File name:

random.exe

Full analysis: https://app.any.run/tasks/39bf77eb-cc9d-498b-84bb-59d4c3e0554b
Verdict: Malicious activity
Threats:

Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.

Analysis date: September 28, 2025, 05:24:20
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
amadey
botnet
stealer
auto
redline
unlocker-eject
tool
rdp
arch-exec
generic
loader
github
stealc
vidar
auto-reg
themida
ms-smartcard
darkvision
remote
anti-evasion
rhadamanthys
qrcode
miner
silentcryptominer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

C07F63674D6C556215B0265BF0B8ADEA

SHA1:

95A31E0FC1C3E46D34CAFB54ACE2750B80854D5D

SHA256:

EF70B6FADF514B1F0C1475B6853B8BE2F55966F62B1AB12B25411B4B0FB4CE63

SSDEEP:

98304:m56y0GLGGsSnNLhMoLqYyG4rqiCoNBb/pEsOA/LCDWd1MutGwUMCvp/XQwGxXNjm:IqUCNiiO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • REDLINE has been found (auto)

      • random.exe (PID: 6376)
      • random.exe (PID: 1588)
      • random.exe (PID: 4072)
    • AMADEY mutex has been found

      • svchostam.exe (PID: 6808)
      • svchostam.exe (PID: 3740)
      • svchostam.exe (PID: 5824)
      • svchosthelper.exe (PID: 6236)
      • svchosthelper.exe (PID: 5988)
      • svchosthelper.exe (PID: 1336)
      • svchosthelper.exe (PID: 2460)
      • svchosthelper.exe (PID: 952)
      • svchosthelper.exe (PID: 5792)
      • svchosthelper.exe (PID: 856)
      • svchosthelper.exe (PID: 3652)
      • svchosthelper.exe (PID: 7004)
      • svchosthelper.exe (PID: 2504)
      • svchosthelper.exe (PID: 6100)
      • svchosthelper.exe (PID: 2848)
      • svchosthelper.exe (PID: 6160)
      • svchosthelper.exe (PID: 7096)
      • burun.exe (PID: 6364)
      • amnew.exe (PID: 6004)
      • svchosthelper.exe (PID: 5184)
      • svchosthelper.exe (PID: 2504)
      • svchosthelper.exe (PID: 8176)
      • svchosthelper.exe (PID: 8464)
      • burun.exe (PID: 8988)
      • svchosthelper.exe (PID: 9084)
      • svchosthelper.exe (PID: 8756)
      • svchosthelper.exe (PID: 7388)
      • svchosthelper.exe (PID: 2192)
      • svchosthelper.exe (PID: 8420)
      • svchosthelper.exe (PID: 8500)
      • svchosthelper.exe (PID: 8080)
      • svchosthelper.exe (PID: 6444)
      • svchosthelper.exe (PID: 8548)
      • svchosthelper.exe (PID: 3672)
      • svchosthelper.exe (PID: 7196)
      • svchosthelper.exe (PID: 6208)
      • svchosthelper.exe (PID: 1028)
      • burun.exe (PID: 3480)
    • AMADEY has been detected (SURICATA)

      • svchostam.exe (PID: 6808)
      • burun.exe (PID: 6364)
      • explorer.exe (PID: 6148)
    • Connects to the CnC server

      • svchostam.exe (PID: 6808)
      • burun.exe (PID: 6364)
      • svchost.exe (PID: 9004)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 4832)
    • Adds path to the Windows Defender exclusion list

      • NSudoLG.exe (PID: 4724)
      • cmd.exe (PID: 1212)
    • Changes Windows Defender settings

      • NSudoLG.exe (PID: 4724)
      • windrivesys.exe (PID: 6004)
      • updater.exe (PID: 9052)
    • Changes the Windows auto-update feature

      • reg.exe (PID: 1128)
    • AMADEY has been detected (YARA)

      • svchostam.exe (PID: 6808)
      • random.exe (PID: 4072)
    • GENERIC has been found (auto)

      • svchostam.exe (PID: 6808)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 4384)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 4384)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 3028)
    • PowerShell executes remote file download (POWERSHELL)

      • powershell.exe (PID: 4384)
    • Executing a file with an untrusted certificate

      • ThemeManager.exe (PID: 5520)
      • dCliKji.exe (PID: 4836)
    • STEALC mutex has been found

      • svchostam.exe (PID: 6808)
      • KDG0A26.exe (PID: 5548)
      • v3434.exe (PID: 1932)
    • Actions looks like stealing of personal data

      • dCliKji.exe (PID: 4836)
      • KDG0A26.exe (PID: 4692)
      • smss.exe (PID: 8088)
    • Steals credentials from Web Browsers

      • dCliKji.exe (PID: 4836)
      • KDG0A26.exe (PID: 4692)
      • smss.exe (PID: 8088)
    • AMADEY has been found (auto)

      • svchostam.exe (PID: 6808)
      • amnew.exe (PID: 6004)
    • Runs injected code in another process

      • dCtAIQJ.exe (PID: 7456)
    • Application was injected by another process

      • svchost.exe (PID: 7552)
      • svchost.exe (PID: 7364)
    • Starts REAGENTC.EXE to disable the Windows Recovery Environment

      • ReAgentc.exe (PID: 8748)
    • Starts NET.EXE for service management

      • cmd.exe (PID: 9120)
      • net.exe (PID: 9168)
      • cmd.exe (PID: 8404)
      • net.exe (PID: 8492)
    • DARKVISION has been detected (SURICATA)

      • svchost.exe (PID: 9004)
    • Adds extension to the Windows Defender exclusion list

      • windrivesys.exe (PID: 6004)
      • updater.exe (PID: 9052)
    • Uninstalls Malicious Software Removal Tool (MRT)

      • cmd.exe (PID: 1136)
      • cmd.exe (PID: 7132)
    • STEALC has been detected

      • 3rkLaCB.exe (PID: 8552)
    • Vulnerable driver has been detected

      • updater.exe (PID: 9052)
    • MINER has been detected (SURICATA)

      • svchost.exe (PID: 2200)
    • SILENTCRYPTOMINER has been detected (SURICATA)

      • explorer.exe (PID: 6148)
  • SUSPICIOUS

    • Reads the BIOS version

      • random.exe (PID: 6376)
      • random.exe (PID: 1588)
      • random.exe (PID: 4072)
    • Reads security settings of Internet Explorer

      • random.exe (PID: 6376)
      • svchostam.exe (PID: 6808)
      • random.exe (PID: 1588)
      • systemhelper.exe (PID: 320)
      • game.exe (PID: 1568)
      • game.exe (PID: 1336)
      • game.exe (PID: 2604)
      • IObitUnlocker.exe (PID: 5900)
      • StartMenuExperienceHost.exe (PID: 4512)
      • StartMenuExperienceHost.exe (PID: 1352)
      • GameBar.exe (PID: 4800)
      • dCliKji.exe (PID: 4836)
      • 81EhfrW.exe (PID: 6768)
      • burun.exe (PID: 6364)
      • amnew.exe (PID: 6004)
      • KDG0A26.exe (PID: 4692)
      • 84hginT.exe (PID: 3732)
      • myvideodatabase422.exe (PID: 2468)
      • 3rkLaCB.exe (PID: 8552)
      • v3434.exe (PID: 7216)
    • Executable content was dropped or overwritten

      • random.exe (PID: 6376)
      • random.exe (PID: 1588)
      • random.exe (PID: 4072)
      • systemhelper.exe (PID: 320)
      • game.exe (PID: 1336)
      • game.exe (PID: 2604)
      • svchostam.exe (PID: 6808)
      • powershell.exe (PID: 4384)
      • 81EhfrW.exe (PID: 3540)
      • 81EhfrW.exe (PID: 6768)
      • mybotos.exe (PID: 700)
      • hJFvGvb.exe (PID: 6444)
      • amnew.exe (PID: 6004)
      • 84hginT.exe (PID: 888)
      • smss.exe (PID: 8088)
      • zuaC5x8.exe (PID: 6480)
      • zuaC5x8.tmp (PID: 2668)
      • myvideodatabase422.exe (PID: 2468)
      • powershell.exe (PID: 7612)
      • Wsqlxghg.exe (PID: 6420)
      • windrivesys.exe (PID: 6004)
      • updater.exe (PID: 9052)
    • Application launched itself

      • random.exe (PID: 6376)
      • cmd.exe (PID: 1212)
      • KDG0A26.exe (PID: 5548)
      • updater.exe (PID: 7588)
      • 84hginT.exe (PID: 3732)
      • svchost.exe (PID: 7552)
      • v3434.exe (PID: 1932)
    • Creates a new Windows service

      • sc.exe (PID: 892)
      • sc.exe (PID: 7384)
    • Windows service management via SC.EXE

      • sc.exe (PID: 6840)
      • sc.exe (PID: 1336)
      • sc.exe (PID: 2728)
      • sc.exe (PID: 3636)
      • sc.exe (PID: 4692)
      • sc.exe (PID: 1156)
      • sc.exe (PID: 5372)
      • sc.exe (PID: 4032)
      • sc.exe (PID: 6900)
      • sc.exe (PID: 2112)
      • sc.exe (PID: 6208)
      • sc.exe (PID: 2708)
    • Contacting a server suspected of hosting an CnC

      • svchostam.exe (PID: 6808)
      • burun.exe (PID: 6364)
    • Executes as Windows Service

      • random.exe (PID: 4072)
      • updater.exe (PID: 9052)
    • Starts CMD.EXE for commands execution

      • random.exe (PID: 1588)
      • systemhelper.exe (PID: 320)
      • NSudoLG.exe (PID: 504)
      • cmd.exe (PID: 1212)
      • game.exe (PID: 1568)
      • game.exe (PID: 1336)
      • game.exe (PID: 2604)
      • svchostam.exe (PID: 6808)
      • gEcf95k.exe (PID: 1816)
      • mybotos.exe (PID: 1368)
      • svchost.exe (PID: 7364)
      • windrivesys.exe (PID: 6004)
      • updater.exe (PID: 9052)
    • Drops 7-zip archiver for unpacking

      • systemhelper.exe (PID: 320)
    • The process creates files with name similar to system file names

      • systemhelper.exe (PID: 320)
    • Executes application which crashes

      • svchostam.exe (PID: 5824)
      • svchosthelper.exe (PID: 5988)
      • svchosthelper.exe (PID: 1336)
      • svchosthelper.exe (PID: 952)
      • svchosthelper.exe (PID: 5792)
      • svchosthelper.exe (PID: 856)
      • svchosthelper.exe (PID: 3652)
      • svchosthelper.exe (PID: 7004)
      • svchosthelper.exe (PID: 2504)
      • svchosthelper.exe (PID: 6100)
      • svchosthelper.exe (PID: 7096)
      • svchosthelper.exe (PID: 2848)
      • svchosthelper.exe (PID: 6160)
      • svchosthelper.exe (PID: 5184)
      • svchosthelper.exe (PID: 2504)
      • svchosthelper.exe (PID: 8176)
      • svchosthelper.exe (PID: 8464)
      • svchosthelper.exe (PID: 9084)
      • svchosthelper.exe (PID: 8756)
      • svchosthelper.exe (PID: 7388)
      • svchosthelper.exe (PID: 2192)
      • svchosthelper.exe (PID: 8420)
      • svchosthelper.exe (PID: 8500)
      • svchosthelper.exe (PID: 8080)
      • svchosthelper.exe (PID: 8548)
      • OpenWith.exe (PID: 5812)
      • svchosthelper.exe (PID: 3672)
      • svchosthelper.exe (PID: 7196)
      • svchosthelper.exe (PID: 6208)
      • svchosthelper.exe (PID: 1028)
    • Executing commands from a ".bat" file

      • systemhelper.exe (PID: 320)
      • NSudoLG.exe (PID: 504)
    • The executable file from the user directory is run by the CMD process

      • nircmd.exe (PID: 984)
      • NSudoLG.exe (PID: 504)
      • nircmd.exe (PID: 2508)
      • NSudoLG.exe (PID: 4724)
      • 7z.exe (PID: 4528)
      • game.exe (PID: 1568)
      • game.exe (PID: 1336)
      • game.exe (PID: 2604)
    • Starts application with an unusual extension

      • cmd.exe (PID: 1232)
      • cmd.exe (PID: 1212)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 1232)
      • cmd.exe (PID: 1212)
    • Escape characters obfuscation (POWERSHELL)

      • powershell.exe (PID: 5456)
      • NSudoLG.exe (PID: 4724)
    • Get information on the list of running processes

      • cmd.exe (PID: 1212)
      • cmd.exe (PID: 5904)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 1212)
    • Script adds exclusion path to Windows Defender

      • NSudoLG.exe (PID: 4724)
      • windrivesys.exe (PID: 6004)
      • updater.exe (PID: 9052)
    • PowerShell delay command usage (probably sleep evasion)

      • powershell.exe (PID: 5456)
    • Starts POWERSHELL.EXE for commands execution

      • NSudoLG.exe (PID: 4724)
      • cmd.exe (PID: 3028)
      • smss.exe (PID: 8088)
      • myvideodatabase422.exe (PID: 2468)
      • windrivesys.exe (PID: 6004)
      • updater.exe (PID: 9052)
    • Potential Corporate Privacy Violation

      • svchostam.exe (PID: 6808)
      • svchost.exe (PID: 7364)
      • powershell.exe (PID: 7612)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 1644)
      • cmd.exe (PID: 1212)
      • cmd.exe (PID: 828)
      • cmd.exe (PID: 4172)
      • cmd.exe (PID: 4880)
      • windrivesys.exe (PID: 6004)
      • updater.exe (PID: 9052)
    • Reads the date of Windows installation

      • game.exe (PID: 1568)
      • game.exe (PID: 1336)
      • game.exe (PID: 2604)
      • StartMenuExperienceHost.exe (PID: 4512)
      • StartMenuExperienceHost.exe (PID: 1352)
      • SearchApp.exe (PID: 5428)
    • Stops a currently running service

      • sc.exe (PID: 2112)
      • sc.exe (PID: 5288)
      • sc.exe (PID: 6668)
      • sc.exe (PID: 3836)
      • sc.exe (PID: 3480)
      • sc.exe (PID: 1468)
      • sc.exe (PID: 8820)
      • sc.exe (PID: 8768)
      • sc.exe (PID: 8028)
      • sc.exe (PID: 7460)
      • sc.exe (PID: 8740)
      • sc.exe (PID: 5184)
      • sc.exe (PID: 2976)
      • sc.exe (PID: 7184)
      • sc.exe (PID: 6432)
      • sc.exe (PID: 5124)
      • sc.exe (PID: 6684)
    • Creates or modifies Windows services

      • reg.exe (PID: 2288)
      • game.exe (PID: 1336)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 5904)
      • cmd.exe (PID: 1488)
    • There is functionality for enable RDP (YARA)

      • svchostam.exe (PID: 6808)
    • There is functionality for taking screenshot (YARA)

      • svchostam.exe (PID: 6808)
    • Drops a system driver (possible attempt to evade defenses)

      • game.exe (PID: 1336)
      • game.exe (PID: 2604)
      • updater.exe (PID: 9052)
    • The process verifies whether the antivirus software is installed

      • IObitUnlocker.exe (PID: 5900)
      • game.exe (PID: 2604)
    • Executing commands from ".cmd" file

      • svchostam.exe (PID: 6808)
    • Base64-obfuscated command line is found

      • cmd.exe (PID: 3028)
    • BASE64 encoded PowerShell command has been detected

      • cmd.exe (PID: 3028)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 4384)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • dCliKji.exe (PID: 4836)
      • KDG0A26.exe (PID: 4692)
    • Searches for installed software

      • dCliKji.exe (PID: 4836)
      • KDG0A26.exe (PID: 4692)
      • 3rkLaCB.exe (PID: 8552)
    • Starts itself from another location

      • 81EhfrW.exe (PID: 6768)
      • mybotos.exe (PID: 700)
      • amnew.exe (PID: 6004)
      • 84hginT.exe (PID: 888)
      • smss.exe (PID: 8088)
    • Connects to unusual port

      • explorer.exe (PID: 1580)
      • svchost.exe (PID: 2760)
      • cmd.exe (PID: 5992)
      • explorer.exe (PID: 7984)
      • svchost.exe (PID: 8724)
      • cmd.exe (PID: 8124)
      • yfUrA3L.exe (PID: 7868)
      • explorer.exe (PID: 7180)
      • svchost.exe (PID: 7540)
      • cmd.exe (PID: 9128)
      • explorer.exe (PID: 420)
      • explorer.exe (PID: 6148)
    • The process executes via Task Scheduler

      • updater.exe (PID: 7588)
      • burun.exe (PID: 8988)
      • svchosthelper.exe (PID: 6444)
      • burun.exe (PID: 3480)
    • Process drops legitimate windows executable

      • svchostam.exe (PID: 6808)
      • zuaC5x8.tmp (PID: 2668)
    • Starts a Microsoft application from unusual location

      • dCtAIQJ.exe (PID: 7456)
    • Suspicious use of NETSH.EXE

      • cmd.exe (PID: 5368)
      • cmd.exe (PID: 9208)
    • Reads the Windows owner or organization settings

      • zuaC5x8.tmp (PID: 2668)
    • The process drops C-runtime libraries

      • zuaC5x8.tmp (PID: 2668)
    • Checks a user's role membership (POWERSHELL)

      • powershell.exe (PID: 7612)
    • Uses ATTRIB.EXE to modify file attributes

      • powershell.exe (PID: 7612)
    • The process checks if it is being run in the virtual environment

      • OpenWith.exe (PID: 5812)
      • 6petV3i.exe (PID: 9028)
    • Manipulates environment variables

      • powershell.exe (PID: 5824)
      • powershell.exe (PID: 6624)
    • Script adds exclusion extension to Windows Defender

      • windrivesys.exe (PID: 6004)
      • updater.exe (PID: 9052)
    • Process uninstalls Windows update

      • wusa.exe (PID: 7196)
      • wusa.exe (PID: 6952)
    • Uses powercfg.exe to modify the power settings

      • windrivesys.exe (PID: 6004)
      • updater.exe (PID: 9052)
    • Crypto Currency Mining Activity Detected

      • svchost.exe (PID: 2200)
  • INFO

    • Checks supported languages

      • random.exe (PID: 6376)
      • svchostam.exe (PID: 6808)
      • random.exe (PID: 1588)
      • svchostam.exe (PID: 3740)
      • random.exe (PID: 4072)
      • svchostam.exe (PID: 5824)
      • svchosthelper.exe (PID: 6236)
      • systemhelper.exe (PID: 320)
      • chcp.com (PID: 4984)
      • NSudoLG.exe (PID: 504)
      • nircmd.exe (PID: 2508)
      • chcp.com (PID: 2032)
      • nircmd.exe (PID: 984)
      • NSudoLG.exe (PID: 4724)
      • mode.com (PID: 5456)
      • game.exe (PID: 1568)
      • 7z.exe (PID: 4528)
      • svchosthelper.exe (PID: 5988)
      • game.exe (PID: 1336)
      • game.exe (PID: 2604)
      • IObitUnlocker.exe (PID: 5900)
      • svchosthelper.exe (PID: 1336)
      • svchosthelper.exe (PID: 2460)
      • StartMenuExperienceHost.exe (PID: 4512)
      • SearchApp.exe (PID: 1960)
      • svchosthelper.exe (PID: 952)
      • TextInputHost.exe (PID: 828)
      • GameBar.exe (PID: 4800)
      • StartMenuExperienceHost.exe (PID: 1352)
      • TQ4Zi2D.exe (PID: 2232)
      • svchosthelper.exe (PID: 5792)
      • SearchApp.exe (PID: 5428)
      • svchosthelper.exe (PID: 856)
      • ThemeManager.exe (PID: 5520)
      • dCliKji.exe (PID: 4836)
      • gEcf95k.exe (PID: 1816)
      • svchosthelper.exe (PID: 3652)
      • svchosthelper.exe (PID: 7004)
      • 5iwq82x.exe (PID: 2028)
      • svchosthelper.exe (PID: 2504)
      • 81EhfrW.exe (PID: 3540)
      • 81EhfrW.exe (PID: 6768)
      • svchosthelper.exe (PID: 6100)
      • hJFvGvb.exe (PID: 6444)
      • mybotos.exe (PID: 700)
      • mybotos.exe (PID: 1368)
      • svchosthelper.exe (PID: 7096)
      • client_bridge.exe (PID: 4224)
      • svchosthelper.exe (PID: 2848)
      • KDG0A26.exe (PID: 5548)
      • svchosthelper.exe (PID: 6160)
      • burun.exe (PID: 6364)
      • KDG0A26.exe (PID: 4692)
      • amnew.exe (PID: 6004)
      • svchosthelper.exe (PID: 5184)
      • 84hginT.exe (PID: 3732)
      • 84hginT.exe (PID: 888)
      • svchosthelper.exe (PID: 2504)
      • updater.exe (PID: 7588)
      • updater.exe (PID: 7624)
      • yfUrA3L.exe (PID: 7868)
      • svchosthelper.exe (PID: 8176)
      • smss.exe (PID: 7556)
      • smss.exe (PID: 2312)
      • svchosthelper.exe (PID: 8464)
      • burun.exe (PID: 8988)
      • zuaC5x8.tmp (PID: 2668)
      • myvideodatabase422.exe (PID: 2468)
      • NjtIeMV.exe (PID: 8784)
      • svchosthelper.exe (PID: 2192)
      • windrivesys.exe (PID: 6004)
      • svchosthelper.exe (PID: 7388)
      • Wsqlxghg.exe (PID: 6420)
      • 6petV3i.exe (PID: 9028)
      • svchosthelper.exe (PID: 6444)
      • svchosthelper.exe (PID: 8548)
      • 3rkLaCB.exe (PID: 8552)
      • svchosthelper.exe (PID: 7196)
      • v3434.exe (PID: 1932)
      • svchosthelper.exe (PID: 6208)
      • burun.exe (PID: 3480)
      • v3434.exe (PID: 7216)
      • svchosthelper.exe (PID: 1028)
    • Create files in a temporary directory

      • random.exe (PID: 6376)
      • random.exe (PID: 1588)
      • systemhelper.exe (PID: 320)
      • svchostam.exe (PID: 6808)
      • gEcf95k.exe (PID: 1816)
      • amnew.exe (PID: 6004)
      • smss.exe (PID: 8088)
      • zuaC5x8.exe (PID: 6480)
      • zuaC5x8.tmp (PID: 2668)
    • Reads the computer name

      • random.exe (PID: 6376)
      • svchostam.exe (PID: 6808)
      • random.exe (PID: 1588)
      • random.exe (PID: 4072)
      • svchostam.exe (PID: 5824)
      • systemhelper.exe (PID: 320)
      • NSudoLG.exe (PID: 504)
      • NSudoLG.exe (PID: 4724)
      • game.exe (PID: 1568)
      • 7z.exe (PID: 4528)
      • game.exe (PID: 1336)
      • svchosthelper.exe (PID: 5988)
      • game.exe (PID: 2604)
      • IObitUnlocker.exe (PID: 5900)
      • svchosthelper.exe (PID: 1336)
      • StartMenuExperienceHost.exe (PID: 4512)
      • SearchApp.exe (PID: 1960)
      • TextInputHost.exe (PID: 828)
      • svchosthelper.exe (PID: 952)
      • GameBar.exe (PID: 4800)
      • StartMenuExperienceHost.exe (PID: 1352)
      • svchosthelper.exe (PID: 5792)
      • SearchApp.exe (PID: 5428)
      • svchosthelper.exe (PID: 856)
      • gEcf95k.exe (PID: 1816)
      • ThemeManager.exe (PID: 5520)
      • svchosthelper.exe (PID: 3652)
      • svchosthelper.exe (PID: 7004)
      • 5iwq82x.exe (PID: 2028)
      • dCliKji.exe (PID: 4836)
      • svchosthelper.exe (PID: 2504)
      • 81EhfrW.exe (PID: 6768)
      • svchosthelper.exe (PID: 6100)
      • client_bridge.exe (PID: 4224)
      • hJFvGvb.exe (PID: 6444)
      • mybotos.exe (PID: 700)
      • mybotos.exe (PID: 1368)
      • svchosthelper.exe (PID: 7096)
      • svchosthelper.exe (PID: 2848)
      • svchosthelper.exe (PID: 6160)
      • amnew.exe (PID: 6004)
      • burun.exe (PID: 6364)
      • KDG0A26.exe (PID: 4692)
      • svchosthelper.exe (PID: 5184)
      • 84hginT.exe (PID: 3732)
      • svchosthelper.exe (PID: 2504)
      • updater.exe (PID: 7588)
      • 84hginT.exe (PID: 888)
      • yfUrA3L.exe (PID: 7868)
      • smss.exe (PID: 7556)
      • smss.exe (PID: 2312)
      • svchosthelper.exe (PID: 8464)
      • svchosthelper.exe (PID: 9084)
      • zuaC5x8.tmp (PID: 2668)
      • svchosthelper.exe (PID: 7388)
      • svchosthelper.exe (PID: 2192)
      • svchosthelper.exe (PID: 8420)
      • 6petV3i.exe (PID: 9028)
      • 3rkLaCB.exe (PID: 8552)
      • svchosthelper.exe (PID: 3672)
      • svchosthelper.exe (PID: 6208)
      • svchosthelper.exe (PID: 7196)
      • v3434.exe (PID: 7216)
      • svchosthelper.exe (PID: 1028)
    • Process checks computer location settings

      • random.exe (PID: 6376)
      • random.exe (PID: 1588)
      • systemhelper.exe (PID: 320)
      • StartMenuExperienceHost.exe (PID: 4512)
      • SearchApp.exe (PID: 1960)
      • SearchApp.exe (PID: 5428)
      • svchostam.exe (PID: 6808)
      • StartMenuExperienceHost.exe (PID: 1352)
      • 81EhfrW.exe (PID: 6768)
      • amnew.exe (PID: 6004)
      • 84hginT.exe (PID: 3732)
    • Reads the machine GUID from the registry

      • random.exe (PID: 6376)
      • random.exe (PID: 1588)
      • random.exe (PID: 4072)
      • game.exe (PID: 1568)
      • game.exe (PID: 1336)
      • game.exe (PID: 2604)
      • SearchApp.exe (PID: 1960)
      • SearchApp.exe (PID: 5428)
      • gEcf95k.exe (PID: 1816)
      • dCliKji.exe (PID: 4836)
      • 5iwq82x.exe (PID: 2028)
      • KDG0A26.exe (PID: 4692)
      • 84hginT.exe (PID: 3732)
      • 84hginT.exe (PID: 888)
      • yfUrA3L.exe (PID: 7868)
      • client_bridge.exe (PID: 4224)
      • smss.exe (PID: 7556)
      • smss.exe (PID: 2312)
      • Wsqlxghg.exe (PID: 6420)
      • 6petV3i.exe (PID: 9028)
      • v3434.exe (PID: 7216)
    • Checks proxy server information

      • svchostam.exe (PID: 6808)
      • SearchApp.exe (PID: 1960)
      • slui.exe (PID: 5780)
      • SearchApp.exe (PID: 5428)
      • powershell.exe (PID: 4384)
      • dCliKji.exe (PID: 4836)
      • burun.exe (PID: 6364)
      • KDG0A26.exe (PID: 4692)
      • powershell.exe (PID: 7612)
      • 3rkLaCB.exe (PID: 8552)
      • v3434.exe (PID: 7216)
    • The sample compiled with english language support

      • systemhelper.exe (PID: 320)
      • game.exe (PID: 1336)
      • game.exe (PID: 2604)
      • svchostam.exe (PID: 6808)
      • zuaC5x8.tmp (PID: 2668)
      • myvideodatabase422.exe (PID: 2468)
    • NirSoft software is detected

      • nircmd.exe (PID: 984)
      • nircmd.exe (PID: 2508)
    • Changes the display of characters in the console

      • cmd.exe (PID: 1232)
      • cmd.exe (PID: 1212)
    • Reads the software policy settings

      • WerFault.exe (PID: 3760)
      • WerFault.exe (PID: 3636)
      • WerFault.exe (PID: 4304)
      • SearchApp.exe (PID: 1960)
      • SearchApp.exe (PID: 5428)
      • slui.exe (PID: 5780)
      • WerFault.exe (PID: 5568)
      • WerFault.exe (PID: 5360)
      • WerFault.exe (PID: 6880)
      • gEcf95k.exe (PID: 1816)
      • WerFault.exe (PID: 3392)
      • dCliKji.exe (PID: 4836)
      • WerFault.exe (PID: 6076)
      • WerFault.exe (PID: 3132)
      • WerFault.exe (PID: 5716)
      • WerFault.exe (PID: 7132)
      • WerFault.exe (PID: 6164)
      • WerFault.exe (PID: 8)
      • KDG0A26.exe (PID: 4692)
      • WerFault.exe (PID: 6876)
      • WerFault.exe (PID: 3540)
      • client_bridge.exe (PID: 4224)
      • WerFault.exe (PID: 3972)
      • WerFault.exe (PID: 8516)
      • WerFault.exe (PID: 8996)
      • WerFault.exe (PID: 5192)
      • WerFault.exe (PID: 2848)
      • WerFault.exe (PID: 7208)
      • WerFault.exe (PID: 2328)
      • WerFault.exe (PID: 6796)
      • WerFault.exe (PID: 9192)
      • WerFault.exe (PID: 7208)
      • v3434.exe (PID: 7216)
    • Starts MODE.COM to configure console settings

      • mode.com (PID: 5456)
    • Checks operating system version

      • cmd.exe (PID: 1212)
    • Creates files or folders in the user directory

      • svchostam.exe (PID: 6808)
      • dCliKji.exe (PID: 4836)
      • 81EhfrW.exe (PID: 6768)
      • 81EhfrW.exe (PID: 3540)
      • zuaC5x8.tmp (PID: 2668)
      • Wsqlxghg.exe (PID: 6420)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 5456)
      • powershell.exe (PID: 5824)
      • powershell.exe (PID: 6624)
    • UNLOCKER BY EJECT mutex has been found

      • game.exe (PID: 1568)
      • game.exe (PID: 1336)
      • game.exe (PID: 2604)
    • Reads the time zone

      • explorer.exe (PID: 1712)
    • Changes appearance of the Explorer extensions

      • explorer.exe (PID: 1712)
    • Reads Environment values

      • SearchApp.exe (PID: 1960)
      • SearchApp.exe (PID: 5428)
      • dCliKji.exe (PID: 4836)
      • KDG0A26.exe (PID: 4692)
      • yfUrA3L.exe (PID: 7868)
    • Themida protector has been detected

      • random.exe (PID: 4072)
    • Disables trace logs

      • powershell.exe (PID: 4384)
      • powershell.exe (PID: 7612)
      • netsh.exe (PID: 8176)
      • netsh.exe (PID: 9168)
    • The executable file from the user directory is run by the Powershell process

      • ThemeManager.exe (PID: 5520)
      • windrivesys.exe (PID: 6004)
      • Wsqlxghg.exe (PID: 6420)
    • The sample compiled with russian language support

      • svchostam.exe (PID: 6808)
    • Creates files in the program directory

      • dCliKji.exe (PID: 4836)
      • hJFvGvb.exe (PID: 6444)
      • mybotos.exe (PID: 700)
      • KDG0A26.exe (PID: 4692)
      • 84hginT.exe (PID: 888)
      • smss.exe (PID: 8088)
      • svchost.exe (PID: 9004)
      • myvideodatabase422.exe (PID: 2468)
      • windrivesys.exe (PID: 6004)
      • v3434.exe (PID: 7216)
    • Reads CPU info

      • dCliKji.exe (PID: 4836)
      • KDG0A26.exe (PID: 4692)
      • 3rkLaCB.exe (PID: 8552)
    • Reads product name

      • dCliKji.exe (PID: 4836)
      • KDG0A26.exe (PID: 4692)
    • Launching a file from a Registry key

      • 81EhfrW.exe (PID: 6768)
      • explorer.exe (PID: 1580)
      • svchost.exe (PID: 2760)
      • svchost.exe (PID: 8724)
      • explorer.exe (PID: 7180)
      • svchost.exe (PID: 7540)
      • Wsqlxghg.exe (PID: 6420)
      • svchost.exe (PID: 7492)
      • explorer.exe (PID: 420)
    • Application launched itself

      • chrome.exe (PID: 5852)
      • chrome.exe (PID: 5700)
    • Process checks whether UAC notifications are on

      • updater.exe (PID: 7588)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • smss.exe (PID: 8088)
    • Checks current location (POWERSHELL)

      • powershell.exe (PID: 7612)
    • Creates a software uninstall entry

      • zuaC5x8.tmp (PID: 2668)
    • Changes the registry key values via Powershell

      • myvideodatabase422.exe (PID: 2468)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 2464)
    • Manual execution by a user

      • OpenWith.exe (PID: 5812)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7612)
      • powershell.exe (PID: 5824)
      • powershell.exe (PID: 6624)
    • The sample compiled with japanese language support

      • updater.exe (PID: 9052)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Amadey

(PID) Process(6808) svchostam.exe
C294.154.35.25
URLhttp://94.154.35.25/di9ku38f/index.php
Version5.55
Options
Drop directory96a319e745
Drop nameSrxelqcif.exe
Strings (125)GetNativeSystemInfo
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
" && ren
%USERPROFILE%
Startup
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
http://
.jpg
Keyboard Layout\Preload
\App
%-lu
ProductName
un:
cred.dll
-unicode-
msi
WinDefender
0123456789
Sophos
ar:
vs:
DefaultSettings.YResolution
ProgramData\
SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName
96a319e745
S-%lu-
Avira
"taskkill /f /im "
dll
=
-%lu
CurrentBuild
DefaultSettings.XResolution
"
shell32.dll
bi:
------
cmd /C RMDIR /s/q
ESET
Content-Type: application/x-www-form-urlencoded
<d>
dm:
d1
shutdown -s -t 0
94.154.35.25
Norton
POST
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
id:
rundll32
e1
Content-Disposition: form-data; name="data"; filename="
--
abcdefghijklmnopqrstuvwxyz0123456789-_
/k
0000043f
\0000
&unit=
5.55
SYSTEM\ControlSet001\Services\BasicDisplay\Video
r=
pc:
av:
:::
/di9ku38f/index.php
SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Content-Type: multipart/form-data; boundary=----
https://
Panda Security
ComputerName
Powershell.exe
SOFTWARE\Microsoft\Windows NT\CurrentVersion
2016
Kaspersky Lab
rundll32.exe
<c>
-executionpolicy remotesigned -File "
|
wb
00000419
zip
os:
2025
rb
cmd
og:
ps1
2022
kernel32.dll
exe
00000423
sd:
SYSTEM\CurrentControlSet\Control\UnitedVideo\CONTROL\VIDEO\
Bitdefender
/Plugins/
#
e3
Rem
GET
Programs
e2
+++
Doctor Web
AVG
cred.dll|clip.dll|
------
st=s
lv:
&&
2019
random
?scr=1
00000422
clip.dll
Srxelqcif.exe
/quiet
VideoID
&& Exit"
Main
Comodo
" Content-Type: application/octet-stream
" && timeout 1 && del
360TotalSecurity
AVAST Software
\
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2057:08:23 00:29:55+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 3043328
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x6f8000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: DownloaderApp
FileVersion: 1.0.0.0
InternalName: DownloaderApp.exe
LegalCopyright: Copyright © 2025
LegalTrademarks: -
OriginalFileName: DownloaderApp.exe
ProductName: DownloaderApp
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
540
Monitored processes
336
Malicious processes
68
Suspicious processes
12

Behavior graph

Click at the process to see the details
start #REDLINE random.exe #AMADEY svchostam.exe #REDLINE random.exe svchostam.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs #AMADEY random.exe svchostam.exe cmd.exe no specs svchosthelper.exe no specs conhost.exe no specs schtasks.exe no specs systemhelper.exe werfault.exe cmd.exe no specs conhost.exe no specs nircmd.exe no specs chcp.com no specs reg.exe no specs reg.exe no specs nsudolg.exe no specs cmd.exe conhost.exe no specs nircmd.exe no specs chcp.com no specs reg.exe no specs reg.exe no specs mode.com no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs tasklist.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs findstr.exe no specs reg.exe no specs find.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs find.exe no specs nsudolg.exe no specs powershell.exe no specs conhost.exe no specs 7z.exe no specs game.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs svchosthelper.exe reg.exe no specs reg.exe no specs game.exe werfault.exe cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs game.exe cmd.exe no specs conhost.exe no specs sc.exe no specs iobitunlocker.exe reg.exe no specs reg.exe no specs reg.exe no specs explorer.exe no specs rundll32.exe no specs svchosthelper.exe svchosthelper.exe no specs startmenuexperiencehost.exe no specs werfault.exe searchapp.exe explorer.exe no specs rundll32.exe no specs slui.exe no specs gamebar.exe no specs startmenuexperiencehost.exe no specs textinputhost.exe no specs svchosthelper.exe no specs werfault.exe searchapp.exe slui.exe tq4zi2d.exe no specs mobsync.exe no specs svchosthelper.exe werfault.exe cmd.exe conhost.exe no specs powershell.exe svchosthelper.exe werfault.exe gecf95k.exe no specs gecf95k.exe cmd.exe no specs conhost.exe no specs gpupdate.exe no specs thememanager.exe no specs svchosthelper.exe werfault.exe dclikji.exe conhost.exe no specs svchosthelper.exe werfault.exe 5iwq82x.exe no specs 5iwq82x.exe svchosthelper.exe werfault.exe 81ehfrw.exe 81ehfrw.exe client_bridge.exe svchosthelper.exe werfault.exe hjfvgvb.exe chrome.exe no specs mybotos.exe chrome.exe no specs mybotos.exe no specs svchosthelper.exe explorer.exe werfault.exe svchosthelper.exe werfault.exe #STEALC kdg0a26.exe no specs svchost.exe kdg0a26.exe svchosthelper.exe #AMADEY amnew.exe werfault.exe #AMADEY burun.exe svchosthelper.exe werfault.exe 84hgint.exe no specs cmd.exe conhost.exe no specs 84hgint.exe svchosthelper.exe werfault.exe updater.exe no specs updater.exe no specs yfura3l.exe smss.exe svchosthelper.exe werfault.exe powershell.exe conhost.exe no specs explorer.exe smss.exe no specs dctaiqj.exe no specs svchost.exe svchost.exe smss.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs svchosthelper.exe werfault.exe reagentc.exe no specs burun.exe no specs #DARKVISION svchost.exe svchosthelper.exe cmd.exe no specs conhost.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs conhost.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs conhost.exe no specs werfault.exe netsh.exe svchost.exe zuac5x8.exe zuac5x8.tmp myvideodatabase422.exe powershell.exe no specs conhost.exe no specs svchosthelper.exe werfault.exe cmd.exe conhost.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe explorer.exe no specs COpenControlPanel no specs njtiemv.exe no specs svchosthelper.exe werfault.exe explorer.exe svchosthelper.exe attrib.exe no specs werfault.exe openwith.exe windrivesys.exe attrib.exe no specs wsqlxghg.exe svchosthelper.exe werfault.exe svchost.exe 6petv3i.exe conhost.exe no specs svchosthelper.exe werfault.exe svchosthelper.exe werfault.exe svchosthelper.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe conhost.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs wusa.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs powercfg.exe no specs powercfg.exe no specs conhost.exe no specs powercfg.exe no specs powercfg.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs THREAT updater.exe powershell.exe no specs conhost.exe no specs svchosthelper.exe werfault.exe #STEALC 3rklacb.exe cmd.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs wusa.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs powercfg.exe no specs powercfg.exe no specs powercfg.exe no specs conhost.exe no specs powercfg.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs #SILENTCRYPTOMINER explorer.exe chrome.exe no specs werfault.exe no specs svchosthelper.exe werfault.exe explorer.exe svchosthelper.exe werfault.exe #STEALC v3434.exe no specs svchosthelper.exe v3434.exe werfault.exe svchost.exe burun.exe no specs chrome.exe no specs svchosthelper.exe werfault.exe #MINER svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
8C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6160 -s 196C:\Windows\SysWOW64\WerFault.exe
svchosthelper.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
320"C:\WINDOWS\systemhelper.exe"C:\Windows\systemhelper.exe
random.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\windows\systemhelper.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
420"C:\WINDOWS\explorer.exe"C:\Windows\explorer.exe
mybotos.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
472\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
504NSudoLG -U:T -P:E -UseCurrentConsole "C:\Users\admin\AppData\Local\Temp\CgGwx2I.bat" any_word C:\Users\admin\AppData\Local\Temp\barer\NSudoLG.execmd.exe
User:
admin
Company:
M2-Team
Integrity Level:
HIGH
Description:
NSudo Launcher
Exit code:
0
Version:
9.0.2676.0
Modules
Images
c:\users\admin\appdata\local\temp\barer\nsudolg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
504reg query "HKLM\Software\Microsoft\Windows NT\CurrentVersion" /v "ProductName" C:\Windows\System32\reg.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
536\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exedCliKji.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
592reg add "HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Themes\Personalize" /v "AppsUseLightTheme" /t reg_dword /d 0 /f C:\Windows\SysWOW64\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\advapi32.dll
700"C:\ProgramData\mybotos.exe"C:\ProgramData\mybotos.exe
hJFvGvb.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\programdata\mybotos.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
828"C:\Windows\System32\cmd.exe" /c sc query IObitUnlockerC:\Windows\System32\cmd.exegame.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Command Processor
Exit code:
1060
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
Total events
264 110
Read events
263 543
Write events
414
Delete events
153

Modification events

(PID) Process:(6808) svchostam.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6808) svchostam.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6808) svchostam.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3760) WerFault.exeKey:\REGISTRY\A\{ed9754e3-e571-cefe-e892-dab2b8d61755}\Root\InventoryApplicationFile
Operation:writeName:WritePermissionsCheck
Value:
1
(PID) Process:(3760) WerFault.exeKey:\REGISTRY\A\{ed9754e3-e571-cefe-e892-dab2b8d61755}\Root\InventoryApplicationFile\PermissionsCheckTestKey
Operation:delete keyName:(default)
Value:
(PID) Process:(3760) WerFault.exeKey:\REGISTRY\A\{ed9754e3-e571-cefe-e892-dab2b8d61755}\Root\InventoryApplicationFile\svchostam.exe|1caa8885a4a95e0f
Operation:writeName:ProgramId
Value:
000615939ed0ac2ba175cc44be91a649a1c20000ffff
(PID) Process:(3760) WerFault.exeKey:\REGISTRY\A\{ed9754e3-e571-cefe-e892-dab2b8d61755}\Root\InventoryApplicationFile\svchostam.exe|1caa8885a4a95e0f
Operation:writeName:FileId
Value:
0000c1b667b0ff98bbb1d2495b4fd5dda1eeca494799
(PID) Process:(3760) WerFault.exeKey:\REGISTRY\A\{ed9754e3-e571-cefe-e892-dab2b8d61755}\Root\InventoryApplicationFile\svchostam.exe|1caa8885a4a95e0f
Operation:writeName:LowerCaseLongPath
Value:
c:\windows\temp\svchostam.exe
(PID) Process:(3760) WerFault.exeKey:\REGISTRY\A\{ed9754e3-e571-cefe-e892-dab2b8d61755}\Root\InventoryApplicationFile\svchostam.exe|1caa8885a4a95e0f
Operation:writeName:LongPathHash
Value:
svchostam.exe|1caa8885a4a95e0f
(PID) Process:(3760) WerFault.exeKey:\REGISTRY\A\{ed9754e3-e571-cefe-e892-dab2b8d61755}\Root\InventoryApplicationFile\svchostam.exe|1caa8885a4a95e0f
Operation:writeName:Name
Value:
svchostam.exe
Executable files
87
Suspicious files
95
Text files
209
Unknown types
0

Dropped files

PID
Process
Filename
Type
3760WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchostam.exe_460c115342eaebf4e874c1245ef65dba855d3_0099dbc6_5ba0fc73-379d-4971-8826-f5879193fe1c\Report.wer
MD5:
SHA256:
6376random.exeC:\Users\admin\AppData\Local\Temp\svchostam.exeexecutable
MD5:156F4A8F006779A3493D9D476F1E8DDA
SHA256:C36ED034D523DA1F54D43176334D4BDA9F9ADCB940948646B43902A620EBDA45
1588random.exeC:\Windows\systemhelper.exeexecutable
MD5:B81B123A16AC281FEEC76E54170A229B
SHA256:2043BF8934DFC1F94A386BAD14AC43EA551218CEF0E42E9CDAE191CF16E833E3
4072random.exeC:\Windows\Temp\svchostam.exeexecutable
MD5:156F4A8F006779A3493D9D476F1E8DDA
SHA256:C36ED034D523DA1F54D43176334D4BDA9F9ADCB940948646B43902A620EBDA45
1588random.exeC:\Windows\svchosthelper.exeexecutable
MD5:156F4A8F006779A3493D9D476F1E8DDA
SHA256:C36ED034D523DA1F54D43176334D4BDA9F9ADCB940948646B43902A620EBDA45
5456powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:69EFB83D756DB8772921EB751AFEC8C1
SHA256:CC5E9F0FF0F359B2DD33183C3B16C57CCAEC39C862011EC78950645B8924711A
3760WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERF27B.tmp.xmlxml
MD5:20E6D21D0A064EC9270810F06A6CD7AD
SHA256:1556BF96045400663AEDD46D1D5AA2EE8820F4BA3C6BE764CE1346F52D86A781
5456powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ja4wd0fh.zxz.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
3636WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchosthelper.ex_44e01fb1b1e2d52ea19b98f32377bc7b5b43ab1_f1495998_a1f5c4fd-0295-46c5-a311-88e9c3027cae\Report.wer
MD5:
SHA256:
5456powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_dxiosg3o.n3t.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
624
TCP/UDP connections
208
DNS requests
52
Threats
133

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5944
MoUsoCoreWorker.exe
GET
200
23.53.41.90:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6292
RUXIMICS.exe
GET
200
23.53.41.90:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.53.41.90:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6292
RUXIMICS.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6808
svchostam.exe
POST
200
94.154.35.25:80
http://94.154.35.25/di9ku38f/index.php
unknown
unknown
6808
svchostam.exe
GET
200
178.16.55.189:80
http://178.16.55.189/files/7639673951/TQ4Zi2D.exe
unknown
unknown
GET
200
2.19.176.104:443
https://www.bing.com/manifest/threshold.appcache
unknown
text
2.92 Kb
unknown
6808
svchostam.exe
POST
200
94.154.35.25:80
http://94.154.35.25/di9ku38f/index.php
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6292
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
23.53.41.90:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.53.41.90:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6292
RUXIMICS.exe
23.53.41.90:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6292
RUXIMICS.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
google.com
  • 172.217.16.206
whitelisted
crl.microsoft.com
  • 23.53.41.90
  • 23.53.40.178
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
watson.events.data.microsoft.com
  • 135.233.45.221
  • 172.178.240.163
  • 172.178.240.162
  • 172.178.240.161
whitelisted
www.bing.com
  • 104.126.37.131
  • 104.126.37.145
whitelisted
activation-v2.sls.microsoft.com
  • 4.154.209.85
whitelisted
github.com
  • 140.82.121.4
  • 140.82.121.3
whitelisted
release-assets.githubusercontent.com
  • 185.199.108.133
  • 185.199.110.133
  • 185.199.111.133
  • 185.199.109.133
whitelisted
steamcommunity.com
  • 104.102.49.106
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
6808
svchostam.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 15
6808
svchostam.exe
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Amadey HTTP POST Request (st=s)
6808
svchostam.exe
Malware Command and Control Activity Detected
ET MALWARE Amadey CnC Response
6808
svchostam.exe
A Network Trojan was detected
MALWARE [ANY.RUN] Win32/Generic related IP address
6808
svchostam.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 33
6808
svchostam.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
6808
svchostam.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
6808
svchostam.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
6808
svchostam.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
Process
Message
random.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
random.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
random.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
IObitUnlocker.exe
PostAction_Delete
IObitUnlocker.exe
FileCount:289
IObitUnlocker.exe
C:\ProgramData\Microsoft\Windows Defender--------
IObitUnlocker.exe
C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection--------
IObitUnlocker.exe
C:\ProgramData\Microsoft\Windows Security Health--------
IObitUnlocker.exe
C:\ProgramData\Microsoft\Storage Health--------
IObitUnlocker.exe
C:\Program Files\Windows Defender--------