Source: Yara match | File source: 9.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000009.00000003.1703123097.00000235E8A6A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.2956152933.00000235E8A2F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.2956202377.00000235E8A69000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.2956228077.00000235E8A7E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 5232, type: MEMORYSTR |
Source: svchost.exe, 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: stratum+tcp:// |
Source: svchost.exe | String found in binary or memory: cryptonight/0 |
Source: svchost.exe, 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: -o, --url=URL URL of mining server |
Source: svchost.exe, 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: stratum+tcp:// |
Source: svchost.exe, 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: Usage: xmrig [OPTIONS] |
Source: svchost.exe, 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: Usage: xmrig [OPTIONS] |
Source: svchost.exe, 00000009.00000002.2956312421.00000235E8AAB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.cloudflare.com/origin_ca.crl |
Source: svchost.exe, 00000009.00000003.1725941987.00000235E8A8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1728289922.00000235E8A8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2956228077.00000235E8A7E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.cloudflare.com/origin_ca.crl0 |
Source: svchost.exe, 00000009.00000002.2956356312.00000235E8AC6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.cloudflare.com/origin_ca.crlCd |
Source: 6xQ8CMUaES.exe, 00000000.00000003.1700268144.0000021EDDB00000.00000004.00000001.00020000.00000000.sdmp, lqlvnipszdia.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0 |
Source: 6xQ8CMUaES.exe, 00000000.00000003.1700268144.0000021EDDB00000.00000004.00000001.00020000.00000000.sdmp, lqlvnipszdia.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/Root.crl0 |
Source: 6xQ8CMUaES.exe, 00000000.00000003.1700268144.0000021EDDB00000.00000004.00000001.00020000.00000000.sdmp, lqlvnipszdia.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0 |
Source: 6xQ8CMUaES.exe, 00000000.00000003.1700268144.0000021EDDB00000.00000004.00000001.00020000.00000000.sdmp, lqlvnipszdia.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/primobject.crl0 |
Source: svchost.exe, 00000009.00000002.2956356312.00000235E8AC6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.cloudflare.com/origin_ca |
Source: svchost.exe, 00000009.00000002.2956286324.00000235E8A9A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1725941987.00000235E8A8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1728289922.00000235E8A8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2956228077.00000235E8A7E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.cloudflare.com/origin_ca0 |
Source: svchost.exe, 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: https://xmrig.com/docs/algorithms |
Source: 9.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: 9.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Monero Crypto Coin Miner Author: Florian Roth |
Source: 9.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE | Matched rule: Detects coinmining malware Author: ditekSHen |
Source: 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: Process Memory Space: svchost.exe PID: 5232, type: MEMORYSTR | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: 9.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: 9.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 9.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: Process Memory Space: svchost.exe PID: 5232, type: MEMORYSTR | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: unknown | Process created: C:\Users\user\Desktop\6xQ8CMUaES.exe "C:\Users\user\Desktop\6xQ8CMUaES.exe" | |
Source: C:\Users\user\Desktop\6xQ8CMUaES.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | |
Source: C:\Users\user\Desktop\6xQ8CMUaES.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\6xQ8CMUaES.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\6xQ8CMUaES.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\6xQ8CMUaES.exe | Process created: C:\Windows\System32\svchost.exe svchost.exe | |
Source: C:\Users\user\Desktop\6xQ8CMUaES.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\Desktop\6xQ8CMUaES.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\6xQ8CMUaES.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\Desktop\6xQ8CMUaES.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\6xQ8CMUaES.exe | Process created: C:\Windows\System32\svchost.exe svchost.exe | Jump to behavior |
Source: C:\Users\user\Desktop\6xQ8CMUaES.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: svchost.exe, 00000009.00000002.2956152933.00000235E8A2F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXE |
Source: svchost.exe, 00000009.00000002.2956152933.00000235E8A2F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SVCHOST.EXE--ALGO=RX/0--URL=XMR-EU1.NANOPOOL.ORG:10343--USER=82EVY9NPK5MQDJNLWQ85GDMHJTIPD496WCCTFYTQVSBXTJC2BBRZSB46XQ9QQ7JLKS8EITZHW6MAXACGXPGVKJXR9DFJPPQ--PASS=--CPU-MAX-THREADS-HINT=40--CINIT-WINRING=LQLVNIPSZDIA.SYS--RANDOMX-NO-RDMSR--CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE--CINIT-STEALTH-FULLSCREEN--CINIT-VERSION=3.4.1--TLS--CINIT-IDLE-WAIT=5--CINIT-IDLE-CPU=80--CINIT-ID=DXXYOFMYYCMMXPNA |
Source: svchost.exe, 00000009.00000002.2956152933.00000235E8A2F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: --CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE |
Source: svchost.exe, 00000009.00000002.2956228077.00000235E8A7E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: INTEL(R) CORE(TM)2 CPU 6600 @ 2.40 GHZ, INTEL(R) CORE(TM)2 CPU 6600 @ 2.40 GHZTASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE |
Source: svchost.exe, 00000009.00000003.1703123097.00000235E8A6A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXEDXXYOFMYYCMMXPNA |
Source: svchost.exe, 00000009.00000003.1703123097.00000235E8A6A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2956202377.00000235E8A69000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2956228077.00000235E8A7E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE |
Source: svchost.exe, 00000009.00000002.2956152933.00000235E8A2F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X/0 --URL=XMR-EU1.NANOPOOL.ORG:10343 --USER="82EVY9NPK5MQDJNLWQ85GDMHJTIPD496WCCTFYTQVSBXTJC2BBRZSB46XQ9QQ7JLKS8EITZHW6MAXACGXPGVKJXR9DFJPPQ" --PASS="" --CPU-MAX-THREADS-HINT=40 --CINIT-WINRING="LQLVNIPSZDIA.SYS" --RANDOMX-NO-RDMSR --CINIT-STEALTH-TARGETS="TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE" --CINIT-STEALTH-FULLSCREEN --CINIT-VERSION="3.4.1" --TLS --CINIT-IDLE-WAIT=5 --CINIT-IDLE-CPU=80 --CINIT-ID="DXXYOFMYYCMMXPNA" |