
"Launcher.exe" wrote 32 bytes to a remote process "C:\Program Files (x86)\AirDroid\Helper.exe" (Handle: 300) "Launcher.exe" wrote 8 bytes to a remote process "C:\Program Files (x86)\AirDroid\Helper.exe" (Handle: 300) "Launcher.exe" wrote 4 bytes to a remote process "C:\Program Files (x86)\AirDroid\Helper.exe" (Handle: 300) "Launcher.exe" wrote 1500 bytes to a remote process "C:\Program Files (x86)\AirDroid\Helper.exe" (Handle: 300) "AirDroid_Desktop_Client_3.6.8.0.exe" wrote 52 bytes to a remote process "C:\Program Files (x86)\AirDroid\Launcher.exe" (Handle: 984) "AirDroid_Desktop_Client_3.6.8.0.exe" wrote 32 bytes to a remote process "C:\Program Files (x86)\AirDroid\Launcher.exe" (Handle: 984) "AirDroid_Desktop_Client_3.6.8.0.exe" wrote 8 bytes to a remote process "C:\Program Files (x86)\AirDroid\Launcher.exe" (Handle: 984)

"AirDroid_Desktop_Client_3.6.8.0.exe" wrote 4 bytes to a remote process "C:\Program Files (x86)\AirDroid\Launcher.exe" (Handle: 984) "AirDroid_Desktop_Client_3.6.8.0.exe" wrote 1500 bytes to a remote process "%PROGRAMFILES%\(x86)\AirDroid\Launcher.exe" (Handle: 984) The analysis spawned a process that was identified as maliciousġ/60 Antivirus vendors marked spawned process "AirCmd.exe" (PID: 1740) as malicious (classified as "Malware.Generic" with 1% detection rate)ġ/60 Antivirus vendors marked spawned process "AirCmd.exe" (PID: 1164) as malicious (classified as "Malware.Generic" with 1% detection rate)ġ/60 Antivirus vendors marked spawned process "AirCmd.exe" (PID: 2652) as malicious (classified as "Malware.Generic" with 1% detection rate)ġ/60 Antivirus vendors marked spawned process "AirCmd.exe" (PID: 2688) as malicious (classified as "Malware.Generic" with 1% detection rate)ġ/60 Antivirus vendors marked spawned process "AirCmd.exe" (PID: 2684) as malicious (classified as "Malware.Generic" with 1% detection rate)ġ/60 Antivirus vendors marked spawned process "AirCmd.exe" (PID: 2064) as malicious (classified as "Malware.Generic" with 1% detection rate)ġ/91 Antivirus vendors marked spawned process "Launcher_UAC.exe" (PID: 4080) as malicious (classified as "Unavailable" with 1% detection rate)Īllocates virtual memory in a remote process


1/88 Antivirus vendors marked dropped file "api-ms-win-core-timezone-l1-1-0.dll" as malicious (classified as "Unavailable" with 1% detection rate)ġ/91 Antivirus vendors marked dropped file "api-ms-win-crt-environment-l1-1-0.dll" as malicious (classified as "Unavailable" with 1% detection rate)ġ/91 Antivirus vendors marked dropped file "api-ms-win-crt-convert-l1-1-0.dll" as malicious (classified as "Unavailable" with 1% detection rate)ġ/90 Antivirus vendors marked dropped file "api-ms-win-core-namedpipe-l1-1-0.dll" as malicious (classified as "Unavailable" with 1% detection rate)ġ/91 Antivirus vendors marked dropped file "api-ms-win-crt-utility-l1-1-0.dll" as malicious (classified as "Unavailable" with 1% detection rate)ġ/91 Antivirus vendors marked dropped file "api-ms-win-crt-time-l1-1-0.dll" as malicious (classified as "Unavailable" with 1% detection rate)ġ/91 Antivirus vendors marked dropped file "api-ms-win-core-debug-l1-1-0.dll" as malicious (classified as "Unavailable" with 1% detection rate)ġ/91 Antivirus vendors marked dropped file "api-ms-win-core-localization-l1-2-0.dll" as malicious (classified as "Unavailable" with 1% detection rate)ġ/91 Antivirus vendors marked dropped file "Launcher_UAC.exe" as malicious (classified as "Unavailable" with 1% detection rate)ġ/69 Antivirus vendors marked dropped file "AirDroidHelper.exe" as malicious (classified as "Malware.Generic" with 1% detection rate)ġ/67 Antivirus vendors marked dropped file "InstallOptions.dll" as malicious (classified as "Malware.Generic" with 1% detection rate)
