Source: global traffic | TCP traffic: 192.168.2.4:49730 -> 45.76.89.70:80 payload: data raw: 7b 22 69 64 22 3a 31 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6c 6f 67 69 6e 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 6c 6f 67 69 6e 22 3a 22 34 37 45 35 6e 45 67 51 4b 41 67 43 70 68 56 66 4b 31 4b 42 66 41 53 72 5a 56 6e 79 78 6b 68 73 46 45 75 57 75 45 63 61 39 4c 6e 58 56 62 46 79 48 74 71 31 63 43 75 45 6b 56 4c 55 62 34 73 76 52 7a 41 79 6a 4b 48 79 55 65 37 66 53 67 63 70 71 75 57 63 4e 53 74 48 53 47 68 31 75 32 78 22 2c 22 70 61 73 73 22 3a 22 22 2c 22 61 67 65 6e 74 22 3a 22 58 4d 52 69 67 2f 36 2e 31 39 2e 33 20 28 57 69 6e 64 6f 77 73 20 4e 54 20 31 30 2e 30 3b 20 57 69 6e 36 34 3b 20 78 36 34 29 20 6c 69 62 75 76 2f 31 2e 33 38 2e 30 20 6d 73 76 63 2f 32 30 32 32 22 2c 22 72 69 67 69 64 22 3a 22 22 2c 22 61 6c 67 6f 22 3a 5b 22 72 78 2f 30 22 2c 22 63 6e 2f 32 22 2c 22 63 6e 2f 72 22 2c 22 63 6e 2f 66 61 73 74 22 2c 22 63 6e 2f 68 61 6c 66 22 2c 22 63 6e 2f 78 61 6f 22 2c 22 63 6e 2f 72 74 6f 22 2c 22 63 6e 2f 72 77 7a 22 2c 22 63 6e 2f 7a 6c 73 22 2c 22 63 6e 2f 64 6f 75 62 6c 65 22 2c 22 63 6e 2f 63 63 78 22 2c 22 63 6e 2d 6c 69 74 65 2f 31 22 2c 22 63 6e 2d 68 65 61 76 79 2f 30 22 2c 22 63 6e 2d 68 65 61 76 79 2f 74 75 62 65 22 2c 22 63 6e 2d 68 65 61 76 79 2f 78 68 76 22 2c 22 63 6e 2d 70 69 63 6f 22 2c 22 63 6e 2d 70 69 63 6f 2f 74 6c 6f 22 2c 22 63 6e 2f 75 70 78 32 22 2c 22 63 6e 2f 67 70 75 22 2c 22 63 6e 2f 31 22 2c 22 72 78 2f 77 6f 77 22 2c 22 72 78 2f 61 72 71 22 2c 22 72 78 2f 67 72 61 66 74 22 2c 22 72 78 2f 73 66 78 22 2c 22 72 78 2f 6b 65 76 61 22 2c 22 70 61 6e 74 68 65 72 61 22 2c 22 61 72 67 6f 6e 32 2f 63 68 75 6b 77 61 22 2c 22 61 72 67 6f 6e 32 2f 63 68 75 6b 77 61 76 32 22 2c 22 61 72 67 6f 6e 32 2f 6e 69 6e 6a 61 22 2c 22 67 68 6f 73 74 72 69 64 65 72 22 5d 7d 7d 0a data ascii: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"47e5negqkagcphvfk1kbfasrzvnyxkhsfeuwueca9lnxvbfyhtq1ccuekvlub4svrzayjkhyue7fsgcpquwcnsthsgh1u2x","pass":"","agent":"xmrig/6.19.3 (windows nt 10.0; win64; x64) libuv/1.38.0 msvc/2022","rigid":"","algo":["rx/0","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","cn/gpu","cn/1","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"]}} |
Source: svchost.exe, 0000000B.00000002.2950853523.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: stratum+tcp:// |
Source: svchost.exe | String found in binary or memory: cryptonight-monerov7 |
Source: svchost.exe, 0000000B.00000002.2950853523.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: -o, --url=URL URL of mining server |
Source: svchost.exe, 0000000B.00000002.2950853523.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: stratum+tcp:// |
Source: svchost.exe, 0000000B.00000002.2950853523.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: Usage: xmrig [OPTIONS] |
Source: svchost.exe, 0000000B.00000002.2950853523.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: Usage: xmrig [OPTIONS] |
Source: bypass.exe, 00000000.00000003.1699005516.0000014AEA650000.00000004.00000001.00020000.00000000.sdmp, pluplcmhlbmi.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0 |
Source: bypass.exe, 00000000.00000003.1699005516.0000014AEA650000.00000004.00000001.00020000.00000000.sdmp, pluplcmhlbmi.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/Root.crl0 |
Source: bypass.exe, 00000000.00000003.1699005516.0000014AEA650000.00000004.00000001.00020000.00000000.sdmp, pluplcmhlbmi.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0 |
Source: bypass.exe, 00000000.00000003.1699005516.0000014AEA650000.00000004.00000001.00020000.00000000.sdmp, pluplcmhlbmi.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/primobject.crl0 |
Source: svchost.exe, 0000000B.00000002.2950853523.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: https://172.94.1q |
Source: svchost.exe, 0000000B.00000002.2950853523.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: https://xmrig.com/docs/algorithms |
Source: 11.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: 11.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Monero Crypto Coin Miner Author: Florian Roth |
Source: 11.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE | Matched rule: Detects coinmining malware Author: ditekSHen |
Source: 0000000B.00000002.2950853523.0000000140001000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: Process Memory Space: svchost.exe PID: 7576, type: MEMORYSTR | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: 11.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: 11.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 11.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 0000000B.00000002.2950853523.0000000140001000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: Process Memory Space: svchost.exe PID: 7576, type: MEMORYSTR | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7344:120:WilError_03 |
Source: C:\Windows\System32\svchost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Global\rmcuxmbqqvwccwdx |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7392:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7440:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7536:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7488:120:WilError_03 |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: unknown | Process created: C:\Users\user\Desktop\bypass.exe "C:\Users\user\Desktop\bypass.exe" | |
Source: C:\Users\user\Desktop\bypass.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\bypass.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\bypass.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\bypass.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\bypass.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\bypass.exe | Process created: C:\Windows\System32\svchost.exe svchost.exe | |
Source: C:\Users\user\Desktop\bypass.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | Jump to behavior |
Source: C:\Users\user\Desktop\bypass.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | Jump to behavior |
Source: C:\Users\user\Desktop\bypass.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | Jump to behavior |
Source: C:\Users\user\Desktop\bypass.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | Jump to behavior |
Source: C:\Users\user\Desktop\bypass.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | Jump to behavior |
Source: C:\Users\user\Desktop\bypass.exe | Process created: C:\Windows\System32\svchost.exe svchost.exe | Jump to behavior |
Source: C:\Users\user\Desktop\bypass.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: svchost.exe, 0000000B.00000002.2951724426.000001960B22F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXE |
Source: svchost.exe, 0000000B.00000002.2951724426.000001960B22F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: --CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE |
Source: svchost.exe, 0000000B.00000002.2951724426.000001960B22F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXE' |
Source: svchost.exe, 0000000B.00000002.2951724426.000001960B22F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SVCHOST.EXE--ALGO=RX/0--URL=POOL.HASHVAULT.PRO:80--USER=47E5NEGQKAGCPHVFK1KBFASRZVNYXKHSFEUWUECA9LNXVBFYHTQ1CCUEKVLUB4SVRZAYJKHYUE7FSGCPQUWCNSTHSGH1U2X--PASS=--CPU-MAX-THREADS-HINT=60--CINIT-WINRING=PLUPLCMHLBMI.SYS--CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE--CINIT-VERSION=3.4.0--CINIT-IDLE-WAIT=5--CINIT-IDLE-CPU=80--CINIT-ID=RMCUXMBQQVWCCWDX |
Source: svchost.exe, 0000000B.00000003.1700136874.000001960B26A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXERMCUXMBQQVWCCWDX |
Source: svchost.exe, 0000000B.00000002.2951800590.000001960B27D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\WINDOWS\SYSTEM32\WBEM\WBEMPROX.DLLLTASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE@ |
Source: svchost.exe, 0000000B.00000002.2951724426.000001960B22F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X/0 --URL=POOL.HASHVAULT.PRO:80 --USER="47E5NEGQKAGCPHVFK1KBFASRZVNYXKHSFEUWUECA9LNXVBFYHTQ1CCUEKVLUB4SVRZAYJKHYUE7FSGCPQUWCNSTHSGH1U2X" --PASS="" --CPU-MAX-THREADS-HINT=60 --CINIT-WINRING="PLUPLCMHLBMI.SYS" --CINIT-STEALTH-TARGETS="TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE" --CINIT-VERSION="3.4.0" --CINIT-IDLE-WAIT=5 --CINIT-IDLE-CPU=80 --CINIT-ID="RMCUXMBQQVWCCWDX" |
Source: svchost.exe, 0000000B.00000002.2951724426.000001960B22F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: TX/0 --URL=POOL.HASHVAULT.PRO:80 --USER="47E5NEGQKAGCPHVFK1KBFASRZVNYXKHSFEUWUECA9LNXVBFYHTQ1CCUEKVLUB4SVRZAYJKHYUE7FSGCPQUWCNSTHSGH1U2X" --PASS="" --CPU-MAX-THREADS-HINT=60 --CINIT-WINRING="PLUPLCMHLBMI.SYS" --CINIT-STEALTH-TARGETS="TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE" --CINIT-VERSION="3.4.0" --CINIT-IDLE-WAIT=5 --CINIT-IDLE-CPU=80 --CINIT-ID="RMCUXMBQQVWCCWDX"+ |
Source: svchost.exe, 0000000B.00000003.1700136874.000001960B26A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2951800590.000001960B27D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2951724426.000001960B22F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE |
Source: svchost.exe, 0000000B.00000002.2951724426.000001960B22F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXEV |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |