| File name: | 2025-06-29_403eb3d98c5b3408b33d5cce157e4765_black-basta |
| Full analysis: | https://app.any.run/tasks/5ac91c32-9057-4fc6-9e42-60551d7875f1 |
| Verdict: | Malicious activity |
| Threats: | Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files. |
| Analysis date: | June 29, 2025, 02:09:30 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 10 sections |
| MD5: | 403EB3D98C5B3408B33D5CCE157E4765 |
| SHA1: | 4C2C9725324BC782D8413BC096E9805112C5A29B |
| SHA256: | 1D79B023A428B5805887B44659929CDFB659BBD494A65ABADC428C93BF5F3C71 |
| SSDEEP: | 98304:veoo4o/fPlP2esF9TmAMtYo3GDixNt8M3i6cL9fZoXIkLcvlHt3K7MclDtj3jHUY:6ZZR/ |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2023:06:21 07:51:19+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.36 |
| CodeSize: | 1338368 |
| InitializedDataSize: | 2344960 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x33af |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.1 |
| ProductVersionNumber: | 1.0.0.1 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Unknown (0801) |
| CharacterSet: | Unicode |
| CompanyName: | Oracle America, Inc |
| FileDescription: | Java Update Scheduler |
| FileVersion: | 4.1.1.1 |
| InternalName: | Update.exe |
| LegalCopyright: | Copyright (C) 2023 |
| OriginalFileName: | Update.exe |
| ProductName: | DigiCert Timestamp 2022 - 2 |
| ProductVersion: | 4.1.1.1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 188 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2460 | "C:\Users\admin\Desktop\2025-06-29_403eb3d98c5b3408b33d5cce157e4765_black-basta.exe" | C:\Users\admin\Desktop\2025-06-29_403eb3d98c5b3408b33d5cce157e4765_black-basta.exe | explorer.exe | ||||||||||||
User: admin Company: Oracle America, Inc Integrity Level: MEDIUM Description: Java Update Scheduler Exit code: 1 Version: 4.1.1.1 Modules
| |||||||||||||||
| 2552 | "C:\Users\admin\AppData\Local\Temp\\jcj6NOoCJbm" | C:\Users\admin\AppData\Local\Temp\jcj6NOoCJbm | 2025-06-29_403eb3d98c5b3408b33d5cce157e4765_black-basta.exe | ||||||||||||
User: admin Company: Simon Tatham Integrity Level: MEDIUM Description: SSH, Telnet, Rlogin, and SUPDUP client Version: Release 0.78 (with embedded help) Modules
Arkei(PID) Process(2552) jcj6NOoCJbm C2 (2)https://t.me/headlist https://steamcommunity.com/profiles/76561199235044780 Keys RC414079884793687657507 Strings (541)kernel32.dll GetUserNameA advapi32.dll GetComputerNameA LocalAlloc lstrcmpiW VirtualFree VirtualAlloc VirtualAllocExNuma GetCurrentProcess ExitProcess GetSystemTime Sleep GetProcAddress lstrcatA LoadLibraryA JohnDoe HAL9TH Ledger Live \Raven\ Raven Core \Dogecoin\ Dogecoin *wallet*.dat wallet.dat \Bitcoin\ Bitcoin Core Old \Bitcoin\wallets\ Bitcoin Core .finger-print.fp simple-storage.json Binance Desktop loginusers.vdf libraryfolders.vdf DialogConfigOverlay*.vdf DialogConfig.vdf config.vdf ssfn* SteamPath Software\Valve\Steam C:\\\Windows\ C:\\Windows\ C:\Windows\ *%DRIVE_REMOVABLE%* *%DRIVE_FIXED%* *%RECE T%* %DRIVE_REMOVABLE% %DRIVE_FIXED% %RECENT% %PROGRAMFILES_86% %PROGRAMFILES% %DOCUMENTS% %DESKTOP% %USERPROFILE% %LOCALAPPDATA% %APPDATA% \information.txt [Software] [Processes] VideoCard: RAM: CPU Count: Processor: [Hardware] TimeZone: Local Time: Keyboard Languages: Display Language: Display Resolution: User Name: Computer Name: Windows: Work Dir: In memory Path: HWID: GUID: MachineID: Date: Version: sqlite3.dll RoninWalletEdge kjmoohlgokccodicjjfebfomlbljgfhk IndexedDB Sync Extension Settings Local Extension Settings UseMasterPassword Security Password UserName PortNumber HostName Soft: WinSCP \Soft\Authy Desktop\ \Authy Desktop\Local Storage\leveldb\ \Soft\Authy Desktop Old\ \Authy Desktop\Local Storage\ *.localstorage places.sqlite formhistory.sqlite cookies.sqlite History SELECT fieldname, value FROM moz_formhistory SELECT url FROM moz_places SELECT host, isHttpOnly, path, isSecure, expiry name, value FROM moz_cookies Network Password: Login: Host: Soft: \"os_crypt\":{\"encrypted_key\":\" \passwords.txt \Soft\Telegram\ F8806DD0C461824F* A92DAA6EA6F891F2* A7FDF864FBC10B77* D877F783D5D3EF8C* map* key_datas \Telegram Desktop\ Thunderbird \Thunderbird\Profiles\ Brave \BraveSoftware\Brave-Browser\User Data\ CryptoTab Browser \CryptoTab Browser\User Data\ \Opera GX Stable\ \Opera Stable\ \Opera Software\ sqlite3_column_blob sqlite3_column_bytes sqlite3_close sqlite3_finalize sqlite3_column_text sqlite3_step sqlite3_prepare_v2 sqlite3_open GdipFree GdipDisposeImage GdipSaveImageToStream GdiplusShutdown GdiplusStartup GdipCreateBitmapFromHBITMAP GdipGetImageEncoders GdipGetImageEncodersSize SymMatchString PathFindFileNameA StrStrA StrCmpCW StrCmpCA PathMatchSpecA PathMatchSpecW SHGetFolderPathA SHFileOperationA ShellExecuteExA CloseWindow GetWindowDC GetWindowRect GetHGlobalFromStream CreateStreamOnHGlobal CoInitialize InternetCrackUrlA AccessCheck MapGenericMask DuplicateToken OpenProcessToken GetFileSecurityA RegEnumValueA CryptBinaryToStringA gdiplus.dll dbghelp.dll shlwapi.dll shell32.dll GetVolumeInformationA GetWindowsDirectoryA Process32Next Process32First CreateToolhelp32Snapshot CreateEventA OpenEventA GetTickCount SetEnvironmentVariableA GetEnvironmentVariableA GetFileInformationByHandle CreateFileMappingA FileTimeToSystemTime UnmapViewOfFile MapViewOfFile LocalFileTimeToFileTime GetFileAttributesW GetFileAttributesA WriteFile SetFileTime GetLocalTime SystemTimeToFileTime HeapFree SetFilePointer GetCurrentDirectoryA DeleteFileA CopyFileA TzSpecificLocalTimeToSystemTime GetTimeZoneInformation GetFileSizeEx OpenProcess GetCurrentProcessId GetLocaleInfoA FreeLibrary GlobalSize GlobalLock lstrcpynA GetLastError FindClose FindNextFileA FindFirstFileA MultiByteToWideChar lstrcpyA GetDriveTypeA lstrlenA GetLogicalDriveStringsA CloseHandle ReadFile GetFileSize CreateFileA GetProcessHeap HeapAlloc LocalFree WideCharToMultiByte GetSystemInfo GetUserDefaultLocaleName IsWow64Process GlobalMemoryStatusE CreateThread Discord Token: dQw4w9WgXcQ: \Soft\Discord\discord_tokens.txt Session Storage leveldb Local Storage Discord \discord\ Wasabi Wallet \WalletWasabi\Client\Wallets\ Blockstream Green \Blockstream\Green\wallets\ she*.sqlite Daedalus Mainnet \Daedalus Mainnet\wallets\ Jaxx_Desktop \com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\ GAuth Authenticator ilgcnhelpchnceeipipijaljkblbcobl EOS Authenticator oeljdldpnmdbchonielidgobddffflal Authy gaedmjdfmmahhbjefcbgaolhhanlaolb Authenticator bhghoamapcdpbohphigoooaddinpkbai Goby jnkelfanjkeadonecabehalmbgpfodjm Temple ookjlbkiijinhpmnjffcofjonbfbgaoc TezBox mnfifefkajgofkcjkemidiaecocnkjeh KHC hcflpincpppdclinealmandijcmnkbgn CyanoWallet dkdedlpgdmmkkfjabffeganieamfklkm Solflare bhhhlbepdkbapadjdnnojkbgioiodbic WavesKeeper lpilbniiabackdjcionkobglmddfbcjo MaiarDeFiWallet dngmlblcodfobpdpecaadgfbcggfjfnm NamiWallet lpfcbjknijpeeillifnkikgncikgfhdo XdefiWallet hmeobnfnfcmdkdcmlblgagmfpfboieaf BoltX aodkkagnadcbobfpggfnjeongemjbjca PaliWallet mgffkfbidihjpoaomajlbgchddlicgpn Oxygen (Atomic) fhilaheimglignddkjgofkcbgekhenbh BraveWallet odbfpeeihdkbihmopkbjmoonfanlbfcl ejbalbakoplchlghecdalmeeeajnimhm Phantom bfnaelmomeimhlpmgjnjophhpkkoljpa Rabby acmacodkjbdgmoleebolmdjonilkdbch Trezor Password Manager imloifkgjagghnncjkhggdhalmcnfklk KardiaChain pdadjkfkgcafgbceimcpbkalnfnepbnk EVER Wallet cgeeodpfagjceefieflmdfphplkenlfk Coin98 aeachknmefphepccionboohckonoeemg Harmony fnnegphlobjdpkhecapkijjdkgcjhkib ICONex flpiciilemghbmfalicajoolhkkenfel PolymeshWallet jojhfeoedkpkglbfimdfabpdfjaoolaf AuroWallet cnmamaachppnkjgnildpdmkaakejnhae Sollet fhmfendgdocmcbmfikdcogofphimnkno Keplr dmkamcknogkgcdfhhbddcghachkejeap Terra_Station aiifbnbfobpmeekipheeijimdpnlpgpp LiqualityWallet kpfopkelmapcoipemfendmdcghnegimn CloverWallet nhnkbkgjikgcigadomkphalanndcapjk NeoLine cphhlgmgameodnhkjdmkpanlelnlohao RoninWallet fnjhmkhhmkbjkkabndcnnogagogbneec GuildWallet nanjmdknhkinifnkgdcggcfnhdaammmj MewCx nlbmnnijcnlegkjjpcfjclmcfggfefdm Wombat amkmjjmmflddogmhpjloimipbofnfjih iWallet kncchdigobghenbbaddojjnnaogfppfj BitAppWallet fihkakfobkmkjojpchpfgcmhfjnmnfpi JaxxLiberty cjelfplplebdjjenllpjcblmjkfcffne EQUALWallet blnieiiffboillknjnepogjhkgnoapac Guarda hpglfhgfnhbgpjdenjgmdgoeiappafln Coinbase hnfanknocfeofbddgcijnmhnfnkdnaad MathWallet afbcbjpbpfadlkmhmclhkeeodmamcflc NiftyWallet jbdaocneiiinmjbjlgalhcelgbejmnid Yoroi ffnbelfdoeiohenkjibnmadjiehjhajb BinanceChainWallet fhbohimaelbohpjbbldcngcnapndodjp MetaMask nkbihfbeogaeaoehlefnkodbefgpgknn TronLink ibnejdfjmmkpcnlpebklmnkoeoihofec EnumProcessModules GetModuleBaseNameA GetModuleFileNameExA GetSystemMetrics EnumDisplayDevicesA wsprintfA GetDC CharToOemA GetKeyboardLayoutList ReleaseDC GetDesktopWindow CoUninitialize CoCreateInstance CreateCompatibleDC GetDeviceCaps CreateDCA DeleteObject BitBlt SelectObject CreateCompatibleBitmap DeleteUrlCacheEntry InternetSetOptionA InternetOpenUrlA InternetSetFilePointer HttpQueryInfoA HttpAddRequestHeadersA InternetOpenA InternetConnectA HttpOpenRequestA HttpSendRequestA InternetReadFile InternetCloseHandle wininet.dll GetCurrentHwProfileA RegGetValueA RegEnumKeyExA RegGetValueW RegOpenKeyExW RegCloseKey RegQueryValueExA RegOpenKeyExA PK11SDR_Decrypt PK11_Authenticate PK11_FreeSlot PK11_GetInternalKeySlot NSS_Shutdown NSS_Init C:\ProgramData\nss3.dll CryptStringToBinaryA CryptUnprotectData CRYPT32.DLL BCryptDecrypt BCryptGenerateSymmetricKey BCryptSetProperty BCryptOpenAlgorithmProvider BCryptDestroyKey BCryptCloseAlgorithmProvider BCRYPT.DLL psapi.dll user32.dll ole32.dll gdi32.dll FALSE TRUE Local State \Opera Software\Opera GX Stable\ OperaGX \Opera Software\Opera Stable\ Opera \Tencent\QQBrowser\User Data\ QQBrowser \360Browser\Browser\User Data\ 360 Browser \Microsoft\Edge\User Data\ Microsoft Edge \7Star\7Star\User Data\ 7Star \brave\ Brave_Old \Chedot\User Data\ Chedot Browser \TorBro\Profile\ TorBro Browser \CentBrowser\User Data\ Cent Browser \CocCoc\Browser\User Data\ CocCoc \Vivaldi\User Data\ Vivaldi \Epic Privacy Browser\User Data\ Epic Privacy Browser \Comodo\Dragon\User Data\ Comodo Dragon \Torch\User Data\ Torch \Amigo\User Data\ Amigo \Chromium\User Data\ Chromium \Google\Chrome\User Data\ Google Chrome \Moonchild Productions\Pale Moon\Profiles\ Pale Moon \Mozilla\Firefox\Profiles\ Mozilla Firefox Soft: FileZilla <Pass encoding="base64"> <User> <Port> <Host> \AppData\Roaming\FileZilla\recentservers.xml SELECT HOST_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies SELECT url FROM urls SELECT target_path, tab_url from downloads SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards SELECT name, value FROM autofill SELECT origin_url, username_value, password value FROM logins guid encryptedPassword encryptedUsername usernameField formSubmitURL logins.json Web Data Cookies Login Data netfulfilled mnpayments mncache governance banlist mempool peers fee_estimates Local\Microsoft Roaming\WinRAR Local\ uGet Local\Packages MicrosoftEdge\Cookies Recycle.Bin Local\Temp Recovery msdownld.tmp System Volume Information Config.Msi RECYCLE.BIN .exe C:\ProgramData\ \Monero\ SOFTWARE\monero-project\monero-core wallet_path *.config *.wallet \Coinomi\Coinomi\wallets\ Coinomi app-store.json \Binance\ Binance 0000* MANIFEST-000001 LOG LOCK CURRENT 000003.log \atomic\Local Storage\leveldb\ Atomic file__0.localstorage \jaxx\Local Storage\ Jaxx_Desktop_Old multidoge.wallet \MultiDoge\ MultiDoge default_wallet \ElectronCash\wallets\ ElectronCash info.seco seed.seco passphrase.json \Exodus\exodus.wallet\ window-state.json exodus.conf.json \Exodus\ Exodus \Electrum-LTC\wallets\ ElectrumLTC \Electrum\wallets\ Electrum \Ethereum\ Ethereum" keystore Plugins Wallets | |||||||||||||||
| 3864 | "C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca | C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Shell Experience Host Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (2552) jcj6NOoCJbm | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (2552) jcj6NOoCJbm | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2552) jcj6NOoCJbm | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3864) ShellExperienceHost.exe | Key: | \REGISTRY\A\{dd61acfc-3f49-e750-7d6a-f2c19580fc7c}\LocalState\ClockFlyoutCache |
| Operation: | write | Name: | 20250616 |
Value: 00000000D1044E2D9BE8DB01 | |||
| (PID) Process: | (3864) ShellExperienceHost.exe | Key: | \REGISTRY\A\{dd61acfc-3f49-e750-7d6a-f2c19580fc7c}\LocalState\ClockFlyoutCache |
| Operation: | write | Name: | 20250617 |
Value: 00000000D1044E2D9BE8DB01 | |||
| (PID) Process: | (3864) ShellExperienceHost.exe | Key: | \REGISTRY\A\{dd61acfc-3f49-e750-7d6a-f2c19580fc7c}\LocalState\ClockFlyoutCache |
| Operation: | write | Name: | 20250618 |
Value: 00000000D1044E2D9BE8DB01 | |||
| (PID) Process: | (3864) ShellExperienceHost.exe | Key: | \REGISTRY\A\{dd61acfc-3f49-e750-7d6a-f2c19580fc7c}\LocalState\ClockFlyoutCache |
| Operation: | write | Name: | 20250619 |
Value: 000000000F68502D9BE8DB01 | |||
| (PID) Process: | (3864) ShellExperienceHost.exe | Key: | \REGISTRY\A\{dd61acfc-3f49-e750-7d6a-f2c19580fc7c}\LocalState\ClockFlyoutCache |
| Operation: | write | Name: | 20250620 |
Value: 000000000F68502D9BE8DB01 | |||
| (PID) Process: | (3864) ShellExperienceHost.exe | Key: | \REGISTRY\A\{dd61acfc-3f49-e750-7d6a-f2c19580fc7c}\LocalState\ClockFlyoutCache |
| Operation: | write | Name: | 20250621 |
Value: 000000000F68502D9BE8DB01 | |||
| (PID) Process: | (3864) ShellExperienceHost.exe | Key: | \REGISTRY\A\{dd61acfc-3f49-e750-7d6a-f2c19580fc7c}\LocalState\ClockFlyoutCache |
| Operation: | write | Name: | 20250622 |
Value: 000000000F68502D9BE8DB01 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2460 | 2025-06-29_403eb3d98c5b3408b33d5cce157e4765_black-basta.exe | C:\Users\admin\AppData\Local\Temp\jcj6NOoCJbm | executable | |
MD5:AEB47B393079D8C92169F1EF88DD5696 | SHA256:D83494CFB155056118365455F5396401E97BD50A156242F2B5025A44C67095B1 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1268 | svchost.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1812 | RUXIMICS.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 2.23.181.156:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 2.23.181.156:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1812 | RUXIMICS.exe | GET | 200 | 2.23.181.156:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 149.154.167.99:443 | https://t.me/headlist | unknown | html | 12.0 Kb | whitelisted |
— | — | GET | 200 | 104.102.3.102:443 | https://steamcommunity.com/profiles/76561199235044780 | unknown | html | 36.4 Kb | whitelisted |
2552 | jcj6NOoCJbm | GET | — | 5.75.142.250:80 | http://5.75.142.250/29093c9b43d5e162b74439fa581928e3 | unknown | — | — | unknown |
2940 | svchost.exe | GET | 200 | 104.76.201.34:80 | http://x1.c.lencr.org/ | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5944 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1812 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1268 | svchost.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1812 | RUXIMICS.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 2.23.181.156:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
1812 | RUXIMICS.exe | 2.23.181.156:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
t.me |
| whitelisted |
steamcommunity.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
x1.c.lencr.org |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Unknown Traffic | ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW) |
2552 | jcj6NOoCJbm | Misc activity | ET INFO Observed Telegram Domain (t .me in TLS SNI) |
— | — | A Network Trojan was detected | ET MALWARE Possible Vidar Stealer C2 Config In Steam Profile |
2552 | jcj6NOoCJbm | Misc activity | ET INFO Observed Telegram Domain (t .me in TLS SNI) |
— | — | A Network Trojan was detected | ET MALWARE Possible Vidar Stealer C2 Config In Steam Profile |
— | — | A Network Trojan was detected | ET MALWARE Possible Vidar Stealer C2 Config In Steam Profile |