Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0066445A GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_0066445A |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0066C6D1 FindFirstFileW,FindClose, | 0_2_0066C6D1 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0066C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_0066C75C |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0066EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0066EF95 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0066F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0066F0F2 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0066F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_0066F3F3 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_006637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_006637EF |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00663B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_00663B12 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0066BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_0066BCBC |
Source: svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded |
Source: svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://aborters.duckdns.org:8081 |
Source: svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://anotherarmy.dns.army:8081 |
Source: svchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: svchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1608426145.0000000007B1E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: svchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://varders.kozow.com:8081 |
Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org |
Source: svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot |
Source: svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text= |
Source: svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20a |
Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: svchost.exe, 00000002.00000002.3934335927.00000000054BB000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.00000000054EC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=en |
Source: svchost.exe, 00000002.00000002.3934335927.00000000054AC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=enH |
Source: svchost.exe, 00000002.00000002.3934335927.00000000054BB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=enl |
Source: svchost.exe, 00000002.00000002.3934335927.00000000054B6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=enlB |
Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: svchost.exe, 00000002.00000002.3934335927.000000000538E000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: svchost.exe, 00000002.00000002.3934335927.000000000538E000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189 |
Source: svchost.exe, 00000002.00000002.3934335927.00000000053B8000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$ |
Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: svchost.exe, 00000002.00000002.3934335927.00000000054EC000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.00000000054DD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/ |
Source: svchost.exe, 00000002.00000002.3934335927.00000000054DD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/H |
Source: svchost.exe, 00000002.00000002.3934335927.00000000054EC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/l |
Source: svchost.exe, 00000002.00000002.3934335927.00000000054E7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/lB |
Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.lsc5QN46NH.exe.21a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 00000002.00000002.3932473791.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000000.00000002.1516446502.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: svchost.exe PID: 6012, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0060E6A0 | 0_2_0060E6A0 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0062D975 | 0_2_0062D975 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0060FCE0 | 0_2_0060FCE0 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_006221C5 | 0_2_006221C5 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_006362D2 | 0_2_006362D2 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_006803DA | 0_2_006803DA |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0063242E | 0_2_0063242E |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_006225FA | 0_2_006225FA |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0065E616 | 0_2_0065E616 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_006166E1 | 0_2_006166E1 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0063878F | 0_2_0063878F |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00636844 | 0_2_00636844 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00680857 | 0_2_00680857 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00618808 | 0_2_00618808 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00668889 | 0_2_00668889 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0062CB21 | 0_2_0062CB21 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00636DB6 | 0_2_00636DB6 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00616F9E | 0_2_00616F9E |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00613030 | 0_2_00613030 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0062F1D9 | 0_2_0062F1D9 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00623187 | 0_2_00623187 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00601287 | 0_2_00601287 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00621484 | 0_2_00621484 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00615520 | 0_2_00615520 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00627696 | 0_2_00627696 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00615760 | 0_2_00615760 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00621978 | 0_2_00621978 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00639AB5 | 0_2_00639AB5 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00687DDB | 0_2_00687DDB |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0062BDA6 | 0_2_0062BDA6 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00621D90 | 0_2_00621D90 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0060DF00 | 0_2_0060DF00 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00613FE0 | 0_2_00613FE0 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_01645370 | 0_2_01645370 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00408C60 | 2_2_00408C60 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0040DC11 | 2_2_0040DC11 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00407C3F | 2_2_00407C3F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00418CCC | 2_2_00418CCC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00406CA0 | 2_2_00406CA0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004028B0 | 2_2_004028B0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0041A4BE | 2_2_0041A4BE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00418244 | 2_2_00418244 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00401650 | 2_2_00401650 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00402F20 | 2_2_00402F20 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004193C4 | 2_2_004193C4 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00418788 | 2_2_00418788 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00402F89 | 2_2_00402F89 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00402B90 | 2_2_00402B90 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004073A0 | 2_2_004073A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0786D7BF | 2_2_0786D7BF |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0786C6B3 | 2_2_0786C6B3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_07867630 | 2_2_07867630 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0786D4EB | 2_2_0786D4EB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0786431B | 2_2_0786431B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0786D213 | 2_2_0786D213 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_07862F8B | 2_2_07862F8B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0786CF3B | 2_2_0786CF3B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_07866EA8 | 2_2_07866EA8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0786EEE0 | 2_2_0786EEE0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0786CC5F | 2_2_0786CC5F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0786C987 | 2_2_0786C987 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_07865887 | 2_2_07865887 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0786EED0 | 2_2_0786EED0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0786FBA8 | 2_2_0786FBA8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09049578 | 2_2_09049578 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09042580 | 2_2_09042580 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09045048 | 2_2_09045048 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09049C48 | 2_2_09049C48 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09040B30 | 2_2_09040B30 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_090417B0 | 2_2_090417B0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09041E98 | 2_2_09041E98 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904D119 | 2_2_0904D119 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904D128 | 2_2_0904D128 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904D570 | 2_2_0904D570 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09042572 | 2_2_09042572 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904D580 | 2_2_0904D580 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904D9C8 | 2_2_0904D9C8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904D9D8 | 2_2_0904D9D8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09040006 | 2_2_09040006 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904F832 | 2_2_0904F832 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09045038 | 2_2_09045038 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09040040 | 2_2_09040040 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904F840 | 2_2_0904F840 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904FC98 | 2_2_0904FC98 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904CCC0 | 2_2_0904CCC0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904CCD0 | 2_2_0904CCD0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904EB29 | 2_2_0904EB29 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09040B2B | 2_2_09040B2B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904EB38 | 2_2_0904EB38 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09049358 | 2_2_09049358 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904EF80 | 2_2_0904EF80 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904EF90 | 2_2_0904EF90 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904179F | 2_2_0904179F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09048BB1 | 2_2_09048BB1 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09048BC0 | 2_2_09048BC0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904F3D7 | 2_2_0904F3D7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904F3E8 | 2_2_0904F3E8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904DE1F | 2_2_0904DE1F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904DE30 | 2_2_0904DE30 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904E27A | 2_2_0904E27A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904E288 | 2_2_0904E288 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_09041E8A | 2_2_09041E8A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904E6D0 | 2_2_0904E6D0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0904E6E0 | 2_2_0904E6E0 |
Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.lsc5QN46NH.exe.21a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000002.00000002.3932473791.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000000.00000002.1516446502.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: svchost.exe PID: 6012, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599422 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599297 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599187 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599077 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598968 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598859 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598745 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598640 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598531 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598421 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598312 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598203 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598093 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597984 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597875 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597765 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597656 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597546 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597437 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597328 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597218 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597109 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597000 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596890 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596781 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596671 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596562 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596453 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596338 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596234 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596125 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596015 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595906 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595796 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595687 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595578 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595468 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595359 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595250 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595140 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595031 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594921 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594812 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594703 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594593 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594484 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594374 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594265 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594156 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -23058430092136925s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 2948 | Thread sleep count: 1640 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -599422s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -599297s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 2948 | Thread sleep count: 8221 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -599187s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -599077s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -598968s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -598859s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -598745s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -598640s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -598531s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -598421s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -598312s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -598203s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -598093s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -597984s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -597875s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -597765s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -597656s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -597546s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -597437s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -597328s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -597218s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -597109s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -597000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -596890s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -596781s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -596671s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -596562s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -596453s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -596338s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -596234s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -596125s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -596015s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -595906s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -595796s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -595687s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -595578s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -595468s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -595359s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -595250s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -595140s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -595031s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -594921s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -594812s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -594703s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -594593s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -594484s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -594374s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -594265s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 5512 | Thread sleep time: -594156s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0066445A GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_0066445A |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0066C6D1 FindFirstFileW,FindClose, | 0_2_0066C6D1 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0066C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_0066C75C |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0066EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0066EF95 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0066F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0066F0F2 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0066F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_0066F3F3 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_006637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_006637EF |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_00663B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_00663B12 |
Source: C:\Users\user\Desktop\lsc5QN46NH.exe | Code function: 0_2_0066BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_0066BCBC |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599422 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599297 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599187 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599077 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598968 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598859 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598745 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598640 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598531 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598421 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598312 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598203 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598093 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597984 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597875 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597765 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597656 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597546 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597437 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597328 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597218 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597109 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597000 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596890 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596781 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596671 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596562 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596453 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596338 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596234 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596125 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596015 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595906 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595796 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595687 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595578 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595468 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595359 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595250 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595140 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595031 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594921 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594812 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594703 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594593 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594484 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594374 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594265 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594156 | Jump to behavior |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696494690n |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696494690] |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696494690d |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696494690u |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696494690o |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696494690~ |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696494690x |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696494690t |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696494690} |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696494690x |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696494690] |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696494690x |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696494690|UE |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696494690d |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696494690|UE |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696494690f |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696494690s |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696494690t |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696494690n |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696494690t |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696494690u |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696494690~ |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696494690} |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696494690t |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696494690o |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696494690} |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696494690j |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696494690x |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696494690x |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696494690^ |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696494690} |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3933512000.000000000326B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696494690h |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696494690s |
Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696494690j |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696494690^ |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696494690x |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696494690 |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696494690f |
Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696494690h |