Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0073C2A2 FindFirstFileExW, | 0_2_0073C2A2 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_007768EE FindFirstFileW,FindClose, | 0_2_007768EE |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0077698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 0_2_0077698F |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0076D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0076D076 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0076D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0076D3A9 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00779642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00779642 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0077979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0077979D |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00779B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 0_2_00779B2B |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0076DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_0076DBBE |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00775C97 FindFirstFileW,FindNextFileW,FindClose, | 0_2_00775C97 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_0067C2A2 FindFirstFileExW, | 2_2_0067C2A2 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006B68EE FindFirstFileW,FindClose, | 2_2_006B68EE |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006B698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 2_2_006B698F |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006AD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_006AD076 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006AD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_006AD3A9 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006B9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_006B9642 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006B979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_006B979D |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006B9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 2_2_006B9B2B |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006ADBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_006ADBBE |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006B5C97 FindFirstFileW,FindNextFileW,FindClose, | 2_2_006B5C97 |
Source: RegSvcs.exe, 00000003.00000002.2653936618.0000000002AD0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2653419827.0000000002AB0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.com |
Source: RegSvcs.exe, 00000003.00000002.2653936618.0000000002AD0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2653419827.0000000002AB0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.comd |
Source: RegSvcs.exe, 00000003.00000002.2653936618.0000000002AD0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2653936618.0000000002ABE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2653419827.0000000002AB0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2653419827.0000000002A9E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: RegSvcs.exe, 00000003.00000002.2653936618.0000000002AA3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2653936618.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2653419827.0000000002A31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: RegSvcs.exe, 00000003.00000002.2653936618.0000000002AD0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2653419827.0000000002AB0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/d |
Source: gehlenite.exe, 00000002.00000002.1437975448.0000000001B80000.00000004.00001000.00020000.00000000.sdmp, gehlenite.exe, 00000005.00000002.1560202183.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2652146138.0000000000413000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: RegSvcs.exe, 00000003.00000002.2653936618.0000000002AD0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2653419827.0000000002AB0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.orgd |
Source: RegSvcs.exe, 00000003.00000002.2653936618.0000000002AED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2653419827.0000000002ACD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://reallyfreegeoip.org |
Source: RegSvcs.exe, 00000003.00000002.2653936618.0000000002AED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2653419827.0000000002ACD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://reallyfreegeoip.orgd |
Source: RegSvcs.exe, 00000003.00000002.2653936618.0000000002AA3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2653419827.0000000002A31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: gehlenite.exe, 00000002.00000002.1437975448.0000000001B80000.00000004.00001000.00020000.00000000.sdmp, gehlenite.exe, 00000005.00000002.1560202183.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2652146138.0000000000413000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id= |
Source: RegSvcs.exe, 00000003.00000002.2653936618.0000000002AD0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2653419827.0000000002AB0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: gehlenite.exe, 00000002.00000002.1437975448.0000000001B80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2653936618.0000000002AD0000.00000004.00000800.00020000.00000000.sdmp, gehlenite.exe, 00000005.00000002.1560202183.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2653419827.0000000002AB0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2652146138.0000000000413000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: RegSvcs.exe, 00000003.00000002.2653936618.0000000002AD0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2653419827.0000000002AB0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d |
Source: RegSvcs.exe, 00000003.00000002.2653936618.0000000002AD0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2653419827.0000000002AB0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00799576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 0_2_00799576 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D9576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 2_2_006D9576 |
Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.gehlenite.exe.1b80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.gehlenite.exe.1b80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 5.2.gehlenite.exe.5a0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 5.2.gehlenite.exe.5a0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.gehlenite.exe.1b80000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.gehlenite.exe.1b80000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 5.2.gehlenite.exe.5a0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 5.2.gehlenite.exe.5a0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000005.00000002.1560202183.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000005.00000002.1560202183.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000002.1437975448.0000000001B80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000002.1437975448.0000000001B80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000003.00000002.2652141073.0000000000403000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: gehlenite.exe PID: 7584, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: RegSvcs.exe PID: 7624, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: gehlenite.exe PID: 7840, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00703170 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow, | 0_2_00703170 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0079A2D7 NtdllDialogWndProc_W, | 0_2_0079A2D7 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_007987B2 NtdllDialogWndProc_W,CallWindowProcW, | 0_2_007987B2 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00798AAA NtdllDialogWndProc_W, | 0_2_00798AAA |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00798B02 ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W, | 0_2_00798B02 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00718BA4 NtdllDialogWndProc_W, | 0_2_00718BA4 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00798D0E PostMessageW,GetFocus,GetDlgCtrlID,NtdllDialogWndProc_W,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem, | 0_2_00798D0E |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00798FC9 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W, | 0_2_00798FC9 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00719052 NtdllDialogWndProc_W, | 0_2_00719052 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_007190A7 NtdllDialogWndProc_W, | 0_2_007190A7 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_007990A1 SendMessageW,NtdllDialogWndProc_W, | 0_2_007990A1 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0079911E DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W, | 0_2_0079911E |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_007993CB NtdllDialogWndProc_W, | 0_2_007993CB |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00799380 NtdllDialogWndProc_W, | 0_2_00799380 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00799400 ClientToScreen,NtdllDialogWndProc_W, | 0_2_00799400 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00799576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 0_2_00799576 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0079953A GetWindowLongW,NtdllDialogWndProc_W, | 0_2_0079953A |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_007197C0 GetParent,NtdllDialogWndProc_W, | 0_2_007197C0 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0071997D NtdllDialogWndProc_W,GetSysColor,SetBkColor,745CC8D0,NtdllDialogWndProc_W, | 0_2_0071997D |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00799E74 NtdllDialogWndProc_W, | 0_2_00799E74 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00799EF3 GetClientRect,GetCursorPos,ScreenToClient,NtdllDialogWndProc_W, | 0_2_00799EF3 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00799F86 GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W, | 0_2_00799F86 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_00643170 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow, | 2_2_00643170 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006DA2D7 NtdllDialogWndProc_W, | 2_2_006DA2D7 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D87B2 NtdllDialogWndProc_W,CallWindowProcW, | 2_2_006D87B2 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D8AAA NtdllDialogWndProc_W, | 2_2_006D8AAA |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D8B02 ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W, | 2_2_006D8B02 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_00658BA4 NtdllDialogWndProc_W, | 2_2_00658BA4 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D8D0E PostMessageW,GetFocus,GetDlgCtrlID,NtdllDialogWndProc_W,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem, | 2_2_006D8D0E |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D8FC9 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W, | 2_2_006D8FC9 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_00659052 NtdllDialogWndProc_W, | 2_2_00659052 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006590A7 NtdllDialogWndProc_W, | 2_2_006590A7 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D90A1 SendMessageW,NtdllDialogWndProc_W, | 2_2_006D90A1 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D911E DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W, | 2_2_006D911E |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D93CB NtdllDialogWndProc_W, | 2_2_006D93CB |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D9380 NtdllDialogWndProc_W, | 2_2_006D9380 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D9400 ClientToScreen,NtdllDialogWndProc_W, | 2_2_006D9400 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D9576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 2_2_006D9576 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D953A GetWindowLongW,NtdllDialogWndProc_W, | 2_2_006D953A |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006597C0 GetParent,NtdllDialogWndProc_W, | 2_2_006597C0 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_0065997D NtdllDialogWndProc_W,GetSysColor,SetBkColor,745CC8D0,NtdllDialogWndProc_W, | 2_2_0065997D |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D9E74 NtdllDialogWndProc_W, | 2_2_006D9E74 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D9EF3 GetClientRect,GetCursorPos,ScreenToClient,NtdllDialogWndProc_W, | 2_2_006D9EF3 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D9F86 GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W, | 2_2_006D9F86 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00708060 | 0_2_00708060 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00772046 | 0_2_00772046 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00768298 | 0_2_00768298 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0073E4FF | 0_2_0073E4FF |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0073676B | 0_2_0073676B |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00794873 | 0_2_00794873 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0070CAF0 | 0_2_0070CAF0 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0072CAA0 | 0_2_0072CAA0 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0071CC39 | 0_2_0071CC39 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00736DD9 | 0_2_00736DD9 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0071B119 | 0_2_0071B119 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_007091C0 | 0_2_007091C0 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00721394 | 0_2_00721394 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00721706 | 0_2_00721706 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0072781B | 0_2_0072781B |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0071997D | 0_2_0071997D |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00707920 | 0_2_00707920 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_007219B0 | 0_2_007219B0 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00727A4A | 0_2_00727A4A |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00721C77 | 0_2_00721C77 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00727CA7 | 0_2_00727CA7 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0078BE44 | 0_2_0078BE44 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00739EEE | 0_2_00739EEE |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0070BF40 | 0_2_0070BF40 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00721F32 | 0_2_00721F32 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00FD2928 | 0_2_00FD2928 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_00648060 | 2_2_00648060 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006B2046 | 2_2_006B2046 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006A8298 | 2_2_006A8298 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_0067E4FF | 2_2_0067E4FF |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_0067676B | 2_2_0067676B |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D4873 | 2_2_006D4873 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_0064CAF0 | 2_2_0064CAF0 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_0066CAA0 | 2_2_0066CAA0 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_0065CC39 | 2_2_0065CC39 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_00676DD9 | 2_2_00676DD9 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_0065D064 | 2_2_0065D064 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_0065B119 | 2_2_0065B119 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006491C0 | 2_2_006491C0 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_00661394 | 2_2_00661394 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_00661706 | 2_2_00661706 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_0066781B | 2_2_0066781B |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_0065997D | 2_2_0065997D |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_00647920 | 2_2_00647920 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006619B0 | 2_2_006619B0 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_00667A4A | 2_2_00667A4A |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_00661C77 | 2_2_00661C77 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_00667CA7 | 2_2_00667CA7 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006CBE44 | 2_2_006CBE44 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_00679EEE | 2_2_00679EEE |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_0064BF40 | 2_2_0064BF40 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_00661F32 | 2_2_00661F32 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_00EB23D0 | 2_2_00EB23D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 3_2_028BC530 | 3_2_028BC530 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 3_2_028B9480 | 3_2_028B9480 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 3_2_028B27B9 | 3_2_028B27B9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 3_2_028BC521 | 3_2_028BC521 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 3_2_028B2DDF | 3_2_028B2DDF |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 3_2_028B946F | 3_2_028B946F |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 5_2_00DF2388 | 5_2_00DF2388 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 6_2_00F9C530 | 6_2_00F9C530 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 6_2_00F99480 | 6_2_00F99480 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 6_2_00F9C521 | 6_2_00F9C521 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 6_2_00F92DD1 | 6_2_00F92DD1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 6_2_00F9946F | 6_2_00F9946F |
Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.gehlenite.exe.1b80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.gehlenite.exe.1b80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 5.2.gehlenite.exe.5a0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 5.2.gehlenite.exe.5a0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.gehlenite.exe.1b80000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.gehlenite.exe.1b80000.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 5.2.gehlenite.exe.5a0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 5.2.gehlenite.exe.5a0000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000005.00000002.1560202183.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000005.00000002.1560202183.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000002.1437975448.0000000001B80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000002.1437975448.0000000001B80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000003.00000002.2652141073.0000000000403000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: gehlenite.exe PID: 7584, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: RegSvcs.exe PID: 7624, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: gehlenite.exe PID: 7840, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\fatura098002.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0071F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 0_2_0071F98E |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00791C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 0_2_00791C41 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_0065F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 2_2_0065F98E |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006D1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 2_2_006D1C41 |
Source: C:\Users\user\Desktop\fatura098002.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0073C2A2 FindFirstFileExW, | 0_2_0073C2A2 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_007768EE FindFirstFileW,FindClose, | 0_2_007768EE |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0077698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 0_2_0077698F |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0076D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0076D076 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0076D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0076D3A9 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00779642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00779642 |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0077979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0077979D |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00779B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 0_2_00779B2B |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_0076DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_0076DBBE |
Source: C:\Users\user\Desktop\fatura098002.exe | Code function: 0_2_00775C97 FindFirstFileW,FindNextFileW,FindClose, | 0_2_00775C97 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_0067C2A2 FindFirstFileExW, | 2_2_0067C2A2 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006B68EE FindFirstFileW,FindClose, | 2_2_006B68EE |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006B698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 2_2_006B698F |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006AD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_006AD076 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006AD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_006AD3A9 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006B9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_006B9642 |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006B979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_006B979D |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006B9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 2_2_006B9B2B |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006ADBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_006ADBBE |
Source: C:\Users\user\AppData\Local\Halitherses\gehlenite.exe | Code function: 2_2_006B5C97 FindFirstFileW,FindNextFileW,FindClose, | 2_2_006B5C97 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |