: It has also been seen in technical analyses involving process hollowing , where a malicious process hides inside a legitimate-looking file name to evade detection. 3. Retro Gaming & Software
In recent years, the name "Osiris" has been co-opted by cybercriminals for malicious software.
: The osirismd process (the management daemon) can be installed or uninstalled via the command line using -i or -u . The -d flag is often used for debugging, showing log messages directly in the terminal. Osiris.exe
: It is frequently used alongside other security tools like Samhain . 2. Malware & Cyber Threats
: Security researchers have identified a variant of the Kronos banking trojan frequently named Osiris.exe or os.exe . It features keylogging, "form grabbing," and uses the Tor network to hide its activity. : It has also been seen in technical
: A version of the Locky ransomware also used the ".osiris" file extension for encrypted files, leading many to search for a corresponding "Osiris.exe" decrypter or executable.
: To verify that the files on a server have not been tampered with. : The osirismd process (the management daemon) can
: A modern adaptation of the game Alien Breed 3D for the GZDoom engine.