Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_0012DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_0012DBBE |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_001368EE FindFirstFileW,FindClose, | 0_2_001368EE |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_0013698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 0_2_0013698F |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_0012D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0012D076 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_0012D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0012D3A9 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00139642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00139642 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_0013979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0013979D |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00139B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 0_2_00139B2B |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00135C97 FindFirstFileW,FindNextFileW,FindClose, | 0_2_00135C97 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 1_2_005DDBBE |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005E68EE FindFirstFileW,FindClose, | 1_2_005E68EE |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 1_2_005E698F |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_005DD076 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_005DD3A9 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_005E9642 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_005E979D |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 1_2_005E9B2B |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005E5C97 FindFirstFileW,FindNextFileW,FindClose, | 1_2_005E5C97 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 5_2_005DDBBE |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005E68EE FindFirstFileW,FindClose, | 5_2_005E68EE |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 5_2_005E698F |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 5_2_005DD076 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 5_2_005DD3A9 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 5_2_005E9642 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 5_2_005E979D |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 5_2_005E9B2B |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005E5C97 FindFirstFileW,FindNextFileW,FindClose, | 5_2_005E5C97 |
Source: RegSvcs.exe, 00000002.00000002.2986816837.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034FC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.com |
Source: RegSvcs.exe, 00000002.00000002.2986816837.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986816837.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034F0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: RegSvcs.exe, 00000002.00000002.2986816837.0000000003179000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.0000000003479000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: RegSvcs.exe, 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: RegSvcs.exe, 00000002.00000002.2986816837.0000000003218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.0000000003518000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://reallyfreegeoip.org |
Source: RegSvcs.exe, 00000002.00000002.2986816837.00000000031B8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.0000000003479000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: RegSvcs.exe, 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id= |
Source: RegSvcs.exe, 00000002.00000002.2986816837.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034FC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: RegSvcs.exe, 00000002.00000002.2986816837.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: RegSvcs.exe, 00000002.00000002.2986816837.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034FC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00159576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 0_2_00159576 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00609576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 1_2_00609576 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00609576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 5_2_00609576 |
Source: 2.2.RegSvcs.exe.3090ee8.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.RegSvcs.exe.3090ee8.4.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.RegSvcs.exe.2c31b76.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.RegSvcs.exe.2c31b76.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 5.2.gehlenite.exe.35c0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 2.2.RegSvcs.exe.2c31b76.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.RegSvcs.exe.2c31b76.2.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.RegSvcs.exe.3090000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.RegSvcs.exe.3090000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 8.2.RegSvcs.exe.4415570.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 8.2.RegSvcs.exe.4415570.3.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.RegSvcs.exe.3090000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.RegSvcs.exe.3090000.3.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.RegSvcs.exe.3090ee8.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.RegSvcs.exe.3090ee8.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.RegSvcs.exe.5570000.7.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.RegSvcs.exe.5570000.7.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 8.2.RegSvcs.exe.4415570.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 8.2.RegSvcs.exe.4415570.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 8.2.RegSvcs.exe.4416458.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 8.2.RegSvcs.exe.4416458.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 8.2.RegSvcs.exe.443e790.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 8.2.RegSvcs.exe.443e790.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.2.gehlenite.exe.af0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 8.2.RegSvcs.exe.443e790.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 8.2.RegSvcs.exe.443e790.2.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 8.2.RegSvcs.exe.4416458.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 8.2.RegSvcs.exe.4416458.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.RegSvcs.exe.2c30c8e.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.RegSvcs.exe.2c30c8e.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.RegSvcs.exe.5570000.7.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.RegSvcs.exe.5570000.7.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.RegSvcs.exe.2c30c8e.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.RegSvcs.exe.2c30c8e.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000005.00000002.1940996077.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000001.00000002.1775907851.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: RegSvcs.exe PID: 3332, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000C3170 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow, | 0_2_000C3170 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_0015A2D7 NtdllDialogWndProc_W, | 0_2_0015A2D7 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_001587B2 NtdllDialogWndProc_W,CallWindowProcW, | 0_2_001587B2 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00158AAA NtdllDialogWndProc_W, | 0_2_00158AAA |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000D8BA4 NtdllDialogWndProc_W, | 0_2_000D8BA4 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00158FC9 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W, | 0_2_00158FC9 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000D9052 NtdllDialogWndProc_W, | 0_2_000D9052 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000D90A7 NtdllDialogWndProc_W, | 0_2_000D90A7 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_001590A1 SendMessageW,NtdllDialogWndProc_W, | 0_2_001590A1 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_0015911E DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W, | 0_2_0015911E |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00159380 NtdllDialogWndProc_W, | 0_2_00159380 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_001593CB NtdllDialogWndProc_W, | 0_2_001593CB |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00159400 ClientToScreen,NtdllDialogWndProc_W, | 0_2_00159400 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_0015953A GetWindowLongW,NtdllDialogWndProc_W, | 0_2_0015953A |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00159576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 0_2_00159576 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000D97C0 GetParent,NtdllDialogWndProc_W, | 0_2_000D97C0 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000D997D NtdllDialogWndProc_W,GetSysColor,SetBkColor,745EC8D0,NtdllDialogWndProc_W, | 0_2_000D997D |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00159E74 NtdllDialogWndProc_W, | 0_2_00159E74 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00159EF3 GetClientRect,GetCursorPos,ScreenToClient,NtdllDialogWndProc_W, | 0_2_00159EF3 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00159F86 GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W, | 0_2_00159F86 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00573170 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow, | 1_2_00573170 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_0060A2D7 NtdllDialogWndProc_W, | 1_2_0060A2D7 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_006087B2 NtdllDialogWndProc_W,CallWindowProcW, | 1_2_006087B2 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00608AAA NtdllDialogWndProc_W, | 1_2_00608AAA |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00588BA4 NtdllDialogWndProc_W, | 1_2_00588BA4 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00608FC9 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W, | 1_2_00608FC9 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00589052 NtdllDialogWndProc_W, | 1_2_00589052 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_006090A1 SendMessageW,NtdllDialogWndProc_W, | 1_2_006090A1 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005890A7 NtdllDialogWndProc_W, | 1_2_005890A7 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_0060911E DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W, | 1_2_0060911E |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_006093CB NtdllDialogWndProc_W, | 1_2_006093CB |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00609380 NtdllDialogWndProc_W, | 1_2_00609380 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00609400 ClientToScreen,NtdllDialogWndProc_W, | 1_2_00609400 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00609576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 1_2_00609576 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_0060953A GetWindowLongW,NtdllDialogWndProc_W, | 1_2_0060953A |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005897C0 GetParent,NtdllDialogWndProc_W, | 1_2_005897C0 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_0058997D NtdllDialogWndProc_W,GetSysColor,SetBkColor,745EC8D0,NtdllDialogWndProc_W, | 1_2_0058997D |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00609E74 NtdllDialogWndProc_W, | 1_2_00609E74 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00609EF3 GetClientRect,GetCursorPos,ScreenToClient,NtdllDialogWndProc_W, | 1_2_00609EF3 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00609F86 GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W, | 1_2_00609F86 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00573170 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow, | 5_2_00573170 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_0060A2D7 NtdllDialogWndProc_W, | 5_2_0060A2D7 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_006087B2 NtdllDialogWndProc_W,CallWindowProcW, | 5_2_006087B2 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00608AAA NtdllDialogWndProc_W, | 5_2_00608AAA |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00588BA4 NtdllDialogWndProc_W, | 5_2_00588BA4 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00608FC9 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W, | 5_2_00608FC9 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00589052 NtdllDialogWndProc_W, | 5_2_00589052 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_006090A1 SendMessageW,NtdllDialogWndProc_W, | 5_2_006090A1 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005890A7 NtdllDialogWndProc_W, | 5_2_005890A7 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_0060911E DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W, | 5_2_0060911E |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_006093CB NtdllDialogWndProc_W, | 5_2_006093CB |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00609380 NtdllDialogWndProc_W, | 5_2_00609380 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00609400 ClientToScreen,NtdllDialogWndProc_W, | 5_2_00609400 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00609576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 5_2_00609576 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_0060953A GetWindowLongW,NtdllDialogWndProc_W, | 5_2_0060953A |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005897C0 GetParent,NtdllDialogWndProc_W, | 5_2_005897C0 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_0058997D NtdllDialogWndProc_W,GetSysColor,SetBkColor,745EC8D0,NtdllDialogWndProc_W, | 5_2_0058997D |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00609E74 NtdllDialogWndProc_W, | 5_2_00609E74 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00609EF3 GetClientRect,GetCursorPos,ScreenToClient,NtdllDialogWndProc_W, | 5_2_00609EF3 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00609F86 GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W, | 5_2_00609F86 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00132046 | 0_2_00132046 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000C8060 | 0_2_000C8060 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00128298 | 0_2_00128298 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000FE4FF | 0_2_000FE4FF |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000F676B | 0_2_000F676B |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00154873 | 0_2_00154873 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000ECAA0 | 0_2_000ECAA0 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000CCAF0 | 0_2_000CCAF0 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000DCC39 | 0_2_000DCC39 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000F6DD9 | 0_2_000F6DD9 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000DB119 | 0_2_000DB119 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000C91C0 | 0_2_000C91C0 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000E1394 | 0_2_000E1394 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000E1706 | 0_2_000E1706 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000E781B | 0_2_000E781B |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000C7920 | 0_2_000C7920 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000D997D | 0_2_000D997D |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000E19B0 | 0_2_000E19B0 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000E7A4A | 0_2_000E7A4A |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000E1C77 | 0_2_000E1C77 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000E7CA7 | 0_2_000E7CA7 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_0014BE44 | 0_2_0014BE44 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000F9EEE | 0_2_000F9EEE |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000E1F32 | 0_2_000E1F32 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00BE89A8 | 0_2_00BE89A8 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_0057BF40 | 1_2_0057BF40 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005E2046 | 1_2_005E2046 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00578060 | 1_2_00578060 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005D8298 | 1_2_005D8298 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005AE4FF | 1_2_005AE4FF |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005A676B | 1_2_005A676B |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00604873 | 1_2_00604873 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_0057CAF0 | 1_2_0057CAF0 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_0059CAA0 | 1_2_0059CAA0 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_0058CC39 | 1_2_0058CC39 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005A6DD9 | 1_2_005A6DD9 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_0058B119 | 1_2_0058B119 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005791C0 | 1_2_005791C0 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00591394 | 1_2_00591394 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00591706 | 1_2_00591706 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_0059781B | 1_2_0059781B |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_0058997D | 1_2_0058997D |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00577920 | 1_2_00577920 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005919B0 | 1_2_005919B0 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00597A4A | 1_2_00597A4A |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00591C77 | 1_2_00591C77 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00597CA7 | 1_2_00597CA7 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005FBE44 | 1_2_005FBE44 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005A9EEE | 1_2_005A9EEE |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00591F32 | 1_2_00591F32 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00DD3F10 | 1_2_00DD3F10 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00408C60 | 2_2_00408C60 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_0040DC11 | 2_2_0040DC11 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00407C3F | 2_2_00407C3F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00418CCC | 2_2_00418CCC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00406CA0 | 2_2_00406CA0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_004028B0 | 2_2_004028B0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_0041A4BE | 2_2_0041A4BE |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00408C60 | 2_2_00408C60 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00418244 | 2_2_00418244 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00402F20 | 2_2_00402F20 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_004193C4 | 2_2_004193C4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00418788 | 2_2_00418788 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00402F89 | 2_2_00402F89 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00402B90 | 2_2_00402B90 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_004073A0 | 2_2_004073A0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_02AA1438 | 2_2_02AA1438 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_02AA1448 | 2_2_02AA1448 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_02AA11A8 | 2_2_02AA11A8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_02AA119C | 2_2_02AA119C |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_0057BF40 | 5_2_0057BF40 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005E2046 | 5_2_005E2046 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00578060 | 5_2_00578060 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005D8298 | 5_2_005D8298 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005AE4FF | 5_2_005AE4FF |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005A676B | 5_2_005A676B |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00604873 | 5_2_00604873 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_0057CAF0 | 5_2_0057CAF0 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_0059CAA0 | 5_2_0059CAA0 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_0058CC39 | 5_2_0058CC39 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005A6DD9 | 5_2_005A6DD9 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_0058B119 | 5_2_0058B119 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005791C0 | 5_2_005791C0 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00591394 | 5_2_00591394 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00591706 | 5_2_00591706 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_0059781B | 5_2_0059781B |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_0058997D | 5_2_0058997D |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00577920 | 5_2_00577920 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005919B0 | 5_2_005919B0 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00597A4A | 5_2_00597A4A |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00591C77 | 5_2_00591C77 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00597CA7 | 5_2_00597CA7 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005FBE44 | 5_2_005FBE44 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005A9EEE | 5_2_005A9EEE |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00591F32 | 5_2_00591F32 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_01273E70 | 5_2_01273E70 |
Source: 2.2.RegSvcs.exe.3090ee8.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.RegSvcs.exe.3090ee8.4.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.RegSvcs.exe.2c31b76.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.RegSvcs.exe.2c31b76.2.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 5.2.gehlenite.exe.35c0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 2.2.RegSvcs.exe.2c31b76.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.RegSvcs.exe.2c31b76.2.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.RegSvcs.exe.3090000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.RegSvcs.exe.3090000.3.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 8.2.RegSvcs.exe.4415570.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 8.2.RegSvcs.exe.4415570.3.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.RegSvcs.exe.3090000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.RegSvcs.exe.3090000.3.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.RegSvcs.exe.3090ee8.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.RegSvcs.exe.3090ee8.4.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.RegSvcs.exe.5570000.7.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.RegSvcs.exe.5570000.7.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 8.2.RegSvcs.exe.4415570.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 8.2.RegSvcs.exe.4415570.3.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 8.2.RegSvcs.exe.4416458.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 8.2.RegSvcs.exe.4416458.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 8.2.RegSvcs.exe.443e790.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 8.2.RegSvcs.exe.443e790.2.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.gehlenite.exe.af0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 8.2.RegSvcs.exe.443e790.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 8.2.RegSvcs.exe.443e790.2.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 8.2.RegSvcs.exe.4416458.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 8.2.RegSvcs.exe.4416458.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.RegSvcs.exe.2c30c8e.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.RegSvcs.exe.2c30c8e.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.RegSvcs.exe.5570000.7.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.RegSvcs.exe.5570000.7.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.RegSvcs.exe.2c30c8e.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.RegSvcs.exe.2c30c8e.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000005.00000002.1940996077.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000001.00000002.1775907851.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: RegSvcs.exe PID: 3332, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000DF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 0_2_000DF98E |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00151C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 0_2_00151C41 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_0058F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 1_2_0058F98E |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00601C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 1_2_00601C41 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_0058F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 5_2_0058F98E |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00601C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 5_2_00601C41 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_0012DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_0012DBBE |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_001368EE FindFirstFileW,FindClose, | 0_2_001368EE |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_0013698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 0_2_0013698F |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_0012D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0012D076 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_0012D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0012D3A9 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00139642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00139642 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_0013979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0013979D |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00139B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 0_2_00139B2B |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_00135C97 FindFirstFileW,FindNextFileW,FindClose, | 0_2_00135C97 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 1_2_005DDBBE |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005E68EE FindFirstFileW,FindClose, | 1_2_005E68EE |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 1_2_005E698F |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_005DD076 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_005DD3A9 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_005E9642 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_005E979D |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 1_2_005E9B2B |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005E5C97 FindFirstFileW,FindNextFileW,FindClose, | 1_2_005E5C97 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 5_2_005DDBBE |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005E68EE FindFirstFileW,FindClose, | 5_2_005E68EE |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 5_2_005E698F |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 5_2_005DD076 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 5_2_005DD3A9 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 5_2_005E9642 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 5_2_005E979D |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 5_2_005E9B2B |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005E5C97 FindFirstFileW,FindNextFileW,FindClose, | 5_2_005E5C97 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000F2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_000F2622 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000E083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_000E083F |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000E09D5 SetUnhandledExceptionFilter, | 0_2_000E09D5 |
Source: C:\Users\user\Desktop\xom6WSISuh.exe | Code function: 0_2_000E0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 0_2_000E0C21 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005A2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 1_2_005A2622 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_0059083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 1_2_0059083F |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_005909D5 SetUnhandledExceptionFilter, | 1_2_005909D5 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 1_2_00590C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 1_2_00590C21 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 2_2_0040CE09 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 2_2_0040E61C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 2_2_00416F6A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_004123F1 SetUnhandledExceptionFilter, | 2_2_004123F1 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005A2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 5_2_005A2622 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_0059083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 5_2_0059083F |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_005909D5 SetUnhandledExceptionFilter, | 5_2_005909D5 |
Source: C:\Users\user\AppData\Local\oxman\gehlenite.exe | Code function: 5_2_00590C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 5_2_00590C21 |