Threat Database Adware 'Microsoft Azure' Pop-Ups

'Microsoft Azure' Pop-Ups

By GoldSparrow in Adware
Translate To:

Threat Scorecard

Popularity Rank: 21,446
Threat Level: 10 % (Normal)
Infected Computers: 1
First Seen: September 26, 2022
Last Seen: August 17, 2025
OS(es) Affected: Windows

The 'Microsoft Azure' pop-up windows that may be shown in the foreground of new tab pages titled 'Google Security Alert' should not be trusted. Azure by Microsoft is a cloud service that offers cloud storage and server functionality to business worldwide, but the 'Microsoft Azure' has nothing to do with that. Moreover, the Google Safebrowsing Web filter maintained by Google Inc. is not connected to the Azure services by Microsoft. The 'Microsoft Azure' alerts are created by con artists who use names, logos, slogans, and fake security verification banners to make users believe they were infected with a virus or were attacked by a hacker remotely. The 'Microsoft Azure' messages contain misleading information and aim to convince users to call a toll-free phone line like 888-790-4177. The phone lines operated by the 'Microsoft Azure' con artists offer PC users to subscribe to premium technical support services. The services promoted via the 'Microsoft Azure' windows are nonexistent. The 'Microsoft Azure' pop-up windows may offer the following text:

'Microsoft Azure
Firewall detecting ‘suspicious’ incoming network connections, we recommend that you click “Back to Safety”
For help, Call: +1888-790-4177
Your computer has been Locked
Your computer with the IP address [your real IP address] has been infected by the Trojans – Because System Activation KEY has expired & Your information (for example, passwords, messages, and credit cards) have been stolen. Call the Windows Help Desk to protect your files and identity from further damage.
Call Now: +1888-790-4177
Automatically report details of possible incidents to Google.
'

It is recommended to report the pages associated with the 'Microsoft Azure' tech support tactic by using your browser's built-in security features. Do not call 888-790-4177 or other numbers that may be found on the 'Google Security Alert' new tabs and 'Microsoft Azure' warnings. Google Inc. and Microsoft Corp. are not associated with services that are promoted via phishing pages and fake security alerts. You can find tips on how to access the security reports in Chrome, Firefox, Opera, Edge and IE below:

  • Edge: Open the browser's menu and click 'Send Feedback' then choose 'Report site issue', enter the URL and add a short explanation about your experience.
  • Internet Explorer 11: Click on the gear icon, chose 'Safety' and then click 'Report unsafe site,' in the pop-up window mark the category of the site and complete the CAPTCHA challenge.
  • Google Chrome: Click on the three dots icon, mark 'Help' and chose 'Report an issue'. You can add a few sentences as a comment and click 'Send.'
  • Mozilla Firefox: Open the browser's menu and navigate to 'Help' (the question mark icon) and click on 'Report Deceptive Site.'
  • Opera: Click on the site's badge located in the URL bar and click 'Details' then load the 'Fraud and Malware Protection' tab and click 'Report Site.'

Analysis Report

General information

Family Name: PUP.MSIL.Gamehack.BBB
Signature status: No Signature

Known Samples

MD5: 8296381459450412ce697bb6dc424d89
SHA1: 17e7c306464a17f799d278a1f89e7f8c53527b55
SHA256: 72BAFE252CC232CBEDE729C87698B08A1ABB515D7C155D9BA8D97F9A50DF3574
File Size: 83.46 KB, 83456 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Assembly Version 0.0.0.0
File Version 0.0.0.0
Internal Name BTD Backend.dll
Original Filename BTD Backend.dll
Product Version 0.0.0.0

File Traits

  • .NET
  • dll
  • WriteProcessMemory
  • x86

Block Information

Total Blocks: 200
Potentially Malicious Blocks: 112
Whitelisted Blocks: 88
Unknown Blocks: 0

Visual Map

0 0 x x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 x 0 0 x x x x x x x x 0 0 0 0 0 0 0 x x 0 0 x x 0 0 x x x x x x x x x x x x x 0 0 x x x x x x x x x 0 0 0 x x x x 0 0 0 0 x x x x x x 0 0 0 x x x x 0 0 0 x x x x 0 x x 0 0 x x 0 x 0 x x x x x 0 x x 0 0 0 x 0 x x 0 x x x 0 x 0 x x 0 0 x 0 x x x 0 0 0 0 0 0 x x x x x 0 x x 0 0 0 0 0 0 x x 0 x x 0 x x x x x x x x x x 0 0 0 0 0 0 x x 0 0 0 x x 0 0 0 x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Gamehack.BBB

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
Show More
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • win32u.dll!NtGdiBitBlt
  • win32u.dll!NtGdiCreateBitmap
  • win32u.dll!NtGdiCreateCompatibleDC
  • win32u.dll!NtGdiCreateDIBitmapInternal
  • win32u.dll!NtGdiCreateSolidBrush
  • win32u.dll!NtGdiDeleteObjectApp
  • win32u.dll!NtGdiExtGetObjectW
  • win32u.dll!NtGdiGetDCforBitmap
  • win32u.dll!NtGdiGetDCObject
  • win32u.dll!NtGdiGetDeviceCaps
  • win32u.dll!NtGdiRestoreDC
  • win32u.dll!NtGdiSaveDC
  • win32u.dll!NtGdiSelectBitmap
  • win32u.dll!NtGdiSetDIBitsToDeviceInternal
  • win32u.dll!NtUserBuildHwndList
  • win32u.dll!NtUserCallTwoParam
  • win32u.dll!NtUserCreateEmptyCursorObject
  • win32u.dll!NtUserCreateWindowEx
  • win32u.dll!NtUserDestroyWindow
  • win32u.dll!NtUserFindExistingCursorIcon
  • win32u.dll!NtUserGetAncestor
  • win32u.dll!NtUserGetClassInfoEx
  • win32u.dll!NtUserGetClassName
  • win32u.dll!NtUserGetDC
  • win32u.dll!NtUserGetGUIThreadInfo
  • win32u.dll!NtUserGetIconInfo
  • win32u.dll!NtUserGetIconSize
  • win32u.dll!NtUserGetImeInfoEx
  • win32u.dll!NtUserGetKeyboardLayout
  • win32u.dll!NtUserGetObjectInformation
  • win32u.dll!NtUserGetProcessWindowStation
  • win32u.dll!NtUserGetProp
  • win32u.dll!NtUserGetThreadDesktop
  • win32u.dll!NtUserGetThreadState
  • win32u.dll!NtUserGetWindowCompositionAttribute
  • win32u.dll!NtUserIsNonClientDpiScalingEnabled
  • win32u.dll!NtUserIsTopLevelWindow
  • win32u.dll!NtUserMessageCall
  • win32u.dll!NtUserRegisterClassExWOW
  • win32u.dll!NtUserRegisterWindowMessage
  • win32u.dll!NtUserReleaseDC
  • win32u.dll!NtUserRemoveProp
  • win32u.dll!NtUserSelectPalette
  • win32u.dll!NtUserSetCursorIconData
  • win32u.dll!NtUserSetWindowFNID
  • win32u.dll!NtUserSetWindowLongPtr
  • win32u.dll!NtUserSetWindowPos
  • win32u.dll!NtUserUpdateInputContext

Trending

Most Viewed

Loading...