePoint Designer MUI (French) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (German) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office SharePoint Designer MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Shared MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Shared MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Single Image 2010 (14.0.6029.1000)
Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
Microsoft Office Word MUI (French) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (German) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office Word MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Office X MUI (French) 2010 (14.0.4763.1000)
Microsoft Office X MUI (German) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Italian) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Japanese) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Korean) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Russian) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Spanish) 2010 (14.0.4763.1000)
Microsoft Office X MUI (Turkish) 2010 (14.0.4763.1013)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
Microsoft Visual C++ 2015-2019 Redistributable (x86) - 14.21.27702 (14.21.27702.2)
Microsoft Visual C++ 2019 X86 Additional Runtime - 14.21.27702 (14.21.27702)
Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.21.27702 (14.21.27702)
Mozilla Firefox 83.0 (x86 en-US) (83.0)
Mozilla Maintenance Service (83.0.0.7621)
Notepad++ (32-bit x86) (7.9.1)
Opera 12.15 (12.15.1748)
QGA (2.14.33)
Skype version 8.29 (8.29)
VLC media player (3.0.11)
WinRAR 5.91 (32-bit) (5.91.0)
Hotfixes
Client LanguagePack Package
Client Refresh LanguagePack Package
CodecPack Basic Package
Foundation Package
IE Hyphenation Parent Package English
IE Spelling Parent Package English
IE Troubleshooters Package
InternetExplorer Optional Package
InternetExplorer Package TopLevel
KB2479943
KB2491683
KB2506212
KB2506928
KB2532531
KB2533552
KB2533623
KB2534111
KB2545698
KB2547666
KB2552343
KB2560656
KB2564958
KB2574819
KB2579686
KB2585542
KB2604115
KB2620704
KB2621440
KB2631813
KB2639308
KB2640148
KB2653956
KB2654428
KB2656356
KB2660075
KB2667402
KB2676562
KB2685811
KB2685813
KB2685939
KB2690533
KB2698365
KB2705219
KB2719857
KB2726535
KB2727528
KB2729094
KB2729452
KB2731771
KB2732059
KB2736422
KB2742599
KB2750841
KB2758857
KB2761217
KB2770660
KB2773072
KB2786081
KB2789645
KB2799926
KB2800095
KB2807986
KB2808679
KB2813347
KB2813430
KB2820331
KB2834140
KB2836942
KB2836943
KB2840631
KB2843630
KB2847927
KB2852386
KB2853952
KB2857650
KB2861698
KB2862152
KB2862330
KB2862335
KB2864202
KB2868038
KB2871997
KB2872035
KB2884256
KB2891804
KB2893294
KB2893519
KB2894844
KB2900986
KB2908783
KB2911501
KB2912390
KB2918077
KB2919469
KB2923545
KB2931356
KB2937610
KB2943357
KB2952664
KB2968294
KB2970228
KB2972100
KB2972211
KB2973112
KB2973201
KB2977292
KB2978120
KB2978742
KB2984972
KB2984976
KB2984976 SP1
KB2985461
KB2991963
KB2992611
KB2999226
KB3004375
KB3006121
KB3006137
KB3010788
KB3011780
KB3013531
KB3019978
KB3020370
KB3020388
KB3021674
KB3021917
KB3022777
KB3023215
KB3030377
KB3031432
KB3035126
KB3037574
KB3042058
KB3045685
KB3046017
KB3046269
KB3054476
KB3055642
KB3059317
KB3060716
KB3061518
KB3067903
KB3068708
KB3071756
KB3072305
KB3074543
KB3075226
KB3078667
KB3080149
KB3086255
KB3092601
KB3093513
KB3097989
KB3101722
KB3102429
KB3102810
KB3107998
KB3108371
KB3108664
KB3109103
KB3109560
KB3110329
KB3115858
KB3118401
KB3122648
KB3123479
KB3126587
KB3127220
KB3133977
KB3137061
KB3138378
KB3138612
KB3138910
KB3139398
KB3139914
KB3140245
KB3147071
KB3150220
KB3150513
KB3155178
KB3156016
KB3159398
KB3161102
KB3161949
KB3170735
KB3172605
KB3179573
KB3184143
KB3185319
KB4019990
KB4040980
KB4474419
KB4490628
KB4524752
KB4532945
KB4536952
KB4567409
KB958488
KB976902
KB982018
LocalPack AU Package
LocalPack CA Package
LocalPack GB Package
LocalPack US Package
LocalPack ZA Package
Package 21 for KB2984976
Package 38 for KB2984976
Package 45 for KB2984976
Package 59 for KB2984976
Package 7 for KB2984976
Package 76 for KB2984976
PlatformUpdate Win7 SRV08R2 Package TopLevel
ProfessionalEdition
RDP BlueIP Package TopLevel
RDP WinIP Package TopLevel
RollupFix
UltimateEdition
WUClient SelfUpdate ActiveX
WUClient SelfUpdate Aux TopLevel
WUClient SelfUpdate Core TopLevel
WinMan WinIP Package TopLevel
MALICIOUS
Drops executable file immediately after starts
WinRAR.exe (PID: 4032)
NiceProcessX32.bmp.exe (PID: 2912)
File.exe (PID: 3152)
13.php.exe (PID: 1832)
cmd.exe (PID: 3916)
Service.bmp.exe (PID: 3984)
fxdd.bmp.exe (PID: 1000)
hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
test33.bmp.exe (PID: 908)
mixinte2001.bmp.exe (PID: 4008)
random.exe.exe (PID: 3272)
real2001.bmp.exe (PID: 2268)
test33.bmp.exe (PID: 1036)
IQwqPtAU3c7.exe (PID: 2464)
gYaqqhiDI.exe (PID: 2736)
download2.exe.exe (PID: 4084)
utube2005.bmp.exe (PID: 3752)
setup.exe (PID: 3132)
TrdngAnlzr22649.exe.exe (PID: 2660)
Install.exe (PID: 2208)
setup.tmp (PID: 1256)
setup.exe (PID: 3984)
setup.tmp (PID: 3064)
Congiunto.exe.pif (PID: 3480)
orxds.exe (PID: 1208)
build2.exe (PID: 2656)
GF6GB.exe (PID: 3316)
Install.exe (PID: 1808)
Congiunto.exe.pif (PID: 3756)
AppLaunch.exe (PID: 1600)
lokes_1.bmp.exe (PID: 3928)
IsrGSPs.exe (PID: 5912)
eCYGTdT.exe (PID: 4528)
Changes settings of System certificates
File.exe (PID: 3152)
Service.bmp.exe (PID: 3984)
test33.bmp.exe (PID: 908)
wam.exe.exe (PID: 1104)
svchost.exe (PID: 2468)
Application was dropped or rewritten from another process
File.exe (PID: 3152)
File.exe (PID: 116)
NiceProcessX32.bmp.exe (PID: 2912)
Service.bmp.exe (PID: 3984)
13.php.exe (PID: 1832)
SetupMEXX.exe.exe (PID: 2496)
Offscum.exe.exe (PID: 2200)
rrmix.exe.exe (PID: 2356)
file1.exe.exe (PID: 1980)
wam.exe.exe (PID: 1104)
mxsfsaaa.exe (PID: 2428)
6523.exe.exe (PID: 2548)
FJEfRXZ.exe.exe (PID: 1048)
prolivv.bmp.exe (PID: 2336)
test33.bmp.exe (PID: 3676)
real2001.bmp.exe (PID: 2268)
mixinte2001.bmp.exe (PID: 4008)
olympteam_build_crypted_2.bmp.exe (PID: 2420)
test33.bmp.exe (PID: 908)
norm2.bmp.exe (PID: 2552)
hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
fxdd.bmp.exe (PID: 1000)
lokes_1.bmp.exe (PID: 3928)
unmatured.bmp.exe (PID: 2120)
arabcode_crypted_3.bmp.exe (PID: 1224)
ShortnessUnsol.bmp.exe (PID: 3108)
Fenix_7.bmp.exe (PID: 3744)
orxds.exe (PID: 1208)
TrdngAnlzr22649.exe.exe (PID: 2660)
NiceProcessX32.bmp.exe (PID: 2380)
setup777.exe.exe (PID: 780)
random.exe.exe (PID: 1972)
test33.bmp.exe (PID: 3972)
random.exe.exe (PID: 3272)
0pbZ7.exe (PID: 3020)
FJEfRXZ.exe.exe (PID: 4044)
mixinte2001.bmp.exe (PID: 2448)
test33.bmp.exe (PID: 1036)
IQwqPtAU3c7.exe (PID: 2464)
search_hyperfs_310.exe.exe (PID: 2168)
gYaqqhiDI.exe (PID: 2736)
utube2005.bmp.exe (PID: 3752)
strongix.exe (PID: 2548)
Install.exe (PID: 2208)
ll.exe (PID: 1764)
ll.exe (PID: 2516)
build2.exe (PID: 2664)
download2.exe.exe (PID: 4084)
H2506.exe (PID: 3244)
Cleaner.exe (PID: 2416)
setup331.exe (PID: 4092)
setup.exe (PID: 3132)
Install.exe (PID: 1808)
InvisBrowser45856.exe (PID: 2064)
build2.exe (PID: 2656)
Tabivuz.exe (PID: 1312)
orxds.exe (PID: 3348)
setup.exe (PID: 3984)
1A2C2.exe (PID: 2124)
GF6GB.exe (PID: 3316)
1K9D4.exe (PID: 1292)
svmine.exe (PID: 3592)
orxds.exe (PID: 5952)
IsrGSPs.exe (PID: 5912)
9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
eCYGTdT.exe (PID: 4528)
orxds.exe (PID: 4612)
Cleaner.exe (PID: 4732)
Disables Windows Defender
File.exe (PID: 3152)
hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
SOCELARS was detected
File.exe (PID: 3152)
hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
Connects to CnC server
File.exe (PID: 3152)
Offscum.exe.exe (PID: 2200)
rrmix.exe.exe (PID: 2356)
AppLaunch.exe (PID: 916)
AppLaunch.exe (PID: 3712)
Service.bmp.exe (PID: 3984)
SetupMEXX.exe.exe (PID: 2496)
Fenix_7.bmp.exe (PID: 3744)
AppLaunch.exe (PID: 3564)
hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
AppLaunch.exe (PID: 1600)
orxds.exe (PID: 1208)
lokes_1.bmp.exe (PID: 3928)
ShortnessUnsol.bmp.exe (PID: 3108)
svchost.exe (PID: 3296)
strongix.exe (PID: 2548)
rundll32.exe (PID: 5772)
H2506.exe (PID: 3244)
1A2C2.exe (PID: 2124)
9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
REDLINE was detected
Offscum.exe.exe (PID: 2200)
rrmix.exe.exe (PID: 2356)
AppLaunch.exe (PID: 916)
AppLaunch.exe (PID: 3712)
SetupMEXX.exe.exe (PID: 2496)
Fenix_7.bmp.exe (PID: 3744)
AppLaunch.exe (PID: 3564)
AppLaunch.exe (PID: 1600)
lokes_1.bmp.exe (PID: 3928)
ShortnessUnsol.bmp.exe (PID: 3108)
strongix.exe (PID: 2548)
H2506.exe (PID: 3244)
1A2C2.exe (PID: 2124)
9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
Actions looks like stealing of personal data
Offscum.exe.exe (PID: 2200)
rrmix.exe.exe (PID: 2356)
AppLaunch.exe (PID: 3712)
Fenix_7.bmp.exe (PID: 3744)
ShortnessUnsol.bmp.exe (PID: 3108)
SetupMEXX.exe.exe (PID: 2496)
AppLaunch.exe (PID: 916)
AppLaunch.exe (PID: 1600)
real2001.bmp.exe (PID: 2268)
lokes_1.bmp.exe (PID: 3928)
download2.exe.exe (PID: 4084)
InvisBrowser45856.exe (PID: 2064)
setup.tmp (PID: 1256)
svchost.exe (PID: 2468)
rundll32.exe (PID: 5772)
build2.exe (PID: 2656)
AppLaunch.exe (PID: 3564)
H2506.exe (PID: 3244)
strongix.exe (PID: 2548)
1A2C2.exe (PID: 2124)
9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
eCYGTdT.exe (PID: 4528)
Steals credentials from Web Browsers
Offscum.exe.exe (PID: 2200)
rrmix.exe.exe (PID: 2356)
AppLaunch.exe (PID: 3712)
Fenix_7.bmp.exe (PID: 3744)
ShortnessUnsol.bmp.exe (PID: 3108)
real2001.bmp.exe (PID: 2268)
AppLaunch.exe (PID: 1600)
lokes_1.bmp.exe (PID: 3928)
svchost.exe (PID: 2468)
build2.exe (PID: 2656)
strongix.exe (PID: 2548)
AppLaunch.exe (PID: 916)
SetupMEXX.exe.exe (PID: 2496)
AppLaunch.exe (PID: 3564)
1A2C2.exe (PID: 2124)
H2506.exe (PID: 3244)
9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
eCYGTdT.exe (PID: 4528)
Changes the autorun value in the registry
FJEfRXZ.exe.exe (PID: 1048)
test33.bmp.exe (PID: 908)
FJEfRXZ.exe.exe (PID: 4044)
GF6GB.exe (PID: 3316)
Uses SVCHOST.EXE for hidden code execution
mxsfsaaa.exe (PID: 2428)
svchost.exe (PID: 2652)
Runs app for hidden code execution
cmd.exe (PID: 2144)
cmd.exe (PID: 2844)
Uses TASKLIST.EXE to query information about running processes
cmd.exe (PID: 4056)
cmd.exe (PID: 2116)
Runs PING.EXE for delay simulation
cmd.exe (PID: 4056)
cmd.exe (PID: 2116)
REDLINE detected by memory dumps
rrmix.exe.exe (PID: 2356)
AppLaunch.exe (PID: 916)
AppLaunch.exe (PID: 3712)
norm2.bmp.exe (PID: 2552)
AppLaunch.exe (PID: 2584)
AppLaunch.exe (PID: 3564)
AppLaunch.exe (PID: 1600)
9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
Uses Task Scheduler to run other applications
Service.bmp.exe (PID: 3984)
Service.bmp.exe (PID: 3984)
orxds.exe (PID: 1208)
cmd.exe (PID: 3584)
Install.exe (PID: 1808)
IsrGSPs.exe (PID: 5912)
eCYGTdT.exe (PID: 4528)
eCYGTdT.exe (PID: 4528)
rundll32.EXE (PID: 2880)
TOFSEE detected by memory dumps
svchost.exe (PID: 2652)
Loads the Task Scheduler COM API
schtasks.exe (PID: 2352)
schtasks.exe (PID: 2632)
schtasks.exe (PID: 3220)
test33.bmp.exe (PID: 908)
test33.bmp.exe (PID: 1036)
schtasks.exe (PID: 3048)
schtasks.exe (PID: 4748)
schtasks.exe (PID: 1760)
schtasks.exe (PID: 5336)
schtasks.exe (PID: 2804)
schtasks.exe (PID: 3328)
svchost.exe (PID: 872)
schtasks.exe (PID: 1576)
schtasks.exe (PID: 5900)
schtasks.exe (PID: 4076)
schtasks.exe (PID: 5068)
schtasks.exe (PID: 2052)
schtasks.exe (PID: 4872)
schtasks.exe (PID: 5368)
schtasks.exe (PID: 5444)
schtasks.exe (PID: 3620)
schtasks.exe (PID: 4568)
schtasks.exe (PID: 2268)
schtasks.exe (PID: 3048)
schtasks.exe (PID: 4080)
Changes the Startup folder
reg.exe (PID: 3992)
AMADEY was detected
orxds.exe (PID: 1208)
AMADEY detected by memory dumps
orxds.exe (PID: 1208)
orxds.exe (PID: 3348)
Loads dropped or rewritten executable
rundll32.exe (PID: 2172)
real2001.bmp.exe (PID: 2268)
Cleaner.exe (PID: 2416)
rundll32.exe (PID: 3444)
fxdd.bmp.exe (PID: 1000)
conhost.exe (PID: 2952)
DllHost.exe (PID: 2268)
msiexec.exe (PID: 572)
iexplore.exe (PID: 1332)
setup331.exe (PID: 4092)
13.php.exe (PID: 1832)
DllHost.exe (PID: 832)
Service.bmp.exe (PID: 3984)
build2.exe (PID: 2656)
conhost.exe (PID: 3912)
cmd.exe (PID: 4000)
reg.exe (PID: 3992)
iexplore.exe (PID: 964)
ntvdm.exe (PID: 3160)
test33.bmp.exe (PID: 1036)
WerFault.exe (PID: 3608)
DllHost.exe (PID: 148)
AppLaunch.exe (PID: 3564)
rrmix.exe.exe (PID: 2356)
svchost.exe (PID: 2468)
NiceProcessX32.bmp.exe (PID: 2912)
cmd.exe (PID: 3920)
File.exe (PID: 3152)
schtasks.exe (PID: 2352)
cmd.exe (PID: 2844)
File.exe (PID: 116)
schtasks.exe (PID: 4748)
forfiles.exe (PID: 1024)
search_hyperfs_310.exe.exe (PID: 2168)
Offscum.exe.exe (PID: 2200)
file1.exe.exe (PID: 1980)
sc.exe (PID: 3516)
conhost.exe (PID: 3780)
cmd.exe (PID: 3980)
WinRAR.exe (PID: 4032)
conhost.exe (PID: 3452)
conhost.exe (PID: 3180)
ll.exe (PID: 2516)
conhost.exe (PID: 4004)
tasklist.exe (PID: 3136)
conhost.exe (PID: 2348)
consent.exe (PID: 3044)
Congiunto.exe.pif (PID: 3756)
orxds.exe (PID: 3348)
DllHost.exe (PID: 2288)
unmatured.bmp.exe (PID: 2120)
Install.exe (PID: 1808)
Install.exe (PID: 2208)
cmd.exe (PID: 3916)
mxsfsaaa.exe (PID: 2428)
conhost.exe (PID: 2968)
find.exe (PID: 3472)
DllHost.exe (PID: 3668)
conhost.exe (PID: 2392)
FJEfRXZ.exe.exe (PID: 1048)
cmd.exe (PID: 3120)
prolivv.bmp.exe (PID: 2336)
cmd.exe (PID: 3584)
svchost.exe (PID: 2652)
findstr.exe (PID: 3068)
AppLaunch.exe (PID: 2584)
mixinte2001.bmp.exe (PID: 2448)
wmiprvse.exe (PID: 2852)
svchost.exe (PID: 2420)
AppLaunch.exe (PID: 3712)
Fenix_7.bmp.exe (PID: 3744)
cmd.exe (PID: 2768)
TrdngAnlzr22649.exe.exe (PID: 2660)
conhost.exe (PID: 2580)
conhost.exe (PID: 3780)
conhost.exe (PID: 2068)
conhost.exe (PID: 2340)
schtasks.exe (PID: 3220)
AppLaunch.exe (PID: 916)
cmd.exe (PID: 2116)
taskkill.exe (PID: 3088)
ftp.exe (PID: 3636)
DllHost.exe (PID: 3360)
control.exe (PID: 1340)
cmd.exe (PID: 1556)
build2.exe (PID: 2664)
conhost.exe (PID: 4056)
find.exe (PID: 2528)
6523.exe.exe (PID: 2548)
schtasks.exe (PID: 2632)
random.exe.exe (PID: 1972)
ShortnessUnsol.bmp.exe (PID: 3108)
H2506.exe (PID: 3244)
arabcode_crypted_3.bmp.exe (PID: 1224)
ll.exe (PID: 1764)
WerFault.exe (PID: 1760)
IQwqPtAU3c7.exe (PID: 2464)
conhost.exe (PID: 2536)
conhost.exe (PID: 852)
reg.exe (PID: 3132)
SetupMEXX.exe.exe (PID: 2496)
cmd.exe (PID: 2144)
norm2.bmp.exe (PID: 2552)
DllHost.exe (PID: 1812)
DllHost.exe (PID: 2560)
orxds.exe (PID: 1208)
setup.exe (PID: 3132)
taskkill.exe (PID: 2964)
DllHost.exe (PID: 2480)
1A2C2.exe (PID: 2124)
svchost.exe (PID: 3296)
findstr.exe (PID: 3364)
tasklist.exe (PID: 3156)
InvisBrowser45856.exe (PID: 2064)
icacls.exe (PID: 3256)
hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
tasklist.exe (PID: 2680)
1K9D4.exe (PID: 1292)
FJEfRXZ.exe.exe (PID: 4044)
netsh.exe (PID: 584)
find.exe (PID: 2724)
mixinte2001.bmp.exe (PID: 4008)
find.exe (PID: 604)
Congiunto.exe.pif (PID: 3480)
NiceProcessX32.bmp.exe (PID: 2380)
conhost.exe (PID: 3372)
lokes_1.bmp.exe (PID: 3928)
olympteam_build_crypted_2.bmp.exe (PID: 2420)
conhost.exe (PID: 3516)
SearchFilterHost.exe (PID: 1148)
WerFault.exe (PID: 3912)
WerFault.exe (PID: 2108)
WerFault.exe (PID: 2248)
test33.bmp.exe (PID: 908)
schtasks.exe (PID: 3048)
DllHost.exe (PID: 2384)
utube2005.bmp.exe (PID: 3752)
test33.bmp.exe (PID: 3676)
download2.exe.exe (PID: 4084)
conhost.exe (PID: 3176)
strongix.exe (PID: 2548)
DllHost.exe (PID: 2480)
conhost.exe (PID: 3660)
conhost.exe (PID: 2956)
cmd.exe (PID: 4056)
cmd.exe (PID: 2364)
timeout.exe (PID: 3956)
random.exe.exe (PID: 3272)
rundll32.exe (PID: 2192)
sc.exe (PID: 3372)
tasklist.exe (PID: 3720)
PING.EXE (PID: 3484)
reg.exe (PID: 2696)
test33.bmp.exe (PID: 3972)
conhost.exe (PID: 2964)
setup.exe (PID: 3984)
conhost.exe (PID: 456)
conhost.exe (PID: 3988)
PING.EXE (PID: 3668)
sc.exe (PID: 3824)
conhost.exe (PID: 2760)
AppLaunch.exe (PID: 1600)
ftp.exe (PID: 2476)
0pbZ7.exe (PID: 3020)
conhost.exe (PID: 4804)
gYaqqhiDI.exe (PID: 2736)
setup777.exe.exe (PID: 780)
forfiles.exe (PID: 2300)
conhost.exe (PID: 2424)
conhost.exe (PID: 3524)
msiexec.exe (PID: 5684)
svchost.exe (PID: 148)
wam.exe.exe (PID: 1104)
GF6GB.exe (PID: 3316)
conhost.exe (PID: 1544)
DllHost.exe (PID: 4104)
cmd.exe (PID: 752)
conhost.exe (PID: 1384)
Tabivuz.exe (PID: 1312)
taskkill.exe (PID: 1204)
schtasks.exe (PID: 1760)
Congiunto.exe.pif (PID: 4816)
powershell.EXE (PID: 5144)
conhost.exe (PID: 5424)
rundll32.exe (PID: 5772)
DllHost.exe (PID: 2044)
schtasks.exe (PID: 5336)
conhost.exe (PID: 5360)
conhost.exe (PID: 5912)
schtasks.exe (PID: 5672)
svmine.exe (PID: 3592)
taskeng.exe (PID: 5784)
IsrGSPs.exe (PID: 5912)
orxds.exe (PID: 5952)
schtasks.exe (PID: 2804)
conhost.exe (PID: 1412)
schtasks.exe (PID: 3328)
conhost.exe (PID: 1940)
Congiunto.exe.pif (PID: 1540)
conhost.exe (PID: 4360)
powershell.EXE (PID: 4156)
9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
gpupdate.exe (PID: 5808)
conhost.exe (PID: 5876)
gpupdate.exe (PID: 5800)
conhost.exe (PID: 6048)
gpscript.exe (PID: 4068)
gpscript.exe (PID: 4196)
schtasks.exe (PID: 1576)
cmd.exe (PID: 4024)
svchost.exe (PID: 5280)
conhost.exe (PID: 4128)
conhost.exe (PID: 5000)
reg.exe (PID: 5124)
cmd.exe (PID: 5132)
cmd.exe (PID: 3812)
conhost.exe (PID: 2732)
reg.exe (PID: 2164)
reg.exe (PID: 5944)
conhost.exe (PID: 5440)
reg.exe (PID: 920)
conhost.exe (PID: 5768)
conhost.exe (PID: 5240)
reg.exe (PID: 6032)
wscript.exe (PID: 5416)
reg.exe (PID: 5996)
conhost.exe (PID: 4228)
conhost.exe (PID: 3504)
conhost.exe (PID: 1340)
reg.exe (PID: 4404)
reg.exe (PID: 3432)
conhost.exe (PID: 3004)
conhost.exe (PID: 2544)
reg.exe (PID: 3048)
reg.exe (PID: 2196)
reg.exe (PID: 1828)
conhost.exe (PID: 4220)
reg.exe (PID: 1204)
conhost.exe (PID: 2036)
reg.exe (PID: 4300)
conhost.exe (PID: 3192)
conhost.exe (PID: 4744)
reg.exe (PID: 2444)
conhost.exe (PID: 4924)
conhost.exe (PID: 2588)
conhost.exe (PID: 940)
reg.exe (PID: 4216)
reg.exe (PID: 4888)
reg.exe (PID: 5216)
conhost.exe (PID: 3712)
reg.exe (PID: 5460)
conhost.exe (PID: 2788)
schtasks.exe (PID: 3096)
conhost.exe (PID: 4312)
schtasks.exe (PID: 5900)
conhost.exe (PID: 5828)
eCYGTdT.exe (PID: 4528)
cmd.exe (PID: 4084)
schtasks.exe (PID: 4076)
conhost.exe (PID: 2268)
conhost.exe (PID: 3352)
reg.exe (PID: 1948)
cmd.exe (PID: 4148)
conhost.exe (PID: 2664)
reg.exe (PID: 2336)
schtasks.exe (PID: 4336)
conhost.exe (PID: 4348)
conhost.exe (PID: 5084)
conhost.exe (PID: 1856)
schtasks.exe (PID: 5068)
schtasks.exe (PID: 2052)
conhost.exe (PID: 5188)
schtasks.exe (PID: 4872)
schtasks.exe (PID: 5368)
conhost.exe (PID: 2428)
conhost.exe (PID: 5308)
schtasks.exe (PID: 5444)
schtasks.exe (PID: 3620)
conhost.exe (PID: 5636)
DllHost.exe (PID: 5856)
conhost.exe (PID: 3312)
schtasks.exe (PID: 4568)
schtasks.exe (PID: 4812)
conhost.exe (PID: 4116)
schtasks.exe (PID: 2268)
conhost.exe (PID: 1412)
cmd.exe (PID: 4236)
conhost.exe (PID: 4876)
conhost.exe (PID: 5336)
reg.exe (PID: 4448)
cmd.exe (PID: 4484)
schtasks.exe (PID: 3048)
reg.exe (PID: 5876)
rundll32.EXE (PID: 2880)
conhost.exe (PID: 4784)
conhost.exe (PID: 5240)
schtasks.exe (PID: 4080)
orxds.exe (PID: 4612)
Cleaner.exe (PID: 4732)
DllHost.exe (PID: 1576)
WerFault.exe (PID: 2020)
svchost.exe (PID: 1204)
opera.exe (PID: 5440)
Runs injected code in another process
rundll32.exe (PID: 2172)
rundll32.exe (PID: 3444)
Application was injected by another process
svchost.exe (PID: 872)
Stealing of credential data
real2001.bmp.exe (PID: 2268)
InvisBrowser45856.exe (PID: 2064)
svchost.exe (PID: 2468)
build2.exe (PID: 2656)
STOP was detected
test33.bmp.exe (PID: 1036)
MINER was detected
svchost.exe (PID: 3296)
TOFSEE was detected
svchost.exe (PID: 2652)
Modifies exclusions in Windows Defender
svchost.exe (PID: 2652)
reg.exe (PID: 5124)
reg.exe (PID: 920)
reg.exe (PID: 2164)
reg.exe (PID: 5944)
reg.exe (PID: 4404)
reg.exe (PID: 3432)
reg.exe (PID: 5996)
reg.exe (PID: 3048)
reg.exe (PID: 2196)
Loads the Task Scheduler DLL interface
schtasks.exe (PID: 5672)
schtasks.exe (PID: 3096)
schtasks.exe (PID: 4336)
schtasks.exe (PID: 4812)
Modifies files in Chrome extension folder
eCYGTdT.exe (PID: 4528)
SUSPICIOUS
Reads Microsoft Outlook installation path
iexplore.exe (PID: 964)
Executable content was dropped or overwritten
WinRAR.exe (PID: 4032)
NiceProcessX32.bmp.exe (PID: 2912)
File.exe (PID: 3152)
13.php.exe (PID: 1832)
cmd.exe (PID: 3916)
Service.bmp.exe (PID: 3984)
fxdd.bmp.exe (PID: 1000)
test33.bmp.exe (PID: 908)
hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
mixinte2001.bmp.exe (PID: 4008)
random.exe.exe (PID: 3272)
real2001.bmp.exe (PID: 2268)
IQwqPtAU3c7.exe (PID: 2464)
gYaqqhiDI.exe (PID: 2736)
download2.exe.exe (PID: 4084)
utube2005.bmp.exe (PID: 3752)
test33.bmp.exe (PID: 1036)
setup.exe (PID: 3132)
TrdngAnlzr22649.exe.exe (PID: 2660)
Install.exe (PID: 2208)
setup.tmp (PID: 1256)
setup.exe (PID: 3984)
setup.tmp (PID: 3064)
Congiunto.exe.pif (PID: 3480)
orxds.exe (PID: 1208)
GF6GB.exe (PID: 3316)
build2.exe (PID: 2656)
Install.exe (PID: 1808)
Congiunto.exe.pif (PID: 3756)
AppLaunch.exe (PID: 1600)
lokes_1.bmp.exe (PID: 3928)
IsrGSPs.exe (PID: 5912)
eCYGTdT.exe (PID: 4528)
Reads the computer name
WinRAR.exe (PID: 4032)
File.exe (PID: 3152)
Service.bmp.exe (PID: 3984)
Offscum.exe.exe (PID: 2200)
rrmix.exe.exe (PID: 2356)
wam.exe.exe (PID: 1104)
13.php.exe (PID: 1832)
wmiprvse.exe (PID: 2852)
mxsfsaaa.exe (PID: 2428)
AppLaunch.exe (PID: 916)
AppLaunch.exe (PID: 3712)
Congiunto.exe.pif (PID: 3480)
norm2.bmp.exe (PID: 2552)
SetupMEXX.exe.exe (PID: 2496)
test33.bmp.exe (PID: 908)
hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
Fenix_7.bmp.exe (PID: 3744)
AppLaunch.exe (PID: 2584)
AppLaunch.exe (PID: 3564)
fxdd.bmp.exe (PID: 1000)
orxds.exe (PID: 1208)
AppLaunch.exe (PID: 1600)
mixinte2001.bmp.exe (PID: 4008)
setup777.exe.exe (PID: 780)
random.exe.exe (PID: 1972)
real2001.bmp.exe (PID: 2268)
random.exe.exe (PID: 3272)
lokes_1.bmp.exe (PID: 3928)
0pbZ7.exe (PID: 3020)
test33.bmp.exe (PID: 1036)
search_hyperfs_310.exe.exe (PID: 2168)
ShortnessUnsol.bmp.exe (PID: 3108)
TrdngAnlzr22649.exe.exe (PID: 2660)
IQwqPtAU3c7.exe (PID: 2464)
Congiunto.exe.pif (PID: 3756)
gYaqqhiDI.exe (PID: 2736)
download2.exe.exe (PID: 4084)
InvisBrowser45856.exe (PID: 2064)
setup331.exe (PID: 4092)
ll.exe (PID: 1764)
ll.exe (PID: 2516)
setup.tmp (PID: 1256)
Cleaner.exe (PID: 2416)
Install.exe (PID: 1808)
build2.exe (PID: 2656)
mixinte2001.bmp.exe (PID: 2448)
setup.tmp (PID: 3064)
1K9D4.exe (PID: 1292)
strongix.exe (PID: 2548)
orxds.exe (PID: 3348)
GF6GB.exe (PID: 3316)
H2506.exe (PID: 3244)
powershell.EXE (PID: 5144)
1A2C2.exe (PID: 2124)
powershell.EXE (PID: 4156)
orxds.exe (PID: 5952)
9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
wscript.exe (PID: 5416)
eCYGTdT.exe (PID: 4528)
Cleaner.exe (PID: 4732)
orxds.exe (PID: 4612)
Checks supported languages
WinRAR.exe (PID: 4032)
File.exe (PID: 3152)
NiceProcessX32.bmp.exe (PID: 2912)
Service.bmp.exe (PID: 3984)
13.php.exe (PID: 1832)
Offscum.exe.exe (PID: 2200)
rrmix.exe.exe (PID: 2356)
SetupMEXX.exe.exe (PID: 2496)
conhost.exe (PID: 2760)
file1.exe.exe (PID: 1980)
wam.exe.exe (PID: 1104)
cmd.exe (PID: 2364)
conhost.exe (PID: 2392)
cmd.exe (PID: 3916)
wmiprvse.exe (PID: 2852)
conhost.exe (PID: 4056)
conhost.exe (PID: 3524)
conhost.exe (PID: 3780)
conhost.exe (PID: 4004)
mxsfsaaa.exe (PID: 2428)
conhost.exe (PID: 3660)
6523.exe.exe (PID: 2548)
FJEfRXZ.exe.exe (PID: 1048)
conhost.exe (PID: 3176)
conhost.exe (PID: 3988)
prolivv.bmp.exe (PID: 2336)
cmd.exe (PID: 4056)
conhost.exe (PID: 2068)
cmd.exe (PID: 2144)
AppLaunch.exe (PID: 916)
AppLaunch.exe (PID: 3712)
Congiunto.exe.pif (PID: 3480)
mixinte2001.bmp.exe (PID: 4008)
test33.bmp.exe (PID: 3676)
conhost.exe (PID: 2536)
norm2.bmp.exe (PID: 2552)
real2001.bmp.exe (PID: 2268)
fxdd.bmp.exe (PID: 1000)
olympteam_build_crypted_2.bmp.exe (PID: 2420)
lokes_1.bmp.exe (PID: 3928)
test33.bmp.exe (PID: 908)
hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
conhost.exe (PID: 852)
arabcode_crypted_3.bmp.exe (PID: 1224)
conhost.exe (PID: 3780)
unmatured.bmp.exe (PID: 2120)
conhost.exe (PID: 456)
ShortnessUnsol.bmp.exe (PID: 3108)
conhost.exe (PID: 3452)
Fenix_7.bmp.exe (PID: 3744)
AppLaunch.exe (PID: 2584)
AppLaunch.exe (PID: 3564)
conhost.exe (PID: 3180)
TrdngAnlzr22649.exe.exe (PID: 2660)
orxds.exe (PID: 1208)
conhost.exe (PID: 2968)
conhost.exe (PID: 2348)
AppLaunch.exe (PID: 1600)
cmd.exe (PID: 4000)
NiceProcessX32.bmp.exe (PID: 2380)
random.exe.exe (PID: 1972)
setup777.exe.exe (PID: 780)
random.exe.exe (PID: 3272)
test33.bmp.exe (PID: 3972)
0pbZ7.exe (PID: 3020)
FJEfRXZ.exe.exe (PID: 4044)
mixinte2001.bmp.exe (PID: 2448)
conhost.exe (PID: 3372)
conhost.exe (PID: 2952)
cmd.exe (PID: 2844)
cmd.exe (PID: 2116)
test33.bmp.exe (PID: 1036)
IQwqPtAU3c7.exe (PID: 2464)
search_hyperfs_310.exe.exe (PID: 2168)
gYaqqhiDI.exe (PID: 2736)
Congiunto.exe.pif (PID: 3756)
utube2005.bmp.exe (PID: 3752)
strongix.exe (PID: 2548)
conhost.exe (PID: 2956)
cmd.exe (PID: 3584)
download2.exe.exe (PID: 4084)
setup331.exe (PID: 4092)
InvisBrowser45856.exe (PID: 2064)
ll.exe (PID: 1764)
Install.exe (PID: 2208)
ll.exe (PID: 2516)
build2.exe (PID: 2664)
setup.tmp (PID: 1256)
setup.exe (PID: 3132)
H2506.exe (PID: 3244)
conhost.exe (PID: 2964)
cmd.exe (PID: 2768)
Install.exe (PID: 1808)
Cleaner.exe (PID: 2416)
conhost.exe (PID: 2340)
conhost.exe (PID: 2580)
cmd.exe (PID: 3980)
cmd.exe (PID: 3920)
build2.exe (PID: 2656)
orxds.exe (PID: 3348)
setup.exe (PID: 3984)
setup.tmp (PID: 3064)
GF6GB.exe (PID: 3316)
1A2C2.exe (PID: 2124)
1K9D4.exe (PID: 1292)
conhost.exe (PID: 2424)
conhost.exe (PID: 3516)
conhost.exe (PID: 3912)
conhost.exe (PID: 4804)
conhost.exe (PID: 1544)
conhost.exe (PID: 1384)
cmd.exe (PID: 752)
Congiunto.exe.pif (PID: 4816)
conhost.exe (PID: 5424)
powershell.EXE (PID: 5144)
conhost.exe (PID: 5360)
conhost.exe (PID: 5912)
Tabivuz.exe (PID: 1312)
svmine.exe (PID: 3592)
IsrGSPs.exe (PID: 5912)
orxds.exe (PID: 5952)
conhost.exe (PID: 1412)
Congiunto.exe.pif (PID: 1540)
conhost.exe (PID: 1940)
conhost.exe (PID: 4360)
powershell.EXE (PID: 4156)
conhost.exe (PID: 5876)
9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
conhost.exe (PID: 6048)
conhost.exe (PID: 4128)
conhost.exe (PID: 5000)
cmd.exe (PID: 4024)
cmd.exe (PID: 5132)
conhost.exe (PID: 2732)
cmd.exe (PID: 3812)
conhost.exe (PID: 5440)
conhost.exe (PID: 5768)
wscript.exe (PID: 5416)
conhost.exe (PID: 5240)
conhost.exe (PID: 3004)
conhost.exe (PID: 4228)
conhost.exe (PID: 3504)
conhost.exe (PID: 1340)
conhost.exe (PID: 2544)
conhost.exe (PID: 3192)
conhost.exe (PID: 4220)
conhost.exe (PID: 2036)
conhost.exe (PID: 4744)
conhost.exe (PID: 2588)
conhost.exe (PID: 4924)
conhost.exe (PID: 940)
conhost.exe (PID: 3712)
conhost.exe (PID: 4312)
conhost.exe (PID: 2788)
conhost.exe (PID: 5828)
eCYGTdT.exe (PID: 4528)
conhost.exe (PID: 3352)
conhost.exe (PID: 2268)
cmd.exe (PID: 4084)
conhost.exe (PID: 2664)
cmd.exe (PID: 4148)
conhost.exe (PID: 4348)
conhost.exe (PID: 5084)
conhost.exe (PID: 5188)
conhost.exe (PID: 1856)
conhost.exe (PID: 2428)
conhost.exe (PID: 5636)
conhost.exe (PID: 5308)
conhost.exe (PID: 3312)
conhost.exe (PID: 1412)
conhost.exe (PID: 4116)
conhost.exe (PID: 4876)
cmd.exe (PID: 4236)
cmd.exe (PID: 4484)
conhost.exe (PID: 5336)
conhost.exe (PID: 4784)
conhost.exe (PID: 5240)
orxds.exe (PID: 4612)
Cleaner.exe (PID: 4732)
Drops a file with a compile date too recent
WinRAR.exe (PID: 4032)
NiceProcessX32.bmp.exe (PID: 2912)
File.exe (PID: 3152)
13.php.exe (PID: 1832)
cmd.exe (PID: 3916)
Service.bmp.exe (PID: 3984)
fxdd.bmp.exe (PID: 1000)
hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
test33.bmp.exe (PID: 908)
mixinte2001.bmp.exe (PID: 4008)
random.exe.exe (PID: 3272)
real2001.bmp.exe (PID: 2268)
test33.bmp.exe (PID: 1036)
IQwqPtAU3c7.exe (PID: 2464)
gYaqqhiDI.exe (PID: 2736)
download2.exe.exe (PID: 4084)
utube2005.bmp.exe (PID: 3752)
setup.exe (PID: 3132)
TrdngAnlzr22649.exe.exe (PID: 2660)
Install.exe (PID: 2208)
setup.tmp (PID: 1256)
setup.exe (PID: 3984)
setup.tmp (PID: 3064)
Congiunto.exe.pif (PID: 3480)
orxds.exe (PID: 1208)
GF6GB.exe (PID: 3316)
build2.exe (PID: 2656)
Install.exe (PID: 1808)
Congiunto.exe.pif (PID: 3756)
AppLaunch.exe (PID: 1600)
lokes_1.bmp.exe (PID: 3928)
IsrGSPs.exe (PID: 5912)
eCYGTdT.exe (PID: 4528)
Checks for external IP
File.exe (PID: 3152)
Service.bmp.exe (PID: 3984)
hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
svchost.exe (PID: 2468)
Adds / modifies Windows certificates
File.exe (PID: 3152)
Service.bmp.exe (PID: 3984)
test33.bmp.exe (PID: 908)
wam.exe.exe (PID: 1104)
Starts CMD.EXE for commands execution
13.php.exe (PID: 1832)
FJEfRXZ.exe.exe (PID: 1048)
cmd.exe (PID: 2144)
orxds.exe (PID: 1208)
FJEfRXZ.exe.exe (PID: 4044)
cmd.exe (PID: 2844)
gYaqqhiDI.exe (PID: 2736)
mixinte2001.bmp.exe (PID: 4008)
real2001.bmp.exe (PID: 2268)
forfiles.exe (PID: 2300)
forfiles.exe (PID: 1024)
mixinte2001.bmp.exe (PID: 2448)
IsrGSPs.exe (PID: 5912)
eCYGTdT.exe (PID: 4528)
Reads Environment values
Offscum.exe.exe (PID: 2200)
netsh.exe (PID: 584)
rrmix.exe.exe (PID: 2356)
AppLaunch.exe (PID: 916)
AppLaunch.exe (PID: 3712)
wam.exe.exe (PID: 1104)
AppLaunch.exe (PID: 1600)
SetupMEXX.exe.exe (PID: 2496)
Fenix_7.bmp.exe (PID: 3744)
AppLaunch.exe (PID: 3564)
IQwqPtAU3c7.exe (PID: 2464)
ShortnessUnsol.bmp.exe (PID: 3108)
gYaqqhiDI.exe (PID: 2736)
lokes_1.bmp.exe (PID: 3928)
real2001.bmp.exe (PID: 2268)
Cleaner.exe (PID: 2416)
GF6GB.exe (PID: 3316)
build2.exe (PID: 2656)
H2506.exe (PID: 3244)
strongix.exe (PID: 2548)
1A2C2.exe (PID: 2124)
InvisBrowser45856.exe (PID: 2064)
9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
Cleaner.exe (PID: 4732)
Starts SC.EXE for service management
13.php.exe (PID: 1832)
Reads the cookies of Google Chrome
Offscum.exe.exe (PID: 2200)
rrmix.exe.exe (PID: 2356)
AppLaunch.exe (PID: 3712)
Fenix_7.bmp.exe (PID: 3744)
ShortnessUnsol.bmp.exe (PID: 3108)
gYaqqhiDI.exe (PID: 2736)
AppLaunch.exe (PID: 1600)
lokes_1.bmp.exe (PID: 3928)
Reads the cookies of Mozilla Firefox
Offscum.exe.exe (PID: 2200)
rrmix.exe.exe (PID: 2356)
AppLaunch.exe (PID: 3712)
Fenix_7.bmp.exe (PID: 3744)
ShortnessUnsol.bmp.exe (PID: 3108)
AppLaunch.exe (PID: 1600)
lokes_1.bmp.exe (PID: 3928)
AppLaunch.exe (PID: 916)
SetupMEXX.exe.exe (PID: 2496)
strongix.exe (PID: 2548)
AppLaunch.exe (PID: 3564)
1A2C2.exe (PID: 2124)
H2506.exe (PID: 3244)
9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
Reads CPU info
wmiprvse.exe (PID: 2852)
IQwqPtAU3c7.exe (PID: 2464)
gYaqqhiDI.exe (PID: 2736)
real2001.bmp.exe (PID: 2268)
build2.exe (PID: 2656)
InvisBrowser45856.exe (PID: 2064)
Searches for installed software
Offscum.exe.exe (PID: 2200)
rrmix.exe.exe (PID: 2356)
Fenix_7.bmp.exe (PID: 3744)
gYaqqhiDI.exe (PID: 2736)
real2001.bmp.exe (PID: 2268)
AppLaunch.exe (PID: 3564)
svchost.exe (PID: 2468)
build2.exe (PID: 2656)
AppLaunch.exe (PID: 1600)
AppLaunch.exe (PID: 3712)
lokes_1.bmp.exe (PID: 3928)
ShortnessUnsol.bmp.exe (PID: 3108)
strongix.exe (PID: 2548)
H2506.exe (PID: 3244)
SetupMEXX.exe.exe (PID: 2496)
InvisBrowser45856.exe (PID: 2064)
AppLaunch.exe (PID: 916)
9817bcdf33322e8fbc1670e731c76126.exe (PID: 3248)
1A2C2.exe (PID: 2124)
Uses NETSH.EXE for network configuration
13.php.exe (PID: 1832)
Executed as Windows Service
mxsfsaaa.exe (PID: 2428)
Creates or modifies windows services
svchost.exe (PID: 2652)
Application launched itself
cmd.exe (PID: 2144)
test33.bmp.exe (PID: 3676)
test33.bmp.exe (PID: 908)
random.exe.exe (PID: 1972)
cmd.exe (PID: 2844)
test33.bmp.exe (PID: 3972)
ll.exe (PID: 1764)
build2.exe (PID: 2664)
svchost.exe (PID: 2652)
Congiunto.exe.pif (PID: 3480)
Congiunto.exe.pif (PID: 3756)
Reads the date of Windows installation
wmiprvse.exe (PID: 2852)
powershell.EXE (PID: 5144)
powershell.EXE (PID: 4156)
Uses TASKLIST.EXE to query information about running processes
cmd.exe (PID: 4056)
cmd.exe (PID: 2116)
Reads mouse settings
Congiunto.exe.pif (PID: 3480)
Congiunto.exe.pif (PID: 3756)
Tabivuz.exe (PID: 1312)
Starts application with an unusual extension
cmd.exe (PID: 4056)
cmd.exe (PID: 2116)
Congiunto.exe.pif (PID: 3480)
Congiunto.exe.pif (PID: 3756)
Creates files in the program directory
Service.bmp.exe (PID: 3984)
WerFault.exe (PID: 3912)
WerFault.exe (PID: 3608)
WerFault.exe (PID: 2248)
real2001.bmp.exe (PID: 2268)
WerFault.exe (PID: 1760)
WerFault.exe (PID: 2108)
build2.exe (PID: 2656)
svchost.exe (PID: 872)
eCYGTdT.exe (PID: 4528)
Creates a directory in Program Files
Service.bmp.exe (PID: 3984)
eCYGTdT.exe (PID: 4528)
Reads the Windows organization settings
wmiprvse.exe (PID: 2852)
setup.tmp (PID: 1256)
setup.tmp (PID: 3064)
Reads Windows Product ID
wmiprvse.exe (PID: 2852)
Reads Windows owner or organization settings
wmiprvse.exe (PID: 2852)
setup.tmp (PID: 1256)
setup.tmp (PID: 3064)
Starts itself from another location
fxdd.bmp.exe (PID: 1000)
utube2005.bmp.exe (PID: 3752)
Creates files in the Windows directory
svchost.exe (PID: 872)
svchost.exe (PID: 2652)
svchost.exe (PID: 2468)
schtasks.exe (PID: 5672)
cmd.exe (PID: 3812)
schtasks.exe (PID: 3096)
IsrGSPs.exe (PID: 5912)
schtasks.exe (PID: 4336)
eCYGTdT.exe (PID: 4528)
schtasks.exe (PID: 4812)
Uses REG.EXE to modify Windows registry
cmd.exe (PID: 4000)
cmd.exe (PID: 1556)
cmd.exe (PID: 3120)
cmd.exe (PID: 4024)
cmd.exe (PID: 5132)
wscript.exe (PID: 5416)
cmd.exe (PID: 4084)
cmd.exe (PID: 4148)
cmd.exe (PID: 4236)
cmd.exe (PID: 4484)
Uses ICACLS.EXE to modify access control list
test33.bmp.exe (PID: 908)
Creates files in the user directory
mixinte2001.bmp.exe (PID: 4008)
real2001.bmp.exe (PID: 2268)
IQwqPtAU3c7.exe (PID: 2464)
gYaqqhiDI.exe (PID: 2736)
orxds.exe (PID: 1208)
svchost.exe (PID: 2468)
GF6GB.exe (PID: 3316)
powershell.EXE (PID: 5144)
powershell.EXE (PID: 4156)
eCYGTdT.exe (PID: 4528)
Removes files from Windows directory
svchost.exe (PID: 872)
IsrGSPs.exe (PID: 5912)
Executed via WMI
rundll32.exe (PID: 2172)
rundll32.exe (PID: 3444)
Uses RUNDLL32.EXE to load library
wmiprvse.exe (PID: 2852)
control.exe (PID: 1340)
orxds.exe (PID: 1208)
taskeng.exe (PID: 5784)
Executes application which crashes
TrdngAnlzr22649.exe.exe (PID: 2660)
Loads DLL from Mozilla Firefox
InvisBrowser45856.exe (PID: 2064)
Starts CMD.EXE for self-deleting
real2001.bmp.exe (PID: 2268)
Uses TASKKILL.EXE to kill process
cmd.exe (PID: 3920)
cmd.exe (PID: 3980)
cmd.exe (PID: 752)
Executed via Task Scheduler
Tabivuz.exe (PID: 1312)
orxds.exe (PID: 3348)
powershell.EXE (PID: 5144)
orxds.exe (PID: 5952)
IsrGSPs.exe (PID: 5912)
powershell.EXE (PID: 4156)
orxds.exe (PID: 4612)
Reads default file associations for system extensions
setup331.exe (PID: 4092)
Executes PowerShell scripts
powershell.EXE (PID: 5144)
powershell.EXE (PID: 4156)
Executes scripts
IsrGSPs.exe (PID: 5912)
Creates a software uninstall entry
eCYGTdT.exe (PID: 4528)
INFO
Checks supported languages
iexplore.exe (PID: 1332)
iexplore.exe (PID: 964)
DllHost.exe (PID: 148)
consent.exe (PID: 3044)
DllHost.exe (PID: 2268)
DllHost.exe (PID: 832)
DllHost.exe (PID: 2288)
sc.exe (PID: 3516)
sc.exe (PID: 3824)
sc.exe (PID: 3372)
netsh.exe (PID: 584)
ftp.exe (PID: 3636)
svchost.exe (PID: 2652)
find.exe (PID: 2724)
find.exe (PID: 2528)
tasklist.exe (PID: 3156)
findstr.exe (PID: 3364)
tasklist.exe (PID: 2680)
svchost.exe (PID: 148)
PING.EXE (PID: 3484)
WerFault.exe (PID: 2248)
DllHost.exe (PID: 2480)
WerFault.exe (PID: 3608)
schtasks.exe (PID: 2632)
schtasks.exe (PID: 2352)
DllHost.exe (PID: 3360)
svchost.exe (PID: 872)
schtasks.exe (PID: 3220)
reg.exe (PID: 3992)
icacls.exe (PID: 3256)
DllHost.exe (PID: 2560)
WerFault.exe (PID: 3912)
DllHost.exe (PID: 2480)
ftp.exe (PID: 2476)
tasklist.exe (PID: 3720)
find.exe (PID: 3472)
find.exe (PID: 604)
rundll32.exe (PID: 2172)
tasklist.exe (PID: 3136)
svchost.exe (PID: 2468)
findstr.exe (PID: 3068)
PING.EXE (PID: 3668)
DllHost.exe (PID: 2384)
schtasks.exe (PID: 3048)
msiexec.exe (PID: 572)
ntvdm.exe (PID: 3160)
WerFault.exe (PID: 1760)
taskkill.exe (PID: 2964)
taskkill.exe (PID: 3088)
DllHost.exe (PID: 3668)
SearchFilterHost.exe (PID: 1148)
DllHost.exe (PID: 1812)
WerFault.exe (PID: 2108)
control.exe (PID: 1340)
rundll32.exe (PID: 2192)
timeout.exe (PID: 3956)
svchost.exe (PID: 3296)
svchost.exe (PID: 2420)
forfiles.exe (PID: 2300)
cmd.exe (PID: 1556)
forfiles.exe (PID: 1024)
cmd.exe (PID: 3120)
reg.exe (PID: 2696)
reg.exe (PID: 3132)
rundll32.exe (PID: 3444)
schtasks.exe (PID: 4748)
msiexec.exe (PID: 5684)
DllHost.exe (PID: 4104)
taskkill.exe (PID: 1204)
schtasks.exe (PID: 1760)
rundll32.exe (PID: 5772)
DllHost.exe (PID: 2044)
schtasks.exe (PID: 5336)
schtasks.exe (PID: 5672)
taskeng.exe (PID: 5784)
schtasks.exe (PID: 2804)
schtasks.exe (PID: 3328)
gpscript.exe (PID: 4068)
gpscript.exe (PID: 4196)
gpupdate.exe (PID: 5800)
gpupdate.exe (PID: 5808)
svchost.exe (PID: 5280)
schtasks.exe (PID: 1576)
reg.exe (PID: 5124)
reg.exe (PID: 920)
reg.exe (PID: 6032)
reg.exe (PID: 5944)
reg.exe (PID: 2164)
reg.exe (PID: 4404)
reg.exe (PID: 5996)
reg.exe (PID: 3432)
reg.exe (PID: 3048)
reg.exe (PID: 1204)
reg.exe (PID: 2196)
reg.exe (PID: 1828)
reg.exe (PID: 4300)
reg.exe (PID: 4888)
reg.exe (PID: 2444)
reg.exe (PID: 5216)
reg.exe (PID: 4216)
schtasks.exe (PID: 3096)
reg.exe (PID: 5460)
schtasks.exe (PID: 5900)
schtasks.exe (PID: 4076)
reg.exe (PID: 1948)
reg.exe (PID: 2336)
schtasks.exe (PID: 4336)
schtasks.exe (PID: 5068)
schtasks.exe (PID: 2052)
schtasks.exe (PID: 4872)
schtasks.exe (PID: 5368)
schtasks.exe (PID: 5444)
schtasks.exe (PID: 3620)
DllHost.exe (PID: 5856)
schtasks.exe (PID: 4568)
schtasks.exe (PID: 4812)
schtasks.exe (PID: 2268)
reg.exe (PID: 4448)
reg.exe (PID: 5876)
schtasks.exe (PID: 3048)
rundll32.EXE (PID: 2880)
schtasks.exe (PID: 4080)
DllHost.exe (PID: 1576)
svchost.exe (PID: 1204)
WerFault.exe (PID: 2020)
opera.exe (PID: 5440)
Reads the computer name
iexplore.exe (PID: 964)
iexplore.exe (PID: 1332)
DllHost.exe (PID: 148)
DllHost.exe (PID: 2268)
consent.exe (PID: 3044)
DllHost.exe (PID: 832)
DllHost.exe (PID: 2288)
sc.exe (PID: 3516)
sc.exe (PID: 3824)
netsh.exe (PID: 584)
sc.exe (PID: 3372)
svchost.exe (PID: 2652)
ftp.exe (PID: 3636)
tasklist.exe (PID: 2680)
tasklist.exe (PID: 3156)
svchost.exe (PID: 148)
PING.EXE (PID: 3484)
WerFault.exe (PID: 2248)
DllHost.exe (PID: 2480)
WerFault.exe (PID: 3608)
schtasks.exe (PID: 2632)
schtasks.exe (PID: 2352)
DllHost.exe (PID: 3360)
schtasks.exe (PID: 3220)
DllHost.exe (PID: 2560)
WerFault.exe (PID: 3912)
icacls.exe (PID: 3256)
DllHost.exe (PID: 2480)
ftp.exe (PID: 2476)
tasklist.exe (PID: 3720)
tasklist.exe (PID: 3136)
svchost.exe (PID: 2468)
rundll32.exe (PID: 2172)
PING.EXE (PID: 3668)
DllHost.exe (PID: 2384)
schtasks.exe (PID: 3048)
WerFault.exe (PID: 1760)
taskkill.exe (PID: 2964)
taskkill.exe (PID: 3088)
DllHost.exe (PID: 3668)
SearchFilterHost.exe (PID: 1148)
WerFault.exe (PID: 2108)
DllHost.exe (PID: 1812)
control.exe (PID: 1340)
svchost.exe (PID: 2420)
svchost.exe (PID: 3296)
rundll32.exe (PID: 3444)
schtasks.exe (PID: 4748)
DllHost.exe (PID: 4104)
taskkill.exe (PID: 1204)
schtasks.exe (PID: 1760)
rundll32.exe (PID: 5772)
DllHost.exe (PID: 2044)
schtasks.exe (PID: 5672)
schtasks.exe (PID: 5336)
taskeng.exe (PID: 5784)
schtasks.exe (PID: 2804)
schtasks.exe (PID: 3328)
gpupdate.exe (PID: 5800)
gpupdate.exe (PID: 5808)
svchost.exe (PID: 5280)
schtasks.exe (PID: 1576)
schtasks.exe (PID: 3096)
schtasks.exe (PID: 5900)
schtasks.exe (PID: 4076)
schtasks.exe (PID: 4336)
schtasks.exe (PID: 2052)
schtasks.exe (PID: 5068)
schtasks.exe (PID: 4872)
schtasks.exe (PID: 5368)
schtasks.exe (PID: 5444)
DllHost.exe (PID: 5856)
schtasks.exe (PID: 3620)
schtasks.exe (PID: 4568)
schtasks.exe (PID: 4812)
schtasks.exe (PID: 2268)
schtasks.exe (PID: 3048)
rundll32.EXE (PID: 2880)
schtasks.exe (PID: 4080)
DllHost.exe (PID: 1576)
svchost.exe (PID: 1204)
WerFault.exe (PID: 2020)
opera.exe (PID: 5440)
Reads settings of System Certificates
iexplore.exe (PID: 1332)
iexplore.exe (PID: 964)
File.exe (PID: 3152)
Offscum.exe.exe (PID: 2200)
Service.bmp.exe (PID: 3984)
test33.bmp.exe (PID: 908)
hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
wam.exe.exe (PID: 1104)
random.exe.exe (PID: 3272)
real2001.bmp.exe (PID: 2268)
test33.bmp.exe (PID: 1036)
ll.exe (PID: 2516)
svchost.exe (PID: 2468)
build2.exe (PID: 2656)
GF6GB.exe (PID: 3316)
lokes_1.bmp.exe (PID: 3928)
InvisBrowser45856.exe (PID: 2064)
eCYGTdT.exe (PID: 4528)
Application launched itself
iexplore.exe (PID: 1332)
Checks Windows Trust Settings
iexplore.exe (PID: 964)
iexplore.exe (PID: 1332)
consent.exe (PID: 3044)
File.exe (PID: 3152)
test33.bmp.exe (PID: 908)
hYZk5OKaJqjyyX5kRuSkitei.exe (PID: 2376)
real2001.bmp.exe (PID: 2268)
test33.bmp.exe (PID: 1036)
svchost.exe (PID: 2468)
build2.exe (PID: 2656)
powershell.EXE (PID: 5144)
powershell.EXE (PID: 4156)
wscript.exe (PID: 5416)
eCYGTdT.exe (PID: 4528)
Reads internet explorer settings
iexplore.exe (PID: 964)
Changes internet zones settings
iexplore.exe (PID: 1332)
Reads the date of Windows installation
iexplore.exe (PID: 1332)
opera.exe (PID: 5440)
Modifies the phishing filter of IE
iexplore.exe (PID: 1332)
Creates files in the user directory
iexplore.exe (PID: 1332)
opera.exe (PID: 5440)
Changes settings of System certificates
iexplore.exe (PID: 1332)
Adds / modifies Windows certificates
iexplore.exe (PID: 1332)
Reads CPU info
svchost.exe (PID: 2468)
Application was dropped or rewritten from another process
setup.tmp (PID: 1256)
setup.tmp (PID: 3064)
Loads dropped or rewritten executable
setup.tmp (PID: 1256)
setup.tmp (PID: 3064)
Creates a software uninstall entry
setup.tmp (PID: 3064)
Manual execution by user
Cleaner.exe (PID: 4732)
opera.exe (PID: 5440)
Check for Java to be installed
opera.exe (PID: 5440)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report