Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose, |
0_2_004339B6 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose, |
0_2_00452492 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_00442886 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
0_2_004788BD |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose, |
0_2_0045CAFA |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_00431A86 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, |
0_2_0044BD27 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0045DE8F FindFirstFileW,FindClose, |
0_2_0045DE8F |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, |
0_2_0044BF8B |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09197EE4h |
2_2_09197C30 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 091963C0h |
2_2_091961E0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09196D4Ah |
2_2_091961E0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0919862Eh |
2_2_09198210 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0919862Eh |
2_2_09198206 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0919862Eh |
2_2_0919855C |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then mov dword ptr [ebp-14h], 00000000h |
2_2_091956F0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924FAE3h |
2_2_0924F810 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924E318h |
2_2_0924DFD8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924D124h |
2_2_0924CE78 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09243BCCh |
2_2_09243920 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09244024h |
2_2_09243D78 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09246FECh |
2_2_09246D40 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09247444h |
2_2_09247198 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924789Ch |
2_2_092475F0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924447Ch |
2_2_092441D0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924C2DCh |
2_2_0924C030 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 092462E4h |
2_2_09246038 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 092492ACh |
2_2_09249000 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924331Ch |
2_2_09243070 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09249704h |
2_2_09249458 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09249B5Ch |
2_2_092498B0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924C734h |
2_2_0924C488 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924673Ch |
2_2_09246490 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924CB8Eh |
2_2_0924C8E0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09246B94h |
2_2_092468E8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09243774h |
2_2_092434C8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924B5D4h |
2_2_0924B328 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924D9D4h |
2_2_0924D728 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 092455DCh |
2_2_09245330 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 092489FCh |
2_2_09248750 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09248E54h |
2_2_09248BA8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924BA2Ch |
2_2_0924B780 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924DE2Ch |
2_2_0924DB80 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09245A34h |
2_2_09245788 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09245E8Ch |
2_2_09245BE0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924BE84h |
2_2_0924BBD8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 092448D4h |
2_2_09244628 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924AD24h |
2_2_0924AA78 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09247CF4h |
2_2_09247A48 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924814Ch |
2_2_09247EA0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09244D2Ch |
2_2_09244A80 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 092485A4h |
2_2_092482F8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924B17Ch |
2_2_0924AED0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 0924D57Ch |
2_2_0924D2D0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 4x nop then jmp 09245184h |
2_2_09244ED8 |
Source: svchost.exe, 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded |
Source: svchost.exe, 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.0000000005501000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://aborters.duckdns.org:8081 |
Source: svchost.exe, 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.0000000005501000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://anotherarmy.dns.army:8081 |
Source: svchost.exe, 00000002.00000002.4639663388.0000000005501000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.org |
Source: svchost.exe, 00000002.00000002.4639663388.0000000005501000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.org/ |
Source: svchost.exe, 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.org/q |
Source: svchost.exe, 00000002.00000002.4639663388.0000000005501000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: svchost.exe, 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.0000000005501000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://varders.kozow.com:8081 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: svchost.exe, 00000002.00000002.4639663388.00000000055E4000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.telegram.org |
Source: svchost.exe, 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.00000000055E4000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.telegram.org/bot |
Source: svchost.exe, 00000002.00000002.4639663388.00000000055E4000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text= |
Source: svchost.exe, 00000002.00000002.4639663388.00000000055E4000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20a |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: svchost.exe, 00000002.00000002.4639663388.00000000056A7000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.00000000056D8000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://chrome.google.com/webstore?hl=en |
Source: svchost.exe, 00000002.00000002.4639663388.00000000056A2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://chrome.google.com/webstore?hl=enlB |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: svchost.exe, 00000002.00000002.4639663388.000000000554D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.00000000055BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.00000000055E4000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org |
Source: svchost.exe, 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.000000000554D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: svchost.exe, 00000002.00000002.4639663388.0000000005578000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.187 |
Source: svchost.exe, 00000002.00000002.4639663388.00000000055BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.00000000055E4000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.0000000005578000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.187$ |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: svchost.exe, 00000002.00000002.4639663388.00000000056D8000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.office.com/ |
Source: svchost.exe, 00000002.00000002.4639663388.00000000056D3000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.office.com/lB |
Source: 0.2.#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe.3e30000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 2.2.svchost.exe.7e10000.5.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7e10000.5.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7e10000.5.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.3271f20.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.3.svchost.exe.3271f20.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.3.svchost.exe.3271f20.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7d50f20.3.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7d50f20.3.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7d50f20.3.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.3271000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.3.svchost.exe.3271000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.3.svchost.exe.3271000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.3271000.1.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.3.svchost.exe.3271000.1.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.3.svchost.exe.3271000.1.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7e10000.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7e10000.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7e10000.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.3271f20.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.3.svchost.exe.3271f20.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.3.svchost.exe.3271f20.0.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 2.2.svchost.exe.3374f2e.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.3374f2e.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.3374f2e.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.3374f2e.2.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.3374f2e.2.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.3374f2e.2.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7d50f20.3.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7d50f20.3.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7d50f20.3.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.400000.1.unpack, type: UNPACKEDPE |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000000.00000002.2200420683.0000000003E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 00000002.00000002.4637698281.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: Process Memory Space: svchost.exe PID: 6256, type: MEMORYSTR |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_000C2720 RegOpenKeyExW,RegOpenKeyExW,RegOpenKeyExW,RegCloseKey,RegCloseKey,HeapAlloc,RegQueryValueExW,ExpandEnvironmentStringsW,LCMapStringW,RegQueryValueExW,HeapFree,AcquireSRWLockShared,ReleaseSRWLockShared,HeapAlloc,memcpy,memcpy,AcquireSRWLockExclusive,ReleaseSRWLockExclusive,RegGetValueW,ActivateActCtx,LoadLibraryExW,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,ActivateActCtx,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,ActivateActCtx,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,RegCloseKey,HeapAlloc,RegGetValueW,WideCharToMultiByte,HeapAlloc,WideCharToMultiByte,HeapFree,ExpandEnvironmentStringsW,HeapFree,CreateActCtxW,GetLastError,HeapFree,HeapFree,GetLastError,CreateActCtxW,GetLastError,ReleaseActCtx,GetLastError,GetLastError,RtlNtStatusToDosError,GetLastError,LoadLibraryExW,RtlNtStatusToDosError,LoadLibraryExW,RtlNtStatusToDosError,HeapFree,ReleaseActCtx, |
2_2_000C2720 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_000C3540 RtlImageNtHeader,RpcMgmtSetServerStackSize,I_RpcServerDisableExceptionFilter,RtlSetProcessIsCritical,SetProcessMitigationPolicy,SetProcessMitigationPolicy,SetProcessMitigationPolicy,SetProtectedPolicy,HeapSetInformation,NtSetInformationProcess, |
2_2_000C3540 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_000C33C0 NtSetInformationProcess,SetUnhandledExceptionFilter,SetErrorMode,GetProcessHeap,InitializeSRWLock,InitializeSRWLock,RegDisablePredefinedCacheEx,EtwEventRegister,GetCommandLineW,memset,GetCurrentProcess,NtSetInformationProcess,HeapFree,HeapFree,ExitProcess,GetCurrentProcess,SetProcessAffinityUpdateMode, |
2_2_000C33C0 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_004096A0 |
0_2_004096A0 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0042200C |
0_2_0042200C |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0041A217 |
0_2_0041A217 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_00412216 |
0_2_00412216 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0042435D |
0_2_0042435D |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_004033C0 |
0_2_004033C0 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0044F430 |
0_2_0044F430 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_004125E8 |
0_2_004125E8 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0044663B |
0_2_0044663B |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_00413801 |
0_2_00413801 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0042096F |
0_2_0042096F |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_004129D0 |
0_2_004129D0 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_004119E3 |
0_2_004119E3 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0041C9AE |
0_2_0041C9AE |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0047EA6F |
0_2_0047EA6F |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0040FA10 |
0_2_0040FA10 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0044EB5F |
0_2_0044EB5F |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_00423C81 |
0_2_00423C81 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_00411E78 |
0_2_00411E78 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_00442E0C |
0_2_00442E0C |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_00420EC0 |
0_2_00420EC0 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0044CF17 |
0_2_0044CF17 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_00444FD2 |
0_2_00444FD2 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_03C33678 |
0_2_03C33678 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_000C2720 |
2_2_000C2720 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_00408C60 |
2_2_00408C60 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0040DC11 |
2_2_0040DC11 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_00407C3F |
2_2_00407C3F |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_00418CCC |
2_2_00418CCC |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_00406CA0 |
2_2_00406CA0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_004028B0 |
2_2_004028B0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0041A4BE |
2_2_0041A4BE |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_00418244 |
2_2_00418244 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_00401650 |
2_2_00401650 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_00402F20 |
2_2_00402F20 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_004193C4 |
2_2_004193C4 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_00418788 |
2_2_00418788 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_00402F89 |
2_2_00402F89 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_00402B90 |
2_2_00402B90 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_004073A0 |
2_2_004073A0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FD4F0 |
2_2_051FD4F0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FC4E0 |
2_2_051FC4E0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FD7C8 |
2_2_051FD7C8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051F7630 |
2_2_051F7630 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FD218 |
2_2_051FD218 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FA2F0 |
2_2_051FA2F0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FCC68 |
2_2_051FCC68 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FCF40 |
2_2_051FCF40 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051F6EB8 |
2_2_051F6EB8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051F2EF8 |
2_2_051F2EF8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FEEE0 |
2_2_051FEEE0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FC990 |
2_2_051FC990 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051F5890 |
2_2_051F5890 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FD4EA |
2_2_051FD4EA |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FD7B8 |
2_2_051FD7B8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FC6A8 |
2_2_051FC6A8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051F4320 |
2_2_051F4320 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FD20A |
2_2_051FD20A |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FCC58 |
2_2_051FCC58 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FCF30 |
2_2_051FCF30 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FEED0 |
2_2_051FEED0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051FC980 |
2_2_051FC980 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_051F586F |
2_2_051F586F |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09197C30 |
2_2_09197C30 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09196E60 |
2_2_09196E60 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_091961E0 |
2_2_091961E0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0919A2D0 |
2_2_0919A2D0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09197548 |
2_2_09197548 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0919E5E0 |
2_2_0919E5E0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0919FC0F |
2_2_0919FC0F |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09197C2A |
2_2_09197C2A |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0919FC20 |
2_2_0919FC20 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0919DE38 |
2_2_0919DE38 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0919DE48 |
2_2_0919DE48 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09196E4F |
2_2_09196E4F |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_091961D0 |
2_2_091961D0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0919126F |
2_2_0919126F |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09191280 |
2_2_09191280 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0919A2C7 |
2_2_0919A2C7 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0919753A |
2_2_0919753A |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_091956F0 |
2_2_091956F0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_091956E2 |
2_2_091956E2 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924F810 |
2_2_0924F810 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924DFD8 |
2_2_0924DFD8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924EA38 |
2_2_0924EA38 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924CE78 |
2_2_0924CE78 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09243920 |
2_2_09243920 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09246D31 |
2_2_09246D31 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09249D08 |
2_2_09249D08 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09243910 |
2_2_09243910 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09243D68 |
2_2_09243D68 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09243D78 |
2_2_09243D78 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09246D40 |
2_2_09246D40 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_092441BF |
2_2_092441BF |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09247188 |
2_2_09247188 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09247198 |
2_2_09247198 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_092475E1 |
2_2_092475E1 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_092475F0 |
2_2_092475F0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_092441D0 |
2_2_092441D0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09246028 |
2_2_09246028 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924C030 |
2_2_0924C030 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09246038 |
2_2_09246038 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09240006 |
2_2_09240006 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09249000 |
2_2_09249000 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924C01F |
2_2_0924C01F |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09243060 |
2_2_09243060 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09243070 |
2_2_09243070 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924C47A |
2_2_0924C47A |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09240040 |
2_2_09240040 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924944A |
2_2_0924944A |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09249458 |
2_2_09249458 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_092498A1 |
2_2_092498A1 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_092498B0 |
2_2_092498B0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_092434B9 |
2_2_092434B9 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09246480 |
2_2_09246480 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924C488 |
2_2_0924C488 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09246490 |
2_2_09246490 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924C8E0 |
2_2_0924C8E0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_092468E8 |
2_2_092468E8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_092434C8 |
2_2_092434C8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_092468D7 |
2_2_092468D7 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924C8D0 |
2_2_0924C8D0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09245320 |
2_2_09245320 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924B328 |
2_2_0924B328 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924D728 |
2_2_0924D728 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09245330 |
2_2_09245330 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924D717 |
2_2_0924D717 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924B31A |
2_2_0924B31A |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09245777 |
2_2_09245777 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924B770 |
2_2_0924B770 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924DB71 |
2_2_0924DB71 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09248740 |
2_2_09248740 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09248750 |
2_2_09248750 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09248BA8 |
2_2_09248BA8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924B780 |
2_2_0924B780 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924DB80 |
2_2_0924DB80 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09245788 |
2_2_09245788 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09248B99 |
2_2_09248B99 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09245BE0 |
2_2_09245BE0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09248FEF |
2_2_09248FEF |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924F7FF |
2_2_0924F7FF |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924DFC7 |
2_2_0924DFC7 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924BBC8 |
2_2_0924BBC8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09245BD2 |
2_2_09245BD2 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924BBD8 |
2_2_0924BBD8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09244628 |
2_2_09244628 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924EA29 |
2_2_0924EA29 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09247A38 |
2_2_09247A38 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924461A |
2_2_0924461A |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924CE68 |
2_2_0924CE68 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924AA6A |
2_2_0924AA6A |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09244A70 |
2_2_09244A70 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924AA78 |
2_2_0924AA78 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09247A48 |
2_2_09247A48 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09247EA0 |
2_2_09247EA0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924AEBF |
2_2_0924AEBF |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09244A80 |
2_2_09244A80 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09247E8F |
2_2_09247E8F |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_092482E9 |
2_2_092482E9 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_092482F8 |
2_2_092482F8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924D2C2 |
2_2_0924D2C2 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09244EC9 |
2_2_09244EC9 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924AED0 |
2_2_0924AED0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_0924D2D0 |
2_2_0924D2D0 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_09244ED8 |
2_2_09244ED8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_096A4A80 |
2_2_096A4A80 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_096A31A8 |
2_2_096A31A8 |
Source: C:\Windows\SysWOW64\svchost.exe |
Code function: 2_2_096AAD30 |
2_2_096AAD30 |
Source: 0.2.#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe.3e30000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 2.2.svchost.exe.7e10000.5.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7e10000.5.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7e10000.5.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.3271f20.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.3.svchost.exe.3271f20.0.raw.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.3.svchost.exe.3271f20.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7d50f20.3.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7d50f20.3.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7d50f20.3.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.3271000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.3.svchost.exe.3271000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.3.svchost.exe.3271000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.3271000.1.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.3.svchost.exe.3271000.1.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.3.svchost.exe.3271000.1.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7e10000.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7e10000.5.raw.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7e10000.5.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.3271f20.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.3.svchost.exe.3271f20.0.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.3.svchost.exe.3271f20.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 2.2.svchost.exe.3374f2e.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.3374f2e.2.raw.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.3374f2e.2.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.3374f2e.2.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.3374f2e.2.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.3374f2e.2.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7d50f20.3.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7d50f20.3.raw.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7d50f20.3.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.400000.1.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000000.00000002.2200420683.0000000003E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000002.00000002.4637698281.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: Process Memory Space: svchost.exe PID: 6256, type: MEMORYSTR |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: rasapi32.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: rasman.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: rtutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: dhcpcsvc6.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: dhcpcsvc.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 600000 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599875 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599766 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599656 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599547 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599438 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599328 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599219 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599094 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598985 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598860 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598735 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598610 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598485 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598360 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598235 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598110 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597985 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597860 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597735 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597610 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597485 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597357 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597250 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597141 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597031 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596916 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596813 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596688 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596578 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596469 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596344 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596234 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596125 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596016 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595906 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595796 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595688 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595563 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595453 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595344 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595219 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595106 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595000 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 594891 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 594781 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 594672 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 594563 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 594438 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 594328 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -27670116110564310s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -600000s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -599875s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 7160 |
Thread sleep count: 7763 > 30 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 7160 |
Thread sleep count: 2082 > 30 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -599766s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -599656s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -599547s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -599438s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -599328s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -599219s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -599094s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -598985s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -598860s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -598735s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -598610s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -598485s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -598360s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -598235s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -598110s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -597985s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -597860s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -597735s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -597610s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -597485s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -597357s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -597250s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -597141s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -597031s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -596916s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -596813s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -596688s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -596578s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -596469s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -596344s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -596234s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -596125s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -596016s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -595906s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -595796s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -595688s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -595563s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -595453s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -595344s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -595219s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -595106s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -595000s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -594891s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -594781s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -594672s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -594563s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -594438s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 |
Thread sleep time: -594328s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose, |
0_2_004339B6 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose, |
0_2_00452492 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_00442886 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
0_2_004788BD |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose, |
0_2_0045CAFA |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_00431A86 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, |
0_2_0044BD27 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0045DE8F FindFirstFileW,FindClose, |
0_2_0045DE8F |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe |
Code function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, |
0_2_0044BF8B |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 600000 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599875 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599766 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599656 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599547 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599438 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599328 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599219 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 599094 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598985 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598860 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598735 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598610 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598485 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598360 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598235 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 598110 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597985 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597860 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597735 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597610 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597485 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597357 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597250 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597141 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 597031 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596916 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596813 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596688 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596578 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596469 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596344 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596234 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596125 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 596016 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595906 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595796 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595688 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595563 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595453 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595344 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595219 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595106 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 595000 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 594891 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 594781 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 594672 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 594563 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 594438 |
Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe |
Thread delayed: delay time: 594328 |
Jump to behavior |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive Brokers - COM.HKVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: www.interactivebrokers.comVMware20,11696487552} |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Canara Transaction PasswordVMware20,11696487552x |
Source: #U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe, 00000000.00000002.2200035684.0000000000A9E000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4& |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: discord.comVMware20,11696487552f |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: dev.azure.comVMware20,11696487552j |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: account.microsoft.com/profileVMware20,11696487552u |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: www.interactivebrokers.comVMware20,11696487552} |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Canara Transaction PasswordVMware20,11696487552} |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: ms.portal.azure.comVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: turbotax.intuit.comVMware20,11696487552t |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive Brokers - COM.HKVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: global block list test formVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: tasks.office.comVMware20,11696487552o |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: tasks.office.comVMware20,11696487552o |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: global block list test formVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: www.interactivebrokers.co.inVMware20,11696487552~ |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: outlook.office365.comVMware20,11696487552t |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: AMC password management pageVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: secure.bankofamerica.comVMware20,11696487552|UE |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: interactivebrokers.comVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: dev.azure.comVMware20,11696487552j |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: AMC password management pageVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: microsoft.visualstudio.comVMware20,11696487552x |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: netportal.hdfcbank.comVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Test URL for global passwords blocklistVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: interactivebrokers.comVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: trackpan.utiitsl.comVMware20,11696487552h |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: trackpan.utiitsl.comVMware20,11696487552h |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: outlook.office365.comVMware20,11696487552t |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: discord.comVMware20,11696487552f |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive Brokers - HKVMware20,11696487552] |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552^ |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: account.microsoft.com/profileVMware20,11696487552u |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: secure.bankofamerica.comVMware20,11696487552|UE |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: bankofamerica.comVMware20,11696487552x |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: bankofamerica.comVMware20,11696487552x |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: interactivebrokers.co.inVMware20,11696487552d |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4638670230.000000000326D000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll.web> |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: outlook.office.comVMware20,11696487552s |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: interactivebrokers.co.inVMware20,11696487552d |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive Brokers - HKVMware20,11696487552] |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: www.interactivebrokers.co.inVMware20,11696487552~ |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552^ |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: ms.portal.azure.comVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive Brokers - EU WestVMware20,11696487552n |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive Brokers - EU WestVMware20,11696487552n |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: outlook.office.comVMware20,11696487552s |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: netportal.hdfcbank.comVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Test URL for global passwords blocklistVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Canara Transaction PasswordVMware20,11696487552x |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: turbotax.intuit.comVMware20,11696487552t |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Canara Transaction PasswordVMware20,11696487552} |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: microsoft.visualstudio.comVMware20,11696487552x |