| File name: | random.exe |
| Full analysis: | https://app.any.run/tasks/39bf77eb-cc9d-498b-84bb-59d4c3e0554b |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | September 28, 2025, 05:24:20 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | C07F63674D6C556215B0265BF0B8ADEA |
| SHA1: | 95A31E0FC1C3E46D34CAFB54ACE2750B80854D5D |
| SHA256: | EF70B6FADF514B1F0C1475B6853B8BE2F55966F62B1AB12B25411B4B0FB4CE63 |
| SSDEEP: | 98304:m56y0GLGGsSnNLhMoLqYyG4rqiCoNBb/pEsOA/LCDWd1MutGwUMCvp/XQwGxXNjm:IqUCNiiO |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2057:08:23 00:29:55+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 3043328 |
| InitializedDataSize: | 2048 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x6f8000 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | DownloaderApp |
| FileVersion: | 1.0.0.0 |
| InternalName: | DownloaderApp.exe |
| LegalCopyright: | Copyright © 2025 |
| LegalTrademarks: | - |
| OriginalFileName: | DownloaderApp.exe |
| ProductName: | DownloaderApp |
| ProductVersion: | 1.0.0.0 |
| AssemblyVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 8 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6160 -s 196 | C:\Windows\SysWOW64\WerFault.exe | svchosthelper.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 320 | "C:\WINDOWS\systemhelper.exe" | C:\Windows\systemhelper.exe | random.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 420 | "C:\WINDOWS\explorer.exe" | C:\Windows\explorer.exe | mybotos.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 472 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 504 | NSudoLG -U:T -P:E -UseCurrentConsole "C:\Users\admin\AppData\Local\Temp\CgGwx2I.bat" any_word | C:\Users\admin\AppData\Local\Temp\barer\NSudoLG.exe | — | cmd.exe | |||||||||||
User: admin Company: M2-Team Integrity Level: HIGH Description: NSudo Launcher Exit code: 0 Version: 9.0.2676.0 Modules
| |||||||||||||||
| 504 | reg query "HKLM\Software\Microsoft\Windows NT\CurrentVersion" /v "ProductName" | C:\Windows\System32\reg.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Registry Console Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 536 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | dCliKji.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 592 | reg add "HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Themes\Personalize" /v "AppsUseLightTheme" /t reg_dword /d 0 /f | C:\Windows\SysWOW64\reg.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Console Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 700 | "C:\ProgramData\mybotos.exe" | C:\ProgramData\mybotos.exe | hJFvGvb.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 828 | "C:\Windows\System32\cmd.exe" /c sc query IObitUnlocker | C:\Windows\System32\cmd.exe | — | game.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Command Processor Exit code: 1060 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6808) svchostam.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (6808) svchostam.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (6808) svchostam.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3760) WerFault.exe | Key: | \REGISTRY\A\{ed9754e3-e571-cefe-e892-dab2b8d61755}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
| (PID) Process: | (3760) WerFault.exe | Key: | \REGISTRY\A\{ed9754e3-e571-cefe-e892-dab2b8d61755}\Root\InventoryApplicationFile\PermissionsCheckTestKey |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (3760) WerFault.exe | Key: | \REGISTRY\A\{ed9754e3-e571-cefe-e892-dab2b8d61755}\Root\InventoryApplicationFile\svchostam.exe|1caa8885a4a95e0f |
| Operation: | write | Name: | ProgramId |
Value: 000615939ed0ac2ba175cc44be91a649a1c20000ffff | |||
| (PID) Process: | (3760) WerFault.exe | Key: | \REGISTRY\A\{ed9754e3-e571-cefe-e892-dab2b8d61755}\Root\InventoryApplicationFile\svchostam.exe|1caa8885a4a95e0f |
| Operation: | write | Name: | FileId |
Value: 0000c1b667b0ff98bbb1d2495b4fd5dda1eeca494799 | |||
| (PID) Process: | (3760) WerFault.exe | Key: | \REGISTRY\A\{ed9754e3-e571-cefe-e892-dab2b8d61755}\Root\InventoryApplicationFile\svchostam.exe|1caa8885a4a95e0f |
| Operation: | write | Name: | LowerCaseLongPath |
Value: c:\windows\temp\svchostam.exe | |||
| (PID) Process: | (3760) WerFault.exe | Key: | \REGISTRY\A\{ed9754e3-e571-cefe-e892-dab2b8d61755}\Root\InventoryApplicationFile\svchostam.exe|1caa8885a4a95e0f |
| Operation: | write | Name: | LongPathHash |
Value: svchostam.exe|1caa8885a4a95e0f | |||
| (PID) Process: | (3760) WerFault.exe | Key: | \REGISTRY\A\{ed9754e3-e571-cefe-e892-dab2b8d61755}\Root\InventoryApplicationFile\svchostam.exe|1caa8885a4a95e0f |
| Operation: | write | Name: | Name |
Value: svchostam.exe | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3760 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchostam.exe_460c115342eaebf4e874c1245ef65dba855d3_0099dbc6_5ba0fc73-379d-4971-8826-f5879193fe1c\Report.wer | — | |
MD5:— | SHA256:— | |||
| 6376 | random.exe | C:\Users\admin\AppData\Local\Temp\svchostam.exe | executable | |
MD5:156F4A8F006779A3493D9D476F1E8DDA | SHA256:C36ED034D523DA1F54D43176334D4BDA9F9ADCB940948646B43902A620EBDA45 | |||
| 1588 | random.exe | C:\Windows\systemhelper.exe | executable | |
MD5:B81B123A16AC281FEEC76E54170A229B | SHA256:2043BF8934DFC1F94A386BAD14AC43EA551218CEF0E42E9CDAE191CF16E833E3 | |||
| 4072 | random.exe | C:\Windows\Temp\svchostam.exe | executable | |
MD5:156F4A8F006779A3493D9D476F1E8DDA | SHA256:C36ED034D523DA1F54D43176334D4BDA9F9ADCB940948646B43902A620EBDA45 | |||
| 1588 | random.exe | C:\Windows\svchosthelper.exe | executable | |
MD5:156F4A8F006779A3493D9D476F1E8DDA | SHA256:C36ED034D523DA1F54D43176334D4BDA9F9ADCB940948646B43902A620EBDA45 | |||
| 5456 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:69EFB83D756DB8772921EB751AFEC8C1 | SHA256:CC5E9F0FF0F359B2DD33183C3B16C57CCAEC39C862011EC78950645B8924711A | |||
| 3760 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WERF27B.tmp.xml | xml | |
MD5:20E6D21D0A064EC9270810F06A6CD7AD | SHA256:1556BF96045400663AEDD46D1D5AA2EE8820F4BA3C6BE764CE1346F52D86A781 | |||
| 5456 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ja4wd0fh.zxz.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 3636 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchosthelper.ex_44e01fb1b1e2d52ea19b98f32377bc7b5b43ab1_f1495998_a1f5c4fd-0295-46c5-a311-88e9c3027cae\Report.wer | — | |
MD5:— | SHA256:— | |||
| 5456 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_dxiosg3o.n3t.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | GET | 200 | 23.53.41.90:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6292 | RUXIMICS.exe | GET | 200 | 23.53.41.90:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.53.41.90:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6292 | RUXIMICS.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6808 | svchostam.exe | POST | 200 | 94.154.35.25:80 | http://94.154.35.25/di9ku38f/index.php | unknown | — | — | unknown |
6808 | svchostam.exe | GET | 200 | 178.16.55.189:80 | http://178.16.55.189/files/7639673951/TQ4Zi2D.exe | unknown | — | — | unknown |
— | — | GET | 200 | 2.19.176.104:443 | https://www.bing.com/manifest/threshold.appcache | unknown | text | 2.92 Kb | unknown |
6808 | svchostam.exe | POST | 200 | 94.154.35.25:80 | http://94.154.35.25/di9ku38f/index.php | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1268 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6292 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.53.41.90:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 23.53.41.90:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6292 | RUXIMICS.exe | 23.53.41.90:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
6292 | RUXIMICS.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
watson.events.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
github.com |
| whitelisted |
release-assets.githubusercontent.com |
| whitelisted |
steamcommunity.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Unknown Traffic | ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW) |
6808 | svchostam.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 15 |
6808 | svchostam.exe | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Amadey HTTP POST Request (st=s) |
6808 | svchostam.exe | Malware Command and Control Activity Detected | ET MALWARE Amadey CnC Response |
6808 | svchostam.exe | A Network Trojan was detected | MALWARE [ANY.RUN] Win32/Generic related IP address |
6808 | svchostam.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 33 |
6808 | svchostam.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
6808 | svchostam.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
6808 | svchostam.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
6808 | svchostam.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
random.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
random.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
random.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
IObitUnlocker.exe | PostAction_Delete |
IObitUnlocker.exe | FileCount:289 |
IObitUnlocker.exe | C:\ProgramData\Microsoft\Windows Defender-------- |
IObitUnlocker.exe | C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection-------- |
IObitUnlocker.exe | C:\ProgramData\Microsoft\Windows Security Health-------- |
IObitUnlocker.exe | C:\ProgramData\Microsoft\Storage Health-------- |
IObitUnlocker.exe | C:\Program Files\Windows Defender-------- |