Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_004339B6 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose, | 0_2_00452492 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00442886 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_004788BD |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose, | 0_2_0045CAFA |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00431A86 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, | 0_2_0044BD27 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0045DE8F FindFirstFileW,FindClose, | 0_2_0045DE8F |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0044BF8B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09197EE4h | 2_2_09197C30 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 091963C0h | 2_2_091961E0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09196D4Ah | 2_2_091961E0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0919862Eh | 2_2_09198210 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0919862Eh | 2_2_09198206 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0919862Eh | 2_2_0919855C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then mov dword ptr [ebp-14h], 00000000h | 2_2_091956F0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924FAE3h | 2_2_0924F810 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924E318h | 2_2_0924DFD8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924D124h | 2_2_0924CE78 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09243BCCh | 2_2_09243920 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09244024h | 2_2_09243D78 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09246FECh | 2_2_09246D40 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09247444h | 2_2_09247198 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924789Ch | 2_2_092475F0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924447Ch | 2_2_092441D0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924C2DCh | 2_2_0924C030 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 092462E4h | 2_2_09246038 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 092492ACh | 2_2_09249000 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924331Ch | 2_2_09243070 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09249704h | 2_2_09249458 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09249B5Ch | 2_2_092498B0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924C734h | 2_2_0924C488 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924673Ch | 2_2_09246490 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924CB8Eh | 2_2_0924C8E0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09246B94h | 2_2_092468E8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09243774h | 2_2_092434C8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924B5D4h | 2_2_0924B328 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924D9D4h | 2_2_0924D728 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 092455DCh | 2_2_09245330 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 092489FCh | 2_2_09248750 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09248E54h | 2_2_09248BA8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924BA2Ch | 2_2_0924B780 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924DE2Ch | 2_2_0924DB80 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09245A34h | 2_2_09245788 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09245E8Ch | 2_2_09245BE0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924BE84h | 2_2_0924BBD8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 092448D4h | 2_2_09244628 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924AD24h | 2_2_0924AA78 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09247CF4h | 2_2_09247A48 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924814Ch | 2_2_09247EA0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09244D2Ch | 2_2_09244A80 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 092485A4h | 2_2_092482F8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924B17Ch | 2_2_0924AED0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 0924D57Ch | 2_2_0924D2D0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 4x nop then jmp 09245184h | 2_2_09244ED8 |
Source: svchost.exe, 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded |
Source: svchost.exe, 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.0000000005501000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://aborters.duckdns.org:8081 |
Source: svchost.exe, 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.0000000005501000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://anotherarmy.dns.army:8081 |
Source: svchost.exe, 00000002.00000002.4639663388.0000000005501000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: svchost.exe, 00000002.00000002.4639663388.0000000005501000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: svchost.exe, 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: svchost.exe, 00000002.00000002.4639663388.0000000005501000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: svchost.exe, 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.0000000005501000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://varders.kozow.com:8081 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: svchost.exe, 00000002.00000002.4639663388.00000000055E4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org |
Source: svchost.exe, 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.00000000055E4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot |
Source: svchost.exe, 00000002.00000002.4639663388.00000000055E4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text= |
Source: svchost.exe, 00000002.00000002.4639663388.00000000055E4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20a |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: svchost.exe, 00000002.00000002.4639663388.00000000056A7000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.00000000056D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=en |
Source: svchost.exe, 00000002.00000002.4639663388.00000000056A2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=enlB |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: svchost.exe, 00000002.00000002.4639663388.000000000554D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.00000000055BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.00000000055E4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: svchost.exe, 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.000000000554D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: svchost.exe, 00000002.00000002.4639663388.0000000005578000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.187 |
Source: svchost.exe, 00000002.00000002.4639663388.00000000055BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.00000000055E4000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4639663388.0000000005578000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.187$ |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006585000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4641266057.00000000065B0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: svchost.exe, 00000002.00000002.4639663388.00000000056D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/ |
Source: svchost.exe, 00000002.00000002.4639663388.00000000056D3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/lB |
Source: 0.2.#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe.3e30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 2.2.svchost.exe.7e10000.5.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7e10000.5.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7e10000.5.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.3271f20.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.3.svchost.exe.3271f20.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.3.svchost.exe.3271f20.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7d50f20.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7d50f20.3.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7d50f20.3.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.3271000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.3.svchost.exe.3271000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.3.svchost.exe.3271000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.3271000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.3.svchost.exe.3271000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.3.svchost.exe.3271000.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7e10000.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7e10000.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7e10000.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.3271f20.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.3.svchost.exe.3271f20.0.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.3.svchost.exe.3271f20.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 2.2.svchost.exe.3374f2e.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.3374f2e.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.3374f2e.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.3374f2e.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.3374f2e.2.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.3374f2e.2.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7d50f20.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7d50f20.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7d50f20.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.400000.1.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000000.00000002.2200420683.0000000003E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 00000002.00000002.4637698281.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: Process Memory Space: svchost.exe PID: 6256, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_000C2720 RegOpenKeyExW,RegOpenKeyExW,RegOpenKeyExW,RegCloseKey,RegCloseKey,HeapAlloc,RegQueryValueExW,ExpandEnvironmentStringsW,LCMapStringW,RegQueryValueExW,HeapFree,AcquireSRWLockShared,ReleaseSRWLockShared,HeapAlloc,memcpy,memcpy,AcquireSRWLockExclusive,ReleaseSRWLockExclusive,RegGetValueW,ActivateActCtx,LoadLibraryExW,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,ActivateActCtx,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,ActivateActCtx,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,RegCloseKey,HeapAlloc,RegGetValueW,WideCharToMultiByte,HeapAlloc,WideCharToMultiByte,HeapFree,ExpandEnvironmentStringsW,HeapFree,CreateActCtxW,GetLastError,HeapFree,HeapFree,GetLastError,CreateActCtxW,GetLastError,ReleaseActCtx,GetLastError,GetLastError,RtlNtStatusToDosError,GetLastError,LoadLibraryExW,RtlNtStatusToDosError,LoadLibraryExW,RtlNtStatusToDosError,HeapFree,ReleaseActCtx, | 2_2_000C2720 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_000C3540 RtlImageNtHeader,RpcMgmtSetServerStackSize,I_RpcServerDisableExceptionFilter,RtlSetProcessIsCritical,SetProcessMitigationPolicy,SetProcessMitigationPolicy,SetProcessMitigationPolicy,SetProtectedPolicy,HeapSetInformation,NtSetInformationProcess, | 2_2_000C3540 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_000C33C0 NtSetInformationProcess,SetUnhandledExceptionFilter,SetErrorMode,GetProcessHeap,InitializeSRWLock,InitializeSRWLock,RegDisablePredefinedCacheEx,EtwEventRegister,GetCommandLineW,memset,GetCurrentProcess,NtSetInformationProcess,HeapFree,HeapFree,ExitProcess,GetCurrentProcess,SetProcessAffinityUpdateMode, | 2_2_000C33C0 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_004096A0 | 0_2_004096A0 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0042200C | 0_2_0042200C |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0041A217 | 0_2_0041A217 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_00412216 | 0_2_00412216 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0042435D | 0_2_0042435D |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_004033C0 | 0_2_004033C0 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0044F430 | 0_2_0044F430 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_004125E8 | 0_2_004125E8 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0044663B | 0_2_0044663B |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_00413801 | 0_2_00413801 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0042096F | 0_2_0042096F |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_004129D0 | 0_2_004129D0 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_004119E3 | 0_2_004119E3 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0041C9AE | 0_2_0041C9AE |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0047EA6F | 0_2_0047EA6F |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0040FA10 | 0_2_0040FA10 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0044EB5F | 0_2_0044EB5F |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_00423C81 | 0_2_00423C81 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_00411E78 | 0_2_00411E78 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_00442E0C | 0_2_00442E0C |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_00420EC0 | 0_2_00420EC0 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0044CF17 | 0_2_0044CF17 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_00444FD2 | 0_2_00444FD2 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_03C33678 | 0_2_03C33678 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_000C2720 | 2_2_000C2720 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00408C60 | 2_2_00408C60 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0040DC11 | 2_2_0040DC11 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00407C3F | 2_2_00407C3F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00418CCC | 2_2_00418CCC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00406CA0 | 2_2_00406CA0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004028B0 | 2_2_004028B0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0041A4BE | 2_2_0041A4BE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00418244 | 2_2_00418244 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00401650 | 2_2_00401650 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00402F20 | 2_2_00402F20 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004193C4 | 2_2_004193C4 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00418788 | 2_2_00418788 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00402F89 | 2_2_00402F89 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00402B90 | 2_2_00402B90 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004073A0 | 2_2_004073A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FD4F0 | 2_2_051FD4F0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FC4E0 | 2_2_051FC4E0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FD7C8 | 2_2_051FD7C8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051F7630 | 2_2_051F7630 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FD218 | 2_2_051FD218 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FA2F0 | 2_2_051FA2F0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FCC68 | 2_2_051FCC68 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FCF40 | 2_2_051FCF40 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051F6EB8 | 2_2_051F6EB8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051F2EF8 | 2_2_051F2EF8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FEEE0 | 2_2_051FEEE0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FC990 | 2_2_051FC990 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051F5890 | 2_2_051F5890 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FD4EA | 2_2_051FD4EA |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FD7B8 | 2_2_051FD7B8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FC6A8 | 2_2_051FC6A8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051F4320 | 2_2_051F4320 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FD20A | 2_2_051FD20A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FCC58 | 2_2_051FCC58 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FCF30 | 2_2_051FCF30 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FEED0 | 2_2_051FEED0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051FC980 | 2_2_051FC980 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_051F586F | 2_2_051F586F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09197C30 | 2_2_09197C30 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09196E60 | 2_2_09196E60 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091961E0 | 2_2_091961E0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0919A2D0 | 2_2_0919A2D0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09197548 | 2_2_09197548 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0919E5E0 | 2_2_0919E5E0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0919FC0F | 2_2_0919FC0F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09197C2A | 2_2_09197C2A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0919FC20 | 2_2_0919FC20 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0919DE38 | 2_2_0919DE38 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0919DE48 | 2_2_0919DE48 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09196E4F | 2_2_09196E4F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091961D0 | 2_2_091961D0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0919126F | 2_2_0919126F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09191280 | 2_2_09191280 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0919A2C7 | 2_2_0919A2C7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0919753A | 2_2_0919753A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091956F0 | 2_2_091956F0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091956E2 | 2_2_091956E2 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924F810 | 2_2_0924F810 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924DFD8 | 2_2_0924DFD8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924EA38 | 2_2_0924EA38 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924CE78 | 2_2_0924CE78 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09243920 | 2_2_09243920 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09246D31 | 2_2_09246D31 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09249D08 | 2_2_09249D08 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09243910 | 2_2_09243910 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09243D68 | 2_2_09243D68 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09243D78 | 2_2_09243D78 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09246D40 | 2_2_09246D40 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_092441BF | 2_2_092441BF |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09247188 | 2_2_09247188 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09247198 | 2_2_09247198 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_092475E1 | 2_2_092475E1 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_092475F0 | 2_2_092475F0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_092441D0 | 2_2_092441D0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09246028 | 2_2_09246028 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924C030 | 2_2_0924C030 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09246038 | 2_2_09246038 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09240006 | 2_2_09240006 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09249000 | 2_2_09249000 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924C01F | 2_2_0924C01F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09243060 | 2_2_09243060 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09243070 | 2_2_09243070 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924C47A | 2_2_0924C47A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09240040 | 2_2_09240040 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924944A | 2_2_0924944A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09249458 | 2_2_09249458 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_092498A1 | 2_2_092498A1 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_092498B0 | 2_2_092498B0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_092434B9 | 2_2_092434B9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09246480 | 2_2_09246480 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924C488 | 2_2_0924C488 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09246490 | 2_2_09246490 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924C8E0 | 2_2_0924C8E0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_092468E8 | 2_2_092468E8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_092434C8 | 2_2_092434C8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_092468D7 | 2_2_092468D7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924C8D0 | 2_2_0924C8D0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09245320 | 2_2_09245320 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924B328 | 2_2_0924B328 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924D728 | 2_2_0924D728 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09245330 | 2_2_09245330 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924D717 | 2_2_0924D717 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924B31A | 2_2_0924B31A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09245777 | 2_2_09245777 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924B770 | 2_2_0924B770 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924DB71 | 2_2_0924DB71 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09248740 | 2_2_09248740 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09248750 | 2_2_09248750 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09248BA8 | 2_2_09248BA8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924B780 | 2_2_0924B780 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924DB80 | 2_2_0924DB80 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09245788 | 2_2_09245788 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09248B99 | 2_2_09248B99 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09245BE0 | 2_2_09245BE0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09248FEF | 2_2_09248FEF |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924F7FF | 2_2_0924F7FF |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924DFC7 | 2_2_0924DFC7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924BBC8 | 2_2_0924BBC8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09245BD2 | 2_2_09245BD2 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924BBD8 | 2_2_0924BBD8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09244628 | 2_2_09244628 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924EA29 | 2_2_0924EA29 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09247A38 | 2_2_09247A38 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924461A | 2_2_0924461A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924CE68 | 2_2_0924CE68 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924AA6A | 2_2_0924AA6A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09244A70 | 2_2_09244A70 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924AA78 | 2_2_0924AA78 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09247A48 | 2_2_09247A48 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09247EA0 | 2_2_09247EA0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924AEBF | 2_2_0924AEBF |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09244A80 | 2_2_09244A80 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09247E8F | 2_2_09247E8F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_092482E9 | 2_2_092482E9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_092482F8 | 2_2_092482F8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924D2C2 | 2_2_0924D2C2 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09244EC9 | 2_2_09244EC9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924AED0 | 2_2_0924AED0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0924D2D0 | 2_2_0924D2D0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09244ED8 | 2_2_09244ED8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_096A4A80 | 2_2_096A4A80 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_096A31A8 | 2_2_096A31A8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_096AAD30 | 2_2_096AAD30 |
Source: 0.2.#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe.3e30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 2.2.svchost.exe.7e10000.5.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7e10000.5.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7e10000.5.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.3271f20.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.3.svchost.exe.3271f20.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.3.svchost.exe.3271f20.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7d50f20.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7d50f20.3.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7d50f20.3.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.3271000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.3.svchost.exe.3271000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.3.svchost.exe.3271000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.3271000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.3.svchost.exe.3271000.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.3.svchost.exe.3271000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7e10000.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7e10000.5.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7e10000.5.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.3271f20.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.3.svchost.exe.3271f20.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.3.svchost.exe.3271f20.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 2.2.svchost.exe.3374f2e.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.3374f2e.2.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.3374f2e.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.3374f2e.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.3374f2e.2.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.3374f2e.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7d50f20.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7d50f20.3.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7d50f20.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.400000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000000.00000002.2200420683.0000000003E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000002.4643358558.0000000007E10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000002.00000002.4637698281.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000002.00000002.4638852120.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000003.2199994951.0000000003271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000002.4642986730.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: Process Memory Space: svchost.exe PID: 6256, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599875 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599766 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599656 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599547 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599438 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599328 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599219 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599094 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598985 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598860 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598735 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598610 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598485 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598360 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598235 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598110 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597985 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597860 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597735 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597610 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597485 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597357 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597250 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597141 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597031 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596916 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596813 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596688 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596578 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596469 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596344 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596234 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596125 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596016 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595906 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595796 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595688 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595563 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595453 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595344 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595219 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595106 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595000 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594891 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594781 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594672 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594563 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594438 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594328 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -27670116110564310s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -599875s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 7160 | Thread sleep count: 7763 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 7160 | Thread sleep count: 2082 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -599766s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -599656s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -599547s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -599438s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -599328s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -599219s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -599094s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -598985s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -598860s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -598735s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -598610s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -598485s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -598360s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -598235s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -598110s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -597985s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -597860s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -597735s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -597610s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -597485s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -597357s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -597250s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -597141s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -597031s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -596916s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -596813s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -596688s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -596578s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -596469s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -596344s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -596234s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -596125s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -596016s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -595906s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -595796s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -595688s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -595563s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -595453s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -595344s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -595219s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -595106s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -595000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -594891s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -594781s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -594672s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -594563s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -594438s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 1036 | Thread sleep time: -594328s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_004339B6 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose, | 0_2_00452492 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00442886 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_004788BD |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose, | 0_2_0045CAFA |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00431A86 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, | 0_2_0044BD27 |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0045DE8F FindFirstFileW,FindClose, | 0_2_0045DE8F |
Source: C:\Users\user\Desktop\#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe | Code function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0044BF8B |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599875 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599766 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599656 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599547 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599438 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599328 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599219 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599094 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598985 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598860 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598735 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598610 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598485 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598360 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598235 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598110 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597985 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597860 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597735 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597610 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597485 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597357 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597250 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597141 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597031 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596916 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596813 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596688 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596578 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596469 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596344 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596234 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596125 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596016 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595906 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595796 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595688 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595563 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595453 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595344 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595219 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595106 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595000 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594891 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594781 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594672 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594563 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594438 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594328 | Jump to behavior |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696487552} |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696487552x |
Source: #U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exe, 00000000.00000002.2200035684.0000000000A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4& |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696487552f |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696487552j |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696487552u |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696487552} |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696487552} |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696487552t |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696487552o |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696487552o |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696487552~ |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696487552t |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696487552|UE |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696487552j |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696487552x |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696487552h |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696487552h |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696487552t |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696487552f |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696487552] |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552^ |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696487552u |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696487552|UE |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696487552x |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696487552x |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696487552d |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4638670230.000000000326D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll.web> |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696487552s |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696487552d |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696487552] |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696487552~ |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552^ |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696487552n |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696487552n |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696487552s |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696487552x |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696487552t |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696487552} |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006849000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552 |
Source: svchost.exe, 00000002.00000002.4641266057.0000000006814000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696487552x |