File name:

5f63f607753bf791af3fe74f3d4780aa.exe

Full analysis: https://app.any.run/tasks/01783c6d-a1c1-4147-a6ad-1886d5ab74ec
Verdict: Malicious activity
Threats:

Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.

Analysis date: June 07, 2025, 18:32:46
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
lumma
stealer
loader
amadey
botnet
uac
themida
rdp
crypto-regex
payload
ms-smartcard
delphi
hijackloader
auto
generic
fileshare
upx
susp-powershell
salatstealer
golang
evasion
telegram
pastebin
gcleaner
clipper
diamotrix
miner
coinminer
ims-api
ip-check
inno
installer
purecrypter
arch-doc
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

5F63F607753BF791AF3FE74F3D4780AA

SHA1:

A175B6FD7BDB30D85DCA515BD4D7EF918FAACA81

SHA256:

49EE94B236F2FE57E6DC077471923C10D723855937D868ED955EAF2EE0A7B390

SSDEEP:

98304:kK5JDmPsgi/Vs7IO1zBj6tqk03VOQN9rwhHfUtr36Z5eObB+FAglXwbE7/m6y7dm:

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA mutex has been found

      • 5f63f607753bf791af3fe74f3d4780aa.exe (PID: 5324)
    • LUMMA has been detected (SURICATA)

      • 5f63f607753bf791af3fe74f3d4780aa.exe (PID: 5324)
      • svchost.exe (PID: 2196)
      • rZBRvVk.exe (PID: 236)
      • MSBuild.exe (PID: 7280)
    • Connects to the CnC server

      • svchost.exe (PID: 2196)
      • ramez.exe (PID: 7980)
      • varen.exe (PID: 8072)
    • AMADEY mutex has been found

      • 2RQLX6TXUVH0UBQBN5GSC7.exe (PID: 6700)
      • ramez.exe (PID: 7980)
      • ramez.exe (PID: 4172)
    • AMADEY has been detected (SURICATA)

      • ramez.exe (PID: 7980)
      • varen.exe (PID: 8072)
    • Bypass User Account Control (Modify registry)

      • qGWEfC7.exe (PID: 7268)
      • qGWEfC7.exe (PID: 2136)
    • Bypass User Account Control (fodhelper)

      • fodhelper.exe (PID: 6324)
      • fodhelper.exe (PID: 2600)
    • Execute application with conhost.exe as parent process

      • cmd.exe (PID: 7544)
      • cmd.exe (PID: 2332)
    • AMADEY has been detected (YARA)

      • ramez.exe (PID: 7980)
      • varen.exe (PID: 8072)
    • Changes the autorun value in the registry

      • KH0c8cp.exe (PID: 7996)
    • Steals credentials from Web Browsers

      • 5f63f607753bf791af3fe74f3d4780aa.exe (PID: 5324)
      • EngineX-Aurora.exe (PID: 7924)
      • PortalDoc.exe (PID: 5592)
    • Actions looks like stealing of personal data

      • 5f63f607753bf791af3fe74f3d4780aa.exe (PID: 5324)
      • EngineX-Aurora.exe (PID: 7924)
      • PortalDoc.exe (PID: 5592)
    • HIJACKLOADER has been detected (YARA)

      • EngineX-Aurora.exe (PID: 7460)
      • Generator-Circuit.exe (PID: 2332)
    • SALATSTEALER has been detected (YARA)

      • EngineX-Aurora.exe (PID: 7924)
    • GENERIC has been found (auto)

      • Generator-Circuit.exe (PID: 2332)
      • Generator-Circuit.exe (PID: 236)
      • b88adc304b.exe (PID: 7940)
      • RazorSy.exe (PID: 8084)
    • Executing a file with an untrusted certificate

      • Rjsjsfn.exe (PID: 7500)
      • Rjsjsfn.exe (PID: 3796)
      • XPFix.exe (PID: 8152)
      • jaWoO4E.exe (PID: 7104)
      • jaWoO4E.exe (PID: 7500)
      • b88adc304b.exe (PID: 7940)
      • 3Svu0S9.exe (PID: 7128)
      • XPFix.exe (PID: 3036)
      • XPFix.exe (PID: 5972)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 5228)
      • powershell.exe (PID: 7832)
      • powershell.exe (PID: 448)
      • powershell.exe (PID: 7212)
      • powershell.exe (PID: 2088)
    • Registers / Runs the DLL via REGSVR32.EXE

      • Rjsjsfn.tmp (PID: 2896)
      • jaWoO4E.tmp (PID: 6456)
    • AMADEY has been found (auto)

      • amnew.exe (PID: 7512)
      • ramez.exe (PID: 7980)
    • LUMMA has been detected (YARA)

      • rZBRvVk.exe (PID: 236)
    • Looks like the application has launched a miner

      • VYUG3A9CMZJBJDSL7LZC4.exe (PID: 2192)
    • DIAMOTRIX has been detected (SURICATA)

      • explorer.exe (PID: 5492)
      • 1A36.tmp.exe (PID: 8164)
    • GCLEANER has been detected (SURICATA)

      • b88adc304b.exe (PID: 7940)
    • COINMINER has been found (auto)

      • ramez.exe (PID: 7980)
    • PURECRYPTER has been detected (SURICATA)

      • MSBuild.exe (PID: 2236)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 2088)
  • SUSPICIOUS

    • Reads the BIOS version

      • 5f63f607753bf791af3fe74f3d4780aa.exe (PID: 5324)
      • 2RQLX6TXUVH0UBQBN5GSC7.exe (PID: 6700)
      • ramez.exe (PID: 7980)
      • ramez.exe (PID: 4172)
    • Potential Corporate Privacy Violation

      • 5f63f607753bf791af3fe74f3d4780aa.exe (PID: 5324)
      • ramez.exe (PID: 7980)
      • varen.exe (PID: 8072)
      • explorer.exe (PID: 5492)
      • b88adc304b.exe (PID: 7940)
    • Searches for installed software

      • 5f63f607753bf791af3fe74f3d4780aa.exe (PID: 5324)
    • Connects to the server without a host name

      • 5f63f607753bf791af3fe74f3d4780aa.exe (PID: 5324)
      • ramez.exe (PID: 7980)
      • varen.exe (PID: 8072)
      • explorer.exe (PID: 5492)
      • b88adc304b.exe (PID: 7940)
      • net.exe (PID: 7840)
      • 1A36.tmp.exe (PID: 8164)
    • Executable content was dropped or overwritten

      • 5f63f607753bf791af3fe74f3d4780aa.exe (PID: 5324)
      • 2RQLX6TXUVH0UBQBN5GSC7.exe (PID: 6700)
      • ramez.exe (PID: 7980)
      • Hnrh7mE.exe (PID: 6192)
      • EngineX-Aurora.exe (PID: 2340)
      • EngineX-Aurora.exe (PID: 7460)
      • UmoAnpd.exe (PID: 7172)
      • EngineX-Aurora.exe (PID: 7924)
      • PortalDoc.exe (PID: 5592)
      • mRM6vf2pOmt1S0IDANR.exe (PID: 3008)
      • Generator-Circuit.exe (PID: 2332)
      • Rjsjsfn.exe (PID: 7500)
      • Rjsjsfn.tmp (PID: 2284)
      • df0ca8684c.exe (PID: 5608)
      • powershell.exe (PID: 5228)
      • amnew.exe (PID: 7512)
      • Rjsjsfn.exe (PID: 3796)
      • Rjsjsfn.tmp (PID: 2896)
      • jaWoO4E.exe (PID: 7104)
      • jaWoO4E.tmp (PID: 6824)
      • jaWoO4E.exe (PID: 7500)
      • jaWoO4E.tmp (PID: 6456)
      • varen.exe (PID: 8072)
      • powershell.exe (PID: 7832)
      • regsvr32.exe (PID: 7136)
      • explorer.exe (PID: 5492)
      • 443B.tmp.exe (PID: 1284)
      • rZBRvVk.exe (PID: 236)
      • pZ1D3jB.exe (PID: 1168)
      • Generator-Circuit.exe (PID: 7768)
      • Generator-Circuit.exe (PID: 236)
      • Rf6sGGq.exe (PID: 6824)
      • b88adc304b.exe (PID: 7940)
      • RazorSy.exe (PID: 8004)
      • RazorSy.exe (PID: 8084)
      • FusProcessor86.exe (PID: 6072)
      • Rf6sGGq.exe (PID: 5964)
    • Contacting a server suspected of hosting an CnC

      • 5f63f607753bf791af3fe74f3d4780aa.exe (PID: 5324)
      • svchost.exe (PID: 2196)
      • ramez.exe (PID: 7980)
      • MSBuild.exe (PID: 7280)
      • rZBRvVk.exe (PID: 236)
      • varen.exe (PID: 8072)
      • MSBuild.exe (PID: 2236)
    • Reads security settings of Internet Explorer

      • 2RQLX6TXUVH0UBQBN5GSC7.exe (PID: 6700)
      • ramez.exe (PID: 7980)
      • qGWEfC7.exe (PID: 7268)
      • qGWEfC7.exe (PID: 2136)
      • Hnrh7mE.exe (PID: 6192)
      • UmoAnpd.exe (PID: 1616)
      • PortalDoc.exe (PID: 5592)
    • Starts itself from another location

      • 2RQLX6TXUVH0UBQBN5GSC7.exe (PID: 6700)
      • EngineX-Aurora.exe (PID: 2340)
      • UmoAnpd.exe (PID: 7172)
      • EngineX-Aurora.exe (PID: 7924)
      • amnew.exe (PID: 7512)
      • Generator-Circuit.exe (PID: 7768)
      • RazorSy.exe (PID: 8004)
    • Process requests binary or script from the Internet

      • ramez.exe (PID: 7980)
      • 5f63f607753bf791af3fe74f3d4780aa.exe (PID: 5324)
      • varen.exe (PID: 8072)
      • explorer.exe (PID: 5492)
    • Changes default file association

      • qGWEfC7.exe (PID: 7268)
      • qGWEfC7.exe (PID: 2136)
    • Reads the date of Windows installation

      • qGWEfC7.exe (PID: 7268)
      • qGWEfC7.exe (PID: 2136)
      • PortalDoc.exe (PID: 5592)
    • Executing commands from a ".bat" file

      • conhost.exe (PID: 5864)
      • conhost.exe (PID: 6816)
    • There is functionality for enable RDP (YARA)

      • ramez.exe (PID: 7980)
      • varen.exe (PID: 8072)
    • Starts CMD.EXE for commands execution

      • conhost.exe (PID: 5864)
      • conhost.exe (PID: 6816)
      • df0ca8684c.exe (PID: 5608)
      • cmd.exe (PID: 4348)
      • Rf6sGGq.exe (PID: 6824)
      • Rf6sGGq.exe (PID: 512)
      • Rf6sGGq.exe (PID: 4844)
      • Item.exe (PID: 8040)
      • MSBuild.exe (PID: 2204)
      • dllhost.exe (PID: 704)
    • Executes application which crashes

      • qZrPQzc.exe (PID: 7552)
      • qZrPQzc.exe (PID: 8032)
      • WM7SD3HTDOSE5IWWPW89GIHDKR.exe (PID: 7284)
    • Connects to unusual port

      • KH0c8cp.exe (PID: 7996)
      • MSBuild.exe (PID: 2236)
      • 1A36.tmp.exe (PID: 8164)
      • AddInProcess.exe (PID: 4672)
    • Found regular expressions for crypto-addresses (YARA)

      • KH0c8cp.exe (PID: 7996)
    • There is functionality for taking screenshot (YARA)

      • KH0c8cp.exe (PID: 7996)
      • EngineX-Aurora.exe (PID: 7924)
      • mRM6vf2pOmt1S0IDANR.exe (PID: 3008)
      • varen.exe (PID: 8072)
    • The process executes via Task Scheduler

      • ramez.exe (PID: 4172)
      • ramez.exe (PID: 616)
      • varen.exe (PID: 6920)
      • regsvr32.exe (PID: 7280)
      • varen.exe (PID: 6276)
      • ramez.exe (PID: 2192)
      • regsvr32.exe (PID: 5124)
      • powershell.exe (PID: 448)
      • powershell.exe (PID: 7212)
      • Item.exe (PID: 8040)
      • regsvr32.exe (PID: 704)
      • ramez.exe (PID: 6900)
      • varen.exe (PID: 5984)
      • regsvr32.exe (PID: 864)
      • services.exe (PID: 2340)
      • EngineX-Aurora.exe (PID: 5408)
      • powershell.exe (PID: 2088)
      • dllhost.exe (PID: 704)
    • Application launched itself

      • UmoAnpd.exe (PID: 1616)
      • cmd.exe (PID: 4348)
      • 443B.tmp.exe (PID: 1284)
      • Rf6sGGq.exe (PID: 4844)
      • Item.exe (PID: 8040)
      • MSBuild.exe (PID: 2204)
    • Smart Card resource manager service initialization

      • svchost.exe (PID: 7956)
    • The process creates files with name similar to system file names

      • UmoAnpd.exe (PID: 7172)
    • Starts POWERSHELL.EXE for commands execution

      • EngineX-Aurora.exe (PID: 7924)
      • Rjsjsfn.tmp (PID: 2896)
      • regsvr32.exe (PID: 7136)
      • jaWoO4E.tmp (PID: 6456)
      • regsvr32.exe (PID: 2240)
      • regsvr32.exe (PID: 5124)
      • regsvr32.exe (PID: 864)
    • Gets path to any of the special folders (POWERSHELL)

      • powershell.exe (PID: 5868)
    • Multiple wallet extension IDs have been found

      • EngineX-Aurora.exe (PID: 7924)
    • The process drops C-runtime libraries

      • mRM6vf2pOmt1S0IDANR.exe (PID: 3008)
      • 443B.tmp.exe (PID: 1284)
      • Generator-Circuit.exe (PID: 7768)
      • pZ1D3jB.exe (PID: 1168)
    • Process drops legitimate windows executable

      • mRM6vf2pOmt1S0IDANR.exe (PID: 3008)
      • ramez.exe (PID: 7980)
      • 443B.tmp.exe (PID: 1284)
      • Rf6sGGq.exe (PID: 6824)
      • pZ1D3jB.exe (PID: 1168)
      • Generator-Circuit.exe (PID: 7768)
      • Rf6sGGq.exe (PID: 5964)
    • Checks for external IP

      • GoogleChrome.exe (PID: 8020)
      • df0ca8684c.exe (PID: 5608)
      • svchost.exe (PID: 2196)
      • regsvr32.exe (PID: 7136)
      • Zip.exe (PID: 5744)
    • The executable file from the user directory is run by the CMD process

      • GoogleChrome.exe (PID: 8020)
      • Rf6sGGq.exe (PID: 4844)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • GoogleChrome.exe (PID: 8020)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 4784)
    • The process bypasses the loading of PowerShell profile settings

      • regsvr32.exe (PID: 7136)
      • regsvr32.exe (PID: 2240)
    • The process hide an interactive prompt from the user

      • regsvr32.exe (PID: 7136)
      • regsvr32.exe (PID: 2240)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • GoogleChrome.exe (PID: 8020)
    • There is functionality for capture public ip (YARA)

      • GoogleChrome.exe (PID: 8020)
    • Process uses IPCONFIG to discard the IP address configuration

      • cmd.exe (PID: 6208)
      • cmd.exe (PID: 516)
      • cmd.exe (PID: 3760)
      • cmd.exe (PID: 2268)
      • cmd.exe (PID: 7412)
    • Starts a Microsoft application from unusual location

      • Rf6sGGq.exe (PID: 6824)
      • Rf6sGGq.exe (PID: 512)
      • Rf6sGGq.exe (PID: 4844)
      • DgO51N6.exe (PID: 4572)
      • Rf6sGGq.exe (PID: 5964)
    • Process drops python dynamic module

      • 443B.tmp.exe (PID: 1284)
    • Process uses IPCONFIG to renew DHCP configuration

      • cmd.exe (PID: 6516)
      • cmd.exe (PID: 4932)
      • cmd.exe (PID: 1324)
      • cmd.exe (PID: 4540)
    • Executes as Windows Service

      • VSSVC.exe (PID: 7392)
  • INFO

    • Reads the time zone

      • MusNotifyIcon.exe (PID: 8012)
    • Checks supported languages

      • 5f63f607753bf791af3fe74f3d4780aa.exe (PID: 5324)
      • 2RQLX6TXUVH0UBQBN5GSC7.exe (PID: 6700)
      • ramez.exe (PID: 7980)
      • qGWEfC7.exe (PID: 7268)
      • RUXIMICS.exe (PID: 5024)
      • qZrPQzc.exe (PID: 7552)
      • KH0c8cp.exe (PID: 7996)
      • KH0c8cp.exe (PID: 7952)
      • qZrPQzc.exe (PID: 8032)
      • qGWEfC7.exe (PID: 2136)
      • Hnrh7mE.exe (PID: 6192)
      • EngineX-Aurora.exe (PID: 2340)
      • EngineX-Aurora.exe (PID: 7460)
      • ramez.exe (PID: 4172)
      • UmoAnpd.exe (PID: 1616)
      • UmoAnpd.exe (PID: 7172)
      • EngineX-Aurora.exe (PID: 7924)
      • EngineX-Aurora.exe (PID: 6824)
      • PortalDoc.exe (PID: 5592)
      • EngineX-Aurora.exe (PID: 6792)
      • jY8tSjS.exe (PID: 4988)
      • mRM6vf2pOmt1S0IDANR.exe (PID: 3008)
      • rZBRvVk.exe (PID: 236)
    • Create files in a temporary directory

      • 5f63f607753bf791af3fe74f3d4780aa.exe (PID: 5324)
      • 2RQLX6TXUVH0UBQBN5GSC7.exe (PID: 6700)
      • ramez.exe (PID: 7980)
      • qGWEfC7.exe (PID: 7268)
      • qGWEfC7.exe (PID: 2136)
      • Hnrh7mE.exe (PID: 6192)
      • EngineX-Aurora.exe (PID: 7460)
      • EngineX-Aurora.exe (PID: 7924)
      • PortalDoc.exe (PID: 5592)
      • mRM6vf2pOmt1S0IDANR.exe (PID: 3008)
    • Creates files in the program directory

      • MusNotifyIcon.exe (PID: 8012)
      • RUXIMICS.exe (PID: 5024)
      • svchost.exe (PID: 7936)
      • EngineX-Aurora.exe (PID: 2340)
      • svchost.exe (PID: 7360)
      • EngineX-Aurora.exe (PID: 7924)
      • UmoAnpd.exe (PID: 7172)
    • Reads the software policy settings

      • 5f63f607753bf791af3fe74f3d4780aa.exe (PID: 5324)
      • WaaSMedicAgent.exe (PID: 5236)
      • consent.exe (PID: 8176)
      • SIHClient.exe (PID: 7688)
      • consent.exe (PID: 7528)
      • slui.exe (PID: 5968)
      • consent.exe (PID: 4284)
      • PortalDoc.exe (PID: 5592)
    • Reads the computer name

      • 5f63f607753bf791af3fe74f3d4780aa.exe (PID: 5324)
      • 2RQLX6TXUVH0UBQBN5GSC7.exe (PID: 6700)
      • ramez.exe (PID: 7980)
      • qGWEfC7.exe (PID: 7268)
      • KH0c8cp.exe (PID: 7996)
      • KH0c8cp.exe (PID: 7952)
      • qGWEfC7.exe (PID: 2136)
      • EngineX-Aurora.exe (PID: 2340)
      • Hnrh7mE.exe (PID: 6192)
      • EngineX-Aurora.exe (PID: 7460)
      • UmoAnpd.exe (PID: 1616)
      • EngineX-Aurora.exe (PID: 7924)
      • UmoAnpd.exe (PID: 7172)
      • EngineX-Aurora.exe (PID: 6792)
      • EngineX-Aurora.exe (PID: 6824)
      • PortalDoc.exe (PID: 5592)
      • jY8tSjS.exe (PID: 4988)
    • Process checks computer location settings

      • 2RQLX6TXUVH0UBQBN5GSC7.exe (PID: 6700)
      • ramez.exe (PID: 7980)
      • qGWEfC7.exe (PID: 7268)
      • qGWEfC7.exe (PID: 2136)
      • Hnrh7mE.exe (PID: 6192)
      • UmoAnpd.exe (PID: 1616)
      • PortalDoc.exe (PID: 5592)
    • Checks proxy server information

      • ramez.exe (PID: 7980)
      • PortalDoc.exe (PID: 5592)
    • Creates files or folders in the user directory

      • ramez.exe (PID: 7980)
      • WerFault.exe (PID: 6464)
      • WerFault.exe (PID: 4020)
      • EngineX-Aurora.exe (PID: 7460)
      • UmoAnpd.exe (PID: 7172)
    • Reads Environment values

      • qGWEfC7.exe (PID: 7268)
      • KH0c8cp.exe (PID: 7996)
      • KH0c8cp.exe (PID: 7952)
      • qGWEfC7.exe (PID: 2136)
    • Reads the machine GUID from the registry

      • qGWEfC7.exe (PID: 7268)
      • KH0c8cp.exe (PID: 7996)
      • KH0c8cp.exe (PID: 7952)
      • qGWEfC7.exe (PID: 2136)
      • UmoAnpd.exe (PID: 1616)
      • UmoAnpd.exe (PID: 7172)
      • EngineX-Aurora.exe (PID: 7924)
      • EngineX-Aurora.exe (PID: 6792)
      • EngineX-Aurora.exe (PID: 6824)
      • PortalDoc.exe (PID: 5592)
    • Reads security settings of Internet Explorer

      • fodhelper.exe (PID: 6324)
      • fodhelper.exe (PID: 2600)
    • Themida protector has been detected

      • ramez.exe (PID: 7980)
      • rZBRvVk.exe (PID: 236)
      • GoogleChrome.exe (PID: 8020)
    • The sample compiled with english language support

      • ramez.exe (PID: 7980)
      • Hnrh7mE.exe (PID: 6192)
      • EngineX-Aurora.exe (PID: 2340)
      • EngineX-Aurora.exe (PID: 7460)
      • mRM6vf2pOmt1S0IDANR.exe (PID: 3008)
      • varen.exe (PID: 8072)
      • 443B.tmp.exe (PID: 1284)
      • pZ1D3jB.exe (PID: 1168)
      • Generator-Circuit.exe (PID: 7768)
      • Generator-Circuit.exe (PID: 236)
      • msiexec.exe (PID: 7552)
      • RazorSy.exe (PID: 8004)
      • RazorSy.exe (PID: 8084)
      • explorer.exe (PID: 5492)
    • Launching a file from a Registry key

      • KH0c8cp.exe (PID: 7996)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • EngineX-Aurora.exe (PID: 7924)
    • Compiled with Borland Delphi (YARA)

      • EngineX-Aurora.exe (PID: 7460)
      • Rjsjsfn.exe (PID: 3796)
      • Rjsjsfn.tmp (PID: 2896)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 5868)
    • Checks current location (POWERSHELL)

      • powershell.exe (PID: 5868)
    • Detects GO elliptic curve encryption (YARA)

      • EngineX-Aurora.exe (PID: 7924)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 5868)
    • Found Base64 encoded access to Windows Defender via PowerShell (YARA)

      • EngineX-Aurora.exe (PID: 7924)
    • Application based on Golang

      • EngineX-Aurora.exe (PID: 7924)
      • regsvr32.exe (PID: 7136)
    • UPX packer has been detected

      • EngineX-Aurora.exe (PID: 7924)
    • Found Base64 encoded access to environment variables via PowerShell (YARA)

      • EngineX-Aurora.exe (PID: 7924)
    • The sample compiled with chinese language support

      • Generator-Circuit.exe (PID: 2332)
      • Generator-Circuit.exe (PID: 236)
      • RazorSy.exe (PID: 8084)
    • Detects InnoSetup installer (YARA)

      • Rjsjsfn.exe (PID: 3796)
      • Rjsjsfn.tmp (PID: 2896)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 7552)
    • Manages system restore points

      • SrTasks.exe (PID: 6792)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:06:03 17:31:21+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 322048
InitializedDataSize: 38400
UninitializedDataSize: -
EntryPoint: 0x4af000
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
323
Monitored processes
202
Malicious processes
44
Suspicious processes
24

Behavior graph

Click at the process to see the details
start #LUMMA 5f63f607753bf791af3fe74f3d4780aa.exe #LUMMA svchost.exe sppextcomobj.exe no specs slui.exe 2rqlx6txuvh0ubqbn5gsc7.exe #AMADEY ramez.exe qgwefc7.exe no specs fodhelper.exe no specs fodhelper.exe conhost.exe no specs cmd.exe no specs qzrpqzc.exe werfault.exe no specs kh0c8cp.exe kh0c8cp.exe no specs qzrpqzc.exe werfault.exe no specs qgwefc7.exe no specs fodhelper.exe no specs fodhelper.exe conhost.exe no specs cmd.exe no specs slui.exe hnrh7me.exe enginex-aurora.exe #HIJACKLOADER enginex-aurora.exe ramez.exe no specs umoanpd.exe no specs portaldoc.exe umoanpd.exe #SALATSTEALER enginex-aurora.exe powershell.exe no specs conhost.exe no specs enginex-aurora.exe no specs enginex-aurora.exe no specs tcpvcon.exe no specs jy8tsjs.exe no specs mrm6vf2pomt1s0idanr.exe #LUMMA rzbrvvk.exe #GENERIC generator-circuit.exe quancluster86.exe df0ca8684c.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs ping.exe no specs googlechrome.exe 08iyoof.exe no specs #LUMMA msbuild.exe xpfix.exe no specs conhost.exe no specs rjsjsfn.exe rjsjsfn.tmp rjsjsfn.exe rjsjsfn.tmp powershell.exe conhost.exe no specs regsvr32.exe no specs regsvr32.exe powershell.exe no specs conhost.exe no specs #AMADEY amnew.exe #AMADEY varen.exe powershell.exe no specs conhost.exe no specs jawoo4e.exe jawoo4e.tmp jawoo4e.exe jawoo4e.tmp powershell.exe conhost.exe no specs #GCLEANER b88adc304b.exe regsvr32.exe no specs powershell.exe no specs conhost.exe no specs ramez.exe no specs varen.exe no specs powershell.exe no specs conhost.exe no specs rf6sggq.exe cmd.exe no specs conhost.exe no specs ipconfig.exe no specs vyug3a9cmzjbjdsl7lzc4.exe no specs conhost.exe no specs #DIAMOTRIX explorer.exe zip.exe t-rex.exe no specs conhost.exe no specs 443b.tmp.exe wm7sd3htdose5iwwpw89gihdkr.exe werfault.exe no specs 443b.tmp.exe no specs svchost.exe no specs svchost.exe no specs svchost.exe no specs consent.exe no specs svchost.exe no specs ruximics.exe no specs waasmedicagent.exe no specs wmiprvse.exe no specs svchost.exe werfault.exe no specs conhost.exe no specs svchost.exe no specs svchost.exe no specs svchost.exe no specs svchost.exe no specs consent.exe no specs sihclient.exe svchost.exe no specs svchost.exe no specs musnotifyicon.exe no specs consent.exe no specs rf6sggq.exe no specs cmd.exe no specs conhost.exe no specs ipconfig.exe no specs consent.exe no specs cmd.exe conhost.exe no specs rf6sggq.exe no specs pz1d3jb.exe generator-circuit.exe cmd.exe no specs conhost.exe no specs ipconfig.exe no specs #GENERIC generator-circuit.exe 3svu0s9.exe no specs fusprocessor86.exe regsvr32.exe no specs regsvr32.exe no specs msiexec.exe no specs msiexec.exe razorsy.exe #GENERIC razorsy.exe varen.exe no specs ramez.exe no specs xpfix.exe no specs dgo51n6.exe no specs rf6sggq.exe conhost.exe no specs net.exe cmd.exe no specs conhost.exe no specs ipconfig.exe no specs regsvr32.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs jhrmm0hzesaknwsevvnybk.exe no specs circuitanal.exe wmiprvse.exe no specs powershell.exe no specs conhost.exe no specs xpfix.exe no specs 30de.tmp.exe no specs msiexec.exe no specs vssvc.exe no specs svchost.exe no specs item.exe no specs cmd.exe no specs conhost.exe no specs ipconfig.exe no specs svchost.exe srtasks.exe no specs conhost.exe no specs razorsy.exe no specs svchost.exe no specs item.exe no specs cmd.exe no specs conhost.exe no specs ipconfig.exe no specs regsvr32.exe no specs regsvr32.exe no specs msbuild.exe no specs cmd.exe no specs conhost.exe no specs ipconfig.exe no specs varen.exe no specs ramez.exe no specs conhost.exe no specs regsvr32.exe no specs powershell.exe no specs conhost.exe no specs services.exe no specs enginex-aurora.exe no specs #PURECRYPTER msbuild.exe cmd.exe no specs conhost.exe no specs ipconfig.exe no specs #DIAMOTRIX 1a36.tmp.exe powershell.exe no specs conhost.exe no specs addinprocess.exe conhost.exe no specs dllhost.exe no specs cmd.exe no specs conhost.exe no specs ipconfig.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
236"C:\Users\admin\AppData\Local\Temp\10321730101\rZBRvVk.exe" C:\Users\admin\AppData\Local\Temp\10321730101\rZBRvVk.exe
ramez.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\10321730101\rzbrvvk.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
236C:\ProgramData\helpquick\Generator-Circuit.exeC:\ProgramData\helpquick\Generator-Circuit.exe
Generator-Circuit.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\programdata\helpquick\generator-circuit.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
448"powershell.exe" -WindowStyle Hidden -NoProfile -Command "Add-MpPreference -ExclusionPath 'C:\Users\admin\AppData\Roaming\MemberType\Item.exe' -Force ; Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\' -Force ; Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe' -Force ; Add-MpPreference -ExclusionPath 'C:\Users\admin\AppData\Local\Temp\' -Force ; Add-MpPreference -ExclusionProcess 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe' -Force ; Add-MpPreference -ExclusionProcess 'C:\Users\admin\AppData\Roaming\MemberType\Item.exe' -Force"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
512"C:\Users\admin\AppData\Local\Temp\10321790101\Rf6sGGq.exe"C:\Users\admin\AppData\Local\Temp\10321790101\Rf6sGGq.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.2.20348.1
Modules
Images
c:\users\admin\appdata\local\temp\10321790101\rf6sggq.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
516"C:\Windows\System32\cmd.exe" /c ipconfig /releaseC:\Windows\System32\cmd.exeRf6sGGq.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
616"C:\Users\admin\AppData\Local\Temp\d610cf342e\ramez.exe"C:\Users\admin\AppData\Local\Temp\d610cf342e\ramez.exesvchost.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\d610cf342e\ramez.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
632\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
660\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeVYUG3A9CMZJBJDSL7LZC4.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
704"C:\WINDOWS\system32\regsvr32.EXE" /s /i:googlechromebusiness.msi "\\?\C:\Users\admin\AppData\Local\2BlanchedAlmond.pfx"C:\Windows\System32\regsvr32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Exit code:
4
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
704"C:\Users\admin\AppData\Roaming\dllhost.exe"C:\Users\admin\AppData\Roaming\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Version:
6.2.20348.1
Modules
Images
c:\users\admin\appdata\roaming\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
149 656
Read events
149 111
Write events
466
Delete events
79

Modification events

(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconLayouts
Value:
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
(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconNameVersion
Value:
1
(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
Operation:writeName:LastUpdate
Value:
D485446800000000
(PID) Process:(7980) ramez.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7980) ramez.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7980) ramez.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(7268) qGWEfC7.exeKey:HKEY_CLASSES_ROOT\ms-settings\Shell\Open\command
Operation:writeName:DelegateExecute
Value:
(PID) Process:(6324) fodhelper.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6324) fodhelper.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6324) fodhelper.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
173
Suspicious files
189
Text files
94
Unknown types
0

Dropped files

PID
Process
Filename
Type
53245f63f607753bf791af3fe74f3d4780aa.exeC:\Users\admin\AppData\Local\Temp\2RQLX6TXUVH0UBQBN5GSC7.exeexecutable
MD5:0E0E8C0994368C9B1EC84767941E5178
SHA256:380B990C2445D29CA67DFED8788B55CF9B1BB0AFCCC063FABAB775826D1D5447
5492explorer.exeC:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.datbinary
MD5:E49C56350AEDF784BFE00E444B879672
SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E
5024RUXIMICS.exeC:\ProgramData\PLUG\Logs\RUXIMLog.049.etlbinary
MD5:C8834D365FAE073DEDE1F1620454CE71
SHA256:C6DD793EEE1D5551CA507A3C5BFFECA82DD3E29C63C2C6DD218A7D4BFB37046B
67002RQLX6TXUVH0UBQBN5GSC7.exeC:\Users\admin\AppData\Local\Temp\d610cf342e\ramez.exeexecutable
MD5:0E0E8C0994368C9B1EC84767941E5178
SHA256:380B990C2445D29CA67DFED8788B55CF9B1BB0AFCCC063FABAB775826D1D5447
7980ramez.exeC:\Users\admin\AppData\Local\Temp\10321600101\qGWEfC7.exeexecutable
MD5:8BD6232AE71C898D38DA2FDA12CEB8A4
SHA256:CF3387A8FF2903C8C3326E84502046B1B35E8C7EB9531ECE894E255EEED44035
67002RQLX6TXUVH0UBQBN5GSC7.exeC:\Windows\Tasks\ramez.jobbinary
MD5:6D588B47E43024D6EAA216A399D86B5A
SHA256:E17E2899DD02F7F706C8CF121951678614E27962A585BAC486AA7E83C9EC501F
5024RUXIMICS.exeC:\ProgramData\PLUG\Logs\RUXIMLog.048.etlbinary
MD5:5EA68411BF8E9EAF4621BAF73F61449E
SHA256:9D4CA5A1D871F819C139A498BB910A63576C2FE6367853544F8D172D8B6EBFF7
5024RUXIMICS.exeC:\ProgramData\PLUG\Logs\RUXIMLog.046.etlbinary
MD5:FED961067F664B5381B65A534B7AB728
SHA256:652F31A8284AE812D1D9D24192BC800976BF74C240591C6AC443A28C4709FB7C
5024RUXIMICS.exeC:\ProgramData\PLUG\Logs\RUXIMLog.042.etlbinary
MD5:8A2BDE0EAFA7E946196A1B114AB636E9
SHA256:1C338CBDD9316D7FD8F208341466FEDC554A04D489B3A86C736EC3831A2F2BA2
7268qGWEfC7.exeC:\Users\admin\AppData\Local\Temp\SYYNWPPLCP.battext
MD5:F29D09E4395E9FD27B123A2BECF5E352
SHA256:AF367C1ADE331C04EB9B2DC672B7A779F4BE9D23D59DA3F8FC74FC187CD09747
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
95
TCP/UDP connections
133
DNS requests
43
Threats
137

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7980
ramez.exe
POST
200
185.156.72.96:80
http://185.156.72.96/te4h2nus/index.php
unknown
unknown
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5324
5f63f607753bf791af3fe74f3d4780aa.exe
GET
200
185.156.72.2:80
http://185.156.72.2/mine/random.exe
unknown
malicious
7980
ramez.exe
GET
200
185.156.72.2:80
http://185.156.72.2/files/1781548144/qGWEfC7.exe
unknown
malicious
7980
ramez.exe
POST
200
185.156.72.96:80
http://185.156.72.96/te4h2nus/index.php
unknown
unknown
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7980
ramez.exe
POST
200
185.156.72.96:80
http://185.156.72.96/te4h2nus/index.php
unknown
unknown
7688
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7688
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
7628
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
896
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.137:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5324
5f63f607753bf791af3fe74f3d4780aa.exe
195.82.147.188:443
battlefled.top
Dreamtorrent Corp
RU
malicious
4
System
192.168.100.255:138
whitelisted
5324
5f63f607753bf791af3fe74f3d4780aa.exe
185.156.72.2:80
Tov Vaiz Partner
RU
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
google.com
  • 142.250.74.206
whitelisted
crl.microsoft.com
  • 23.48.23.137
  • 23.48.23.144
  • 23.48.23.139
  • 23.48.23.141
  • 23.48.23.194
  • 23.48.23.148
  • 23.48.23.193
  • 23.48.23.147
  • 23.48.23.140
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 2.23.246.101
whitelisted
battlefled.top
  • 195.82.147.188
unknown
login.live.com
  • 40.126.32.74
  • 20.190.160.14
  • 20.190.160.64
  • 40.126.32.133
  • 20.190.160.65
  • 20.190.160.3
  • 20.190.160.4
  • 20.190.160.5
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.250
  • 172.211.123.249
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
2196
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (battlefled .top)
5324
5f63f607753bf791af3fe74f3d4780aa.exe
Misc Attack
ET DROP Dshield Block Listed Source group 1
5324
5f63f607753bf791af3fe74f3d4780aa.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (battlefled .top) in TLS SNI
5324
5f63f607753bf791af3fe74f3d4780aa.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (battlefled .top) in TLS SNI
5324
5f63f607753bf791af3fe74f3d4780aa.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (battlefled .top) in TLS SNI
5324
5f63f607753bf791af3fe74f3d4780aa.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (battlefled .top) in TLS SNI
5324
5f63f607753bf791af3fe74f3d4780aa.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (battlefled .top) in TLS SNI
5324
5f63f607753bf791af3fe74f3d4780aa.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (battlefled .top) in TLS SNI
5324
5f63f607753bf791af3fe74f3d4780aa.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
No debug info