Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002B445A GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_002B445A |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002BC6D1 FindFirstFileW,FindClose, | 0_2_002BC6D1 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002BC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_002BC75C |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002BEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_002BEF95 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002BF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_002BF0F2 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002BF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_002BF3F3 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002B37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_002B37EF |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002B3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_002B3B12 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002BBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_002BBCBC |
Source: svchost.exe, 00000002.00000002.4484159443.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4487794236.0000000007D00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2057571582.0000000003259000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4487278704.0000000007940000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded |
Source: svchost.exe, 00000002.00000002.4484159443.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4487794236.0000000007D00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2057571582.0000000003259000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4484780955.00000000053A1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4487278704.0000000007940000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://aborters.duckdns.org:8081 |
Source: svchost.exe, 00000002.00000002.4484159443.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4487794236.0000000007D00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2057571582.0000000003259000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4484780955.00000000053A1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4487278704.0000000007940000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://anotherarmy.dns.army:8081 |
Source: svchost.exe, 00000002.00000002.4484780955.00000000053A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: svchost.exe, 00000002.00000002.4484780955.00000000053A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: svchost.exe, 00000002.00000002.4484159443.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4487794236.0000000007D00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2057571582.0000000003259000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4487278704.0000000007940000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: svchost.exe, 00000002.00000002.4484780955.00000000053A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: svchost.exe, 00000002.00000002.4484159443.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4487794236.0000000007D00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2057571582.0000000003259000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4484780955.00000000053A1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4487278704.0000000007940000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://varders.kozow.com:8081 |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006423000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4485919935.000000000666A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: svchost.exe, 00000002.00000002.4484780955.0000000005485000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org |
Source: svchost.exe, 00000002.00000002.4484159443.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4487794236.0000000007D00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2057571582.0000000003259000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4484780955.0000000005485000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4487278704.0000000007940000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot |
Source: svchost.exe, 00000002.00000002.4484780955.0000000005485000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text= |
Source: svchost.exe, 00000002.00000002.4484780955.0000000005485000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:642294%0D%0ADate%20a |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006423000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4485919935.000000000666A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006423000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4485919935.000000000666A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006423000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4485919935.000000000666A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: svchost.exe, 00000002.00000002.4484780955.000000000551B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4484780955.000000000550C000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4484780955.000000000554C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=en |
Source: svchost.exe, 00000002.00000002.4484780955.000000000550C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=en0 |
Source: svchost.exe, 00000002.00000002.4484780955.000000000551B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=enl |
Source: svchost.exe, 00000002.00000002.4484780955.0000000005516000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=enlB |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006423000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4485919935.000000000666A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006423000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4485919935.000000000666A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006423000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4485919935.000000000666A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: svchost.exe, 00000002.00000002.4484780955.000000000545E000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4484780955.00000000053EF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4484780955.0000000005485000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: svchost.exe, 00000002.00000002.4484159443.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4487794236.0000000007D00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.2057571582.0000000003259000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4484780955.00000000053EF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4487278704.0000000007940000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: svchost.exe, 00000002.00000002.4484780955.0000000005485000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189 |
Source: svchost.exe, 00000002.00000002.4484780955.000000000545E000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4484780955.0000000005419000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4484780955.0000000005485000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$ |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006423000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4485919935.000000000666A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006423000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4485919935.000000000666A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: svchost.exe, 00000002.00000002.4484780955.000000000554C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/ |
Source: svchost.exe, 00000002.00000002.4484780955.000000000554C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/l |
Source: svchost.exe, 00000002.00000002.4484780955.0000000005547000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/lB |
Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 2.2.svchost.exe.7940f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7940f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7940f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7d00000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7d00000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7d00000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7940f20.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7940f20.2.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7940f20.2.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.3259f20.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.3.svchost.exe.3259f20.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.3.svchost.exe.3259f20.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.3259000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.3.svchost.exe.3259000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.3.svchost.exe.3259000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7940000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7940000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7940000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.3259000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.3.svchost.exe.3259000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.3.svchost.exe.3259000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.BgroUcYHpy.exe.1360000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 2.3.svchost.exe.3259f20.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.3.svchost.exe.3259f20.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.3.svchost.exe.3259f20.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7940000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7940000.3.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7940000.3.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7d00000.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7d00000.4.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7d00000.4.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 00000002.00000002.4483603541.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000002.00000002.4484159443.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000002.4487794236.0000000007D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000002.4487794236.0000000007D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000002.4487794236.0000000007D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 00000002.00000003.2057571582.0000000003259000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000003.2057571582.0000000003259000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000003.2057571582.0000000003259000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 00000000.00000002.2057269694.0000000001360000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000002.00000002.4487278704.0000000007940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000002.4487278704.0000000007940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000002.4487278704.0000000007940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: Process Memory Space: svchost.exe PID: 5004, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_0025E6A0 | 0_2_0025E6A0 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_0027D975 | 0_2_0027D975 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_0025FCE0 | 0_2_0025FCE0 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002721C5 | 0_2_002721C5 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002862D2 | 0_2_002862D2 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002D03DA | 0_2_002D03DA |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_0028242E | 0_2_0028242E |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002725FA | 0_2_002725FA |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002AE616 | 0_2_002AE616 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002666E1 | 0_2_002666E1 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_0028878F | 0_2_0028878F |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_00268808 | 0_2_00268808 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_00286844 | 0_2_00286844 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002D0857 | 0_2_002D0857 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002B8889 | 0_2_002B8889 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_00286DB6 | 0_2_00286DB6 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_00266F9E | 0_2_00266F9E |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_00263030 | 0_2_00263030 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_00273187 | 0_2_00273187 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_0027F1D9 | 0_2_0027F1D9 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_00251287 | 0_2_00251287 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_00271484 | 0_2_00271484 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_00265520 | 0_2_00265520 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_00277696 | 0_2_00277696 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_00265760 | 0_2_00265760 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_00271978 | 0_2_00271978 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_00289AB5 | 0_2_00289AB5 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_0027BDA6 | 0_2_0027BDA6 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_00271D90 | 0_2_00271D90 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002D7DDB | 0_2_002D7DDB |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_0025DF00 | 0_2_0025DF00 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_00263FE0 | 0_2_00263FE0 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_0147EFE8 | 0_2_0147EFE8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00408C60 | 2_2_00408C60 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0040DC11 | 2_2_0040DC11 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00407C3F | 2_2_00407C3F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00418CCC | 2_2_00418CCC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00406CA0 | 2_2_00406CA0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004028B0 | 2_2_004028B0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0041A4BE | 2_2_0041A4BE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00418244 | 2_2_00418244 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00401650 | 2_2_00401650 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00402F20 | 2_2_00402F20 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004193C4 | 2_2_004193C4 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00418788 | 2_2_00418788 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00402F89 | 2_2_00402F89 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00402B90 | 2_2_00402B90 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004073A0 | 2_2_004073A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078CD7B8 | 2_2_078CD7B8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078CA598 | 2_2_078CA598 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078CD4EA | 2_2_078CD4EA |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078C74E0 | 2_2_078C74E0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078CC4E0 | 2_2_078CC4E0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078CD20A | 2_2_078CD20A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078CCF30 | 2_2_078CCF30 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078C6EE8 | 2_2_078C6EE8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078CEEE0 | 2_2_078CEEE0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078C2EF8 | 2_2_078C2EF8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078CCC58 | 2_2_078CCC58 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078CC980 | 2_2_078CC980 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078C586F | 2_2_078C586F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078CC6A8 | 2_2_078CC6A8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078C4311 | 2_2_078C4311 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078CEED0 | 2_2_078CEED0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_078CFBA8 | 2_2_078CFBA8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E9578 | 2_2_091E9578 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E2580 | 2_2_091E2580 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E5048 | 2_2_091E5048 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E9C48 | 2_2_091E9C48 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091ECCD0 | 2_2_091ECCD0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E0B30 | 2_2_091E0B30 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E17B0 | 2_2_091E17B0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E1E98 | 2_2_091E1E98 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091ED119 | 2_2_091ED119 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091ED128 | 2_2_091ED128 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E257D | 2_2_091E257D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091ED570 | 2_2_091ED570 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091ED580 | 2_2_091ED580 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091ED9D8 | 2_2_091ED9D8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091ED9C8 | 2_2_091ED9C8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E0006 | 2_2_091E0006 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E5038 | 2_2_091E5038 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091EF832 | 2_2_091EF832 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E0040 | 2_2_091E0040 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091EF840 | 2_2_091EF840 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091EFC98 | 2_2_091EFC98 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091ECCC0 | 2_2_091ECCC0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091EEB38 | 2_2_091EEB38 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091EEB29 | 2_2_091EEB29 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E0B20 | 2_2_091E0B20 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E9358 | 2_2_091E9358 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E179F | 2_2_091E179F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091EEF90 | 2_2_091EEF90 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091EEF80 | 2_2_091EEF80 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E8BB1 | 2_2_091E8BB1 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091EF3D7 | 2_2_091EF3D7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E8BC0 | 2_2_091E8BC0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091EF3E8 | 2_2_091EF3E8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091EDE1F | 2_2_091EDE1F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091EDE30 | 2_2_091EDE30 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091EE27A | 2_2_091EE27A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091E1E8B | 2_2_091E1E8B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091EE288 | 2_2_091EE288 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091EE6D0 | 2_2_091EE6D0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_091EE6E0 | 2_2_091EE6E0 |
Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 2.2.svchost.exe.7940f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7940f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7940f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7d00000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7d00000.4.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7d00000.4.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7940f20.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7940f20.2.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7940f20.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.3259f20.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.3.svchost.exe.3259f20.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.3.svchost.exe.3259f20.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.3259000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.3.svchost.exe.3259000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.3.svchost.exe.3259000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7940000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7940000.3.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7940000.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.3259000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.3.svchost.exe.3259000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.3.svchost.exe.3259000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.BgroUcYHpy.exe.1360000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 2.3.svchost.exe.3259f20.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.3.svchost.exe.3259f20.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.3.svchost.exe.3259f20.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7940000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7940000.3.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7940000.3.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7d00000.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7d00000.4.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7d00000.4.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000002.00000002.4483603541.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000002.00000002.4484159443.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000002.4487794236.0000000007D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000002.4487794236.0000000007D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000002.4487794236.0000000007D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000002.00000003.2057571582.0000000003259000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000003.2057571582.0000000003259000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000003.2057571582.0000000003259000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000000.00000002.2057269694.0000000001360000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000002.00000002.4487278704.0000000007940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000002.4487278704.0000000007940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000002.4487278704.0000000007940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: Process Memory Space: svchost.exe PID: 5004, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599875 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599766 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599656 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599547 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599437 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599328 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599213 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599109 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599000 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598888 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598777 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598671 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598530 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598416 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598312 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598203 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598094 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597984 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597875 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597765 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597656 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597547 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597437 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597327 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597211 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597094 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596984 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596875 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596765 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596656 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596547 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596437 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596328 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596219 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596094 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595944 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595828 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595690 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595557 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595449 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595344 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595234 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595125 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595016 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594906 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594797 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594687 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594578 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594469 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -25825441703193356s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -599875s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3636 | Thread sleep count: 2393 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3636 | Thread sleep count: 7459 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -599766s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -599656s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -599547s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -599437s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -599328s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -599213s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -599109s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -599000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -598888s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -598777s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -598671s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -598530s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -598416s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -598312s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -598203s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -598094s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -597984s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -597875s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -597765s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -597656s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -597547s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -597437s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -597327s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -597211s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -597094s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -596984s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -596875s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -596765s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -596656s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -596547s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -596437s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -596328s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -596219s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -596094s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -595944s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -595828s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -595690s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -595557s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -595449s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -595344s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -595234s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -595125s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -595016s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -594906s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -594797s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -594687s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -594578s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 3332 | Thread sleep time: -594469s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002B445A GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_002B445A |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002BC6D1 FindFirstFileW,FindClose, | 0_2_002BC6D1 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002BC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_002BC75C |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002BEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_002BEF95 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002BF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_002BF0F2 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002BF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_002BF3F3 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002B37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_002B37EF |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002B3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_002B3B12 |
Source: C:\Users\user\Desktop\BgroUcYHpy.exe | Code function: 0_2_002BBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_002BBCBC |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599875 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599766 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599656 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599547 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599437 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599328 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599213 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599109 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599000 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598888 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598777 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598671 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598530 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598416 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598312 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598203 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598094 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597984 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597875 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597765 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597656 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597547 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597437 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597327 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597211 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597094 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596984 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596875 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596765 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596656 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596547 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596437 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596328 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596219 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596094 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595944 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595828 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595690 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595557 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595449 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595344 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595234 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595125 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595016 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594906 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594797 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594687 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594578 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594469 | Jump to behavior |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696428655] |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n |
Source: svchost.exe, 00000002.00000002.4484036850.0000000003254000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll <add name="AspNetWindowsTokenRoleProvider" applicationName="/" |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696428655d |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696428655u |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696428655o |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696428655t |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696428655] |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696428655d |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696428655x |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655x |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696428655f |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696428655t |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655} |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696428655t |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696428655u |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655} |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696428655j |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^ |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696428655} |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696428655} |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696428655t |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696428655s |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655x |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~ |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696428655f |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696428655s |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696428655o |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696428655j |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^ |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696428655 |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~ |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z |
Source: svchost.exe, 00000002.00000002.4485919935.00000000066F7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h |
Source: svchost.exe, 00000002.00000002.4485919935.0000000006752000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696428655x |