Source: | Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986157052.00000000014F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Xml.ni.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Core.pdbR source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: \??\C:\Windows\dll\mscorlib.pdb source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986157052.00000000014F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.ni.pdbRSDS source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: Microsoft.VisualBasic.pdb4v source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Configuration.ni.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986157052.00000000014F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mscorlib.ni.pdbRSDS source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Configuration.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Xml.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Xml.ni.pdbRSDS# source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: \??\C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.PDB source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986157052.00000000014F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Microsoft.VisualBasic.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Core.ni.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: MV Nicos Tomasos Vessel Parts.exe, 00000000.00000002.1741031571.0000000002611000.00000004.00000800.00020000.00000000.sdmp, MV Nicos Tomasos Vessel Parts.exe, 00000000.00000002.1742548308.0000000004CC0000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: %%.pdb source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986010731.00000000012F7000.00000004.00000010.00020000.00000000.sdmp |
Source: | Binary string: System.Windows.Forms.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Configuration.pdbx source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.PDB source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986010731.00000000012F7000.00000004.00000010.00020000.00000000.sdmp |
Source: | Binary string: mscorlib.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986157052.00000000014F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.pdbH source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: mscorlib.ni.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: \??\C:\Windows\mscorlib.pdb source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986157052.00000000014F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Core.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: \??\C:\Windows\dll\mscorlib.pdbU source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986157052.00000000014F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Configuration.ni.pdbRSDScUN source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.ni.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Core.ni.pdbRSDS source: WER4F42.tmp.dmp.4.dr |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3663f90.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects downloader injector Author: ditekSHen |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.4bc0000.5.unpack, type: UNPACKEDPE | Matched rule: Detects downloader injector Author: ditekSHen |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3663f90.4.unpack, type: UNPACKEDPE | Matched rule: Detects downloader injector Author: ditekSHen |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.4bc0000.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects downloader injector Author: ditekSHen |
Source: 1.2.MV Nicos Tomasos Vessel Parts.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.2.MV Nicos Tomasos Vessel Parts.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.2.MV Nicos Tomasos Vessel Parts.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 1.2.MV Nicos Tomasos Vessel Parts.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.2622038.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects downloader injector Author: ditekSHen |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.261f7f8.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects downloader injector Author: ditekSHen |
Source: 00000000.00000002.1741630940.0000000004BC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects downloader injector Author: ditekSHen |
Source: 00000001.00000002.1985907468.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000001.00000002.1985907468.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 00000000.00000002.1741154645.00000000036B6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000000.00000002.1741154645.00000000036B6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: Process Memory Space: MV Nicos Tomasos Vessel Parts.exe PID: 6784, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: MV Nicos Tomasos Vessel Parts.exe PID: 6784, type: MEMORYSTR | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: Process Memory Space: MV Nicos Tomasos Vessel Parts.exe PID: 6848, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: MV Nicos Tomasos Vessel Parts.exe PID: 6848, type: MEMORYSTR | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: MV Nicos Tomasos Vessel Parts.exe, 00000000.00000002.1741031571.0000000002611000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs MV Nicos Tomasos Vessel Parts.exe |
Source: MV Nicos Tomasos Vessel Parts.exe, 00000000.00000002.1741031571.0000000002611000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs MV Nicos Tomasos Vessel Parts.exe |
Source: MV Nicos Tomasos Vessel Parts.exe, 00000000.00000000.1733573821.0000000000192000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameBladeNoPa.exe4 vs MV Nicos Tomasos Vessel Parts.exe |
Source: MV Nicos Tomasos Vessel Parts.exe, 00000000.00000002.1741630940.0000000004BC0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameExample.dll0 vs MV Nicos Tomasos Vessel Parts.exe |
Source: MV Nicos Tomasos Vessel Parts.exe, 00000000.00000002.1742548308.0000000004CC0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs MV Nicos Tomasos Vessel Parts.exe |
Source: MV Nicos Tomasos Vessel Parts.exe, 00000000.00000002.1739770016.00000000007FE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs MV Nicos Tomasos Vessel Parts.exe |
Source: MV Nicos Tomasos Vessel Parts.exe, 00000000.00000002.1741154645.00000000036B6000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs MV Nicos Tomasos Vessel Parts.exe |
Source: MV Nicos Tomasos Vessel Parts.exe, 00000000.00000002.1741154645.0000000003615000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameExample.dll0 vs MV Nicos Tomasos Vessel Parts.exe |
Source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1985907468.0000000000402000.00000040.00000400.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs MV Nicos Tomasos Vessel Parts.exe |
Source: MV Nicos Tomasos Vessel Parts.exe | Binary or memory string: OriginalFilenameBladeNoPa.exe4 vs MV Nicos Tomasos Vessel Parts.exe |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3663f90.4.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.4bc0000.5.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3663f90.4.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.4bc0000.5.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector |
Source: 1.2.MV Nicos Tomasos Vessel Parts.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.2.MV Nicos Tomasos Vessel Parts.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.MV Nicos Tomasos Vessel Parts.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 1.2.MV Nicos Tomasos Vessel Parts.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.36f81f0.2.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.3718e20.3.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.2622038.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector |
Source: 0.2.MV Nicos Tomasos Vessel Parts.exe.261f7f8.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector |
Source: 00000000.00000002.1741630940.0000000004BC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector |
Source: 00000001.00000002.1985907468.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000001.00000002.1985907468.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 00000000.00000002.1741154645.00000000036B6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.1741154645.00000000036B6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: Process Memory Space: MV Nicos Tomasos Vessel Parts.exe PID: 6784, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: MV Nicos Tomasos Vessel Parts.exe PID: 6784, type: MEMORYSTR | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: Process Memory Space: MV Nicos Tomasos Vessel Parts.exe PID: 6848, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: MV Nicos Tomasos Vessel Parts.exe PID: 6848, type: MEMORYSTR | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: | Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986157052.00000000014F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Xml.ni.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Core.pdbR source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: \??\C:\Windows\dll\mscorlib.pdb source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986157052.00000000014F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.ni.pdbRSDS source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: Microsoft.VisualBasic.pdb4v source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Configuration.ni.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986157052.00000000014F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mscorlib.ni.pdbRSDS source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Configuration.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Xml.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Xml.ni.pdbRSDS# source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: \??\C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.PDB source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986157052.00000000014F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Microsoft.VisualBasic.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Core.ni.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: MV Nicos Tomasos Vessel Parts.exe, 00000000.00000002.1741031571.0000000002611000.00000004.00000800.00020000.00000000.sdmp, MV Nicos Tomasos Vessel Parts.exe, 00000000.00000002.1742548308.0000000004CC0000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: %%.pdb source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986010731.00000000012F7000.00000004.00000010.00020000.00000000.sdmp |
Source: | Binary string: System.Windows.Forms.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Configuration.pdbx source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.PDB source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986010731.00000000012F7000.00000004.00000010.00020000.00000000.sdmp |
Source: | Binary string: mscorlib.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986157052.00000000014F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.pdbH source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: mscorlib.ni.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: \??\C:\Windows\mscorlib.pdb source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986157052.00000000014F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Core.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: \??\C:\Windows\dll\mscorlib.pdbU source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986157052.00000000014F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Configuration.ni.pdbRSDScUN source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.ni.pdb source: WER4F42.tmp.dmp.4.dr |
Source: | Binary string: System.Core.ni.pdbRSDS source: WER4F42.tmp.dmp.4.dr |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MV Nicos Tomasos Vessel Parts.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: Amcache.hve.4.dr | Binary or memory string: VMware |
Source: Amcache.hve.4.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.4.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.4.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.4.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.4.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.4.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.4.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.4.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.4.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.4.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.4.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: MV Nicos Tomasos Vessel Parts.exe, 00000001.00000002.1986157052.00000000014F6000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: Amcache.hve.4.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.4.dr | Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0 |
Source: Amcache.hve.4.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.4.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.4.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.4.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.4.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.4.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.4.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.4.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.4.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.4.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.4.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.4.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.4.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.4.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.4.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |