| File name: | 2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos |
| Full analysis: | https://app.any.run/tasks/228a6b73-a189-4bb9-a014-64e7df3861aa |
| Verdict: | Malicious activity |
| Threats: | A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices. |
| Analysis date: | May 29, 2025, 02:57:56 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections |
| MD5: | E6614465DA44493DB589656A542B279F |
| SHA1: | EAEA6CD895FF35643C26B1B2728FDA947E49E1FA |
| SHA256: | 5C5DBBA7EF207FD839C7D11E21FB76F75726B44A455D03713DEEDFE4DF5D7838 |
| SSDEEP: | 98304:Er7ayGJ6kHOSwPY8K7LiKx/bTfx3dpTMYgNDeecpM4pbc/dvo7MElqCTMfnIL7Mf:k9akL |
| .exe | | | Win32 Executable Borland Delphi 7 (90.7) |
|---|---|---|
| .exe | | | InstallShield setup (5.8) |
| .exe | | | Win32 Executable Delphi generic (1.9) |
| .exe | | | Win32 Executable (generic) (0.6) |
| .exe | | | Win16/32 Executable Delphi generic (0.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 1992:06:19 22:22:17+00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 629760 |
| InitializedDataSize: | 6608896 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x9ab80 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2656 | deliverymechanism=492350f6-3a01-4f97-b9c0-c7c6ddf67d60 productreleaseid=O365ProPlusRetail platform=x64 luca-stealer=remcos scenario=unknown culture=en-us lcid=1033 b= prereleasebuild=4419 tx= cache=2025-05-29 e6614465da44493db589656a542b279f=amadey black-basta=darkgate elex=gcleaner defaultplatform=False forcecentcheck= storeid= productstoadd=O365ProPlusRetail.16_en-us_x-none O365ProPlusRetail.excludedapps=groove,groove updatesenabled=False cdnbaseurl=http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60 version=16.0.18827.20128 mediatype=CDN baseurl=http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60 sourcetype=CDN flt.useexptransportinplacepl=unknown flt.useoutlookshareaddon=unknown flt.useofficehelperaddon=unknown | C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe | ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Office Click-to-Run (SxS) Version: 16.0.18827.20128 Modules
| |||||||||||||||
| 4464 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4988 | C:\WINDOWS\system32\DllHost.exe /Processid:{338B40F9-9D68-4B53-A793-6B9AA0C5F63B} | C:\Windows\System32\dllhost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: COM Surrogate Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5528 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile "$package = Get-AppxPackage Microsoft.Office.Desktop -allUsers; if (!$package) { $Error.Add(\"Package is not installed\")}; if ($error.Count -eq 0) { Out-File -FilePath 'C:\Users\admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '1' -Encoding ascii; } else { Out-File -FilePath 'C:\Users\admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '0' -Encoding ascii; Out-File -FilePath 'C:\Users\admin\AppData\Local\Temp\Office.ValidateError.scratch' -InputObject $error -Encoding ascii;} " | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6032 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6132 | OfficeClickToRun.exe deliverymechanism=492350f6-3a01-4f97-b9c0-c7c6ddf67d60 productreleaseid=O365ProPlusRetail platform=x64 luca-stealer=remcos scenario=CLIENTUPDATE culture=en-us lcid=1033 b= prereleasebuild=4419 tx= cache=2025-05-29 e6614465da44493db589656a542b279f=amadey black-basta=darkgate elex=gcleaner defaultplatform=False forcecentcheck= storeid= productstoadd=O365ProPlusRetail.16_en-us_x-none O365ProPlusRetail.excludedapps=groove,groove updatesenabled=False cdnbaseurl=http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60 version=16.0.18827.20128 mediatype=CDN baseurl=http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60 flt.useexptransportinplacepl=unknown flt.useoutlookshareaddon=unknown flt.useofficehelperaddon=unknown | C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe | ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Office Click-to-Run (SxS) Exit code: 0 Version: 16.0.16026.20140 Modules
| |||||||||||||||
| 6268 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7144 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile "$package = Get-AppxPackage Microsoft.Office.Desktop -allUsers; if (!$package) { $Error.Add(\"Package is not installed\")}; if ($error.Count -eq 0) { Out-File -FilePath 'C:\Users\admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '1' -Encoding ascii; } else { Out-File -FilePath 'C:\Users\admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '0' -Encoding ascii; Out-File -FilePath 'C:\Users\admin\AppData\Local\Temp\Office.ValidateError.scratch' -InputObject $error -Encoding ascii;} " | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7536 | "C:\Users\admin\Desktop\2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe" | C:\Users\admin\Desktop\2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (7536) 2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
| (PID) Process: | (7588) ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | en-US |
Value: 2 | |||
| (PID) Process: | (7588) ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | de-de |
Value: 2 | |||
| (PID) Process: | (7588) ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | fr-fr |
Value: 2 | |||
| (PID) Process: | (7588) ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | es-es |
Value: 2 | |||
| (PID) Process: | (7588) ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | it-it |
Value: 2 | |||
| (PID) Process: | (7588) ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | ja-jp |
Value: 2 | |||
| (PID) Process: | (7588) ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | ko-kr |
Value: 2 | |||
| (PID) Process: | (7588) ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | pt-br |
Value: 2 | |||
| (PID) Process: | (7588) ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | ru-ru |
Value: 2 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7536 | 2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | C:\ProgramData\Synaptics\Synaptics.exe | executable | |
MD5:E6614465DA44493DB589656A542B279F | SHA256:5C5DBBA7EF207FD839C7D11E21FB76F75726B44A455D03713DEEDFE4DF5D7838 | |||
| 7536 | 2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | C:\Users\admin\Desktop\._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | executable | |
MD5:A81E3D5D29F8C19AA91AEC4DCB987C75 | SHA256:0ACE8CE60F6E7C52FBF84947788D08998A955CC56D85C00D56C734428DAB887C | |||
| 7588 | ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe_Rules.xml | xml | |
MD5:C95D5C92D917BC7D4ED950E94A63297D | SHA256:52C02C9F1EB43FB5C56557653F9C9EBDC72780CEB3462A9755F8C72137ECFD33 | |||
| 7940 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_fmsa0n2k.wzv.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7940 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_3u1nisz2.wlt.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7820 | ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\36AC0BE60E1243344AE145F746D881FE | binary | |
MD5:1F7FF83C7BF54319DBD144496C6858D2 | SHA256:9D62C4C88CCF6175328782B09A3AD115FF172A394DEBFDA1F3B796DE21A96D11 | |||
| 7940 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_orowhmso.gal.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7940 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:A19034DE84D5E402731C9498BAE55E14 | SHA256:29CF1320F7D84901629CF642D1867E736A7676BC1DC712A879A5621DC27E2822 | |||
| 7820 | ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A583E2A51BFBDC1E492A57B7C8325850 | binary | |
MD5:86BEC7A51419CF6F8277608E79B2B807 | SHA256:1AE99C253A484A9CB6814FB52AFD40E347DFE2CD6273E50B245695B87C1BC6E5 | |||
| 7820 | ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4C7F163ED126D5C3CB9457F68EC64E9E | binary | |
MD5:544AB9B3B9FCC1F38AA4C73F14BCA274 | SHA256:E7DF581A69CCE963576AD8DA91AD22D9326139DD1910BF53E78883DDD2C4AF6F | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6572 | RUXIMICS.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 13.107.6.156:443 | https://nexusrules.officeapps.live.com/nexus/rules?Application=C2R.exe&Version=16.0.13127.20616&ClientId=%7bD61AB268-C26A-439D-BB15-2A0DEDFCA6A3%7d&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.13127.20616& | unknown | xml | 131 Kb | whitelisted |
— | — | GET | 200 | 52.123.129.14:443 | https://ecs.office.com/config/v2/Office/officeclicktorun/16.0.13127.20616/Production/CC?&Clientid=%7bD61AB268-C26A-439D-BB15-2A0DEDFCA6A3%7d&Application=officeclicktorun&Platform=win32&Version=16.0.13127.20616&MsoVersion=16.0.13127.20616&Audience=Production&Build=ship&Architecture=x86&PerpetualLicense=2019&LicenseCategory=6&LicenseSKU=Professional2019Retail&OsVersion=10.0&OsBuild=19045&Channel=CC&InstallType=C2R&SessionId=%7bBBB01DA1-3748-47EE-A232-E8AD8E8AC6B6%7d&LabMachine=false | unknown | binary | 65.1 Kb | whitelisted |
7832 | Synaptics.exe | GET | 200 | 69.42.215.252:80 | http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978 | unknown | — | — | whitelisted |
— | — | POST | 200 | 20.190.160.4:443 | https://login.live.com/RST2.srf | unknown | xml | 1.24 Kb | whitelisted |
— | — | POST | 400 | 20.190.160.22:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
— | — | POST | 400 | 40.126.32.136:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
— | — | POST | 400 | 20.190.160.130:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6572 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
2104 | svchost.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2104 | svchost.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
6572 | RUXIMICS.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
7588 | ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | 52.123.128.14:443 | ecs.office.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
7588 | ._cache_2025-05-29_e6614465da44493db589656a542b279f_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer_remcos.exe | 52.111.227.14:443 | nexusrules.officeapps.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
3216 | svchost.exe | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
ecs.office.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
xred.mooo.com |
| whitelisted |
freedns.afraid.org |
| whitelisted |
login.live.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Potentially Bad Traffic | ET DYN_DNS DYNAMIC_DNS Query to Abused Domain *.mooo.com |
— | — | A Network Trojan was detected | ET HUNTING Suspicious User-Agent Containing .exe |
— | — | A Network Trojan was detected | ET MALWARE Snake Keylogger Payload Request (GET) |
— | — | A Network Trojan was detected | ET HUNTING Suspicious User-Agent Containing .exe |
— | — | A Network Trojan was detected | ET HUNTING Suspicious User-Agent Containing .exe |
— | — | A Network Trojan was detected | ET HUNTING Suspicious User-Agent Containing .exe |
— | — | A Network Trojan was detected | ET HUNTING Suspicious User-Agent Containing .exe |
— | — | A Network Trojan was detected | ET HUNTING Suspicious User-Agent Containing .exe |