Source: unknown | DNS traffic detected: query: euxngi.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: kymlxf.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: haqipv.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: akelqu.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: skpqjl.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: knajpk.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: oevgnn.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: oyadis.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: mlsjzu.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: ovalzq.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: auyazv.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: mbbaux.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: dhmqvm.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: odivfj.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: mjdvvw.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: yfgraf.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: edbeos.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: lnn.maft.at replaycode: Server failure (2) |
Source: unknown | DNS traffic detected: query: wofqss.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: pfdpty.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: aueolp.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: flpuej.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: oivayb.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: qrmrxa.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: akufuf.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: nrwwej.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: eixjei.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: oletfa.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: auowel.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: ylyguq.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: iooaai.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: bhhhpq.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: ihfjtf.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: yfobli.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: vaaoff.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: yldizc.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: yexisu.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: cjebbx.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: unuyas.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: agrwiq.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: uwyrsy.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: weuanq.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: kto.gind.at replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: src.gide.at replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: pfntvw.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: shyykl.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: lntyhe.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: yxdidf.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: easecy.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: vqzvfi.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: nkewuc.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: hoqayg.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: tpoxvi.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: mwhmpz.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: gvkzcm.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: guseek.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: mlgjto.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: jueuby.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: usecvu.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: iietwy.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: bswdic.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: iqzvcy.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: ovlicu.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: voirue.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: zeufbm.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: vvwxii.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: qfsper.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: kqmkgp.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: jyruxe.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: zwstuy.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: ww.ziten.ru replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: pgmuok.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: oirlzx.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: dzwrvg.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: rmdyox.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: wkedxi.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: oqiqee.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: muyuou.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: qxuyel.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: anyqaz.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: uptrqo.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: ufmuub.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: vusvyj.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: eetebu.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: jkjztp.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: edmwpe.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: mjrztu.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: ytyepn.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: qsuuox.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: raniod.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: bnylmd.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: qsyrmp.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: pxzoao.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: pniyeh.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: ohqasc.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: oyebru.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: nuejea.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: julanu.com replaycode: Name error (3) |
Source: unknown | DNS traffic detected: query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com replaycode: Server failure (2) |
Source: unknown | DNS traffic detected: query: akiypc.com replaycode: Name error (3) |
Source: svchost.exe, 00000025.00000002.934439454.00000266A5486000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://Passport.NET/tb |
Source: lsass.exe, 0000000A.00000000.406730577.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.409621751.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.410034517.0000020A0F95F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: lsass.exe, 0000000A.00000000.406730577.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.409621751.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.410034517.0000020A0F95F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0 |
Source: svchost.exe, 00000012.00000002.937199804.0000023260AB7000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.434915689.0000023260AB7000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.434450989.0000023260AB7000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cdn.content.prod.cms.msn.com/singletile/summary/alias/experiencebyname/today?market=en-US&sou |
Source: lsass.exe, 0000000A.00000000.406688208.0000020A0F800000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000002.928389853.0000020A0F800000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000002.655733813.000001968955C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000028.00000002.684675611.000002062AD00000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: svchost.exe, 00000028.00000002.684675611.000002062AD00000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.ver) |
Source: lsass.exe, 0000000A.00000000.406730577.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.409621751.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.410034517.0000020A0F95F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: lsass.exe, 0000000A.00000000.406730577.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.409621751.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.410034517.0000020A0F95F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0? |
Source: lsass.exe, 0000000A.00000000.409059915.0000020A0F073000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.406730577.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000002.919189853.0000020A0F03F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.409621751.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.406137063.0000020A0F03F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.408867824.0000020A0F03F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000002.932218591.0000020A0F8BD000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.470812037.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.488128927.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.517446302.0000019687A00000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.469185004.0000019687A00000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.518610082.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.478629962.0000019687A00000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.474237810.0000019687A00000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.507053493.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.502767921.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.512953733.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.501838544.0000019687A00000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000002.652525230.0000019687A00000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: lsass.exe, 0000000A.00000000.406730577.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.409621751.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.410034517.0000020A0F95F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: lsass.exe, 0000000A.00000000.406730577.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.409621751.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.410034517.0000020A0F95F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0 |
Source: lsass.exe, 0000000A.00000000.406730577.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.409621751.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000002.929953130.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: lsass.exe, 0000000A.00000000.406450907.0000020A0F0B1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000002.925211663.0000020A0F0B1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.409297757.0000020A0F0B1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: svchost.exe, 00000028.00000003.654901611.000002062ADA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://help.disneyplus.com. |
Source: lsass.exe, 0000000A.00000000.406730577.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.409621751.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.410034517.0000020A0F95F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: lsass.exe, 0000000A.00000000.409059915.0000020A0F073000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.406730577.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000002.919189853.0000020A0F03F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.409621751.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.406137063.0000020A0F03F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.408867824.0000020A0F03F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000002.932218591.0000020A0F8BD000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.470812037.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.488128927.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.517446302.0000019687A00000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.469185004.0000019687A00000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.518610082.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.478629962.0000019687A00000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.474237810.0000019687A00000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.507053493.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.502767921.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.512953733.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.501838544.0000019687A00000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000002.652525230.0000019687A00000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0: |
Source: lsass.exe, 0000000A.00000000.406730577.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.409621751.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.410034517.0000020A0F95F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0H |
Source: lsass.exe, 0000000A.00000000.409059915.0000020A0F073000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000002.935116062.0000020A0F994000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.406730577.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.410060899.0000020A0F993000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.409621751.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.406710935.0000020A0F815000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000002.932218591.0000020A0F8BD000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.470812037.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.488128927.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.518610082.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.507053493.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.502767921.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.512953733.0000019689517000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000002.655072175.0000019689513000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: backgroundTaskHost.exe, 00000018.00000002.653443453.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.482934202.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.502128636.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.512021088.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.478934256.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.517793482.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.469844015.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.492450987.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.506335861.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.497685292.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.474651684.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.487364117.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schema.org/reminder |
Source: svchost.exe, 00000028.00000002.685289382.000002062AD3D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.microft8 |
Source: svchost.exe, 0000001E.00000000.544447681.00000184771DD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.msoft |
Source: lsass.exe, 0000000A.00000000.406730577.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.409621751.0000020A0F823000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.410034517.0000020A0F95F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com/CPS0~ |
Source: svchost.exe, 0000001B.00000000.526150966.0000029A9B0C8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.925987981.0000029A9B0C8000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com |
Source: mssecsvc.exe.2.dr | String found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com |
Source: mssecsvc.exe, 00000006.00000002.473354431.0000000000D44000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/ |
Source: mssecsvc.exe, 00000004.00000002.715152073.0000000000DC9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/% |
Source: mssecsvc.exe, 00000004.00000002.715373222.0000000000DF1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/N |
Source: mssecsvc.exe, 00000006.00000002.473354431.0000000000D44000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/o |
Source: mssecsvc.exe, 00000004.00000002.712659508.000000000019C000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ |
Source: svchost.exe, 00000012.00000002.937199804.0000023260AB7000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.434915689.0000023260AB7000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.434450989.0000023260AB7000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://candycrush.king.com/mobile/windows/TileTemplate.xml |
Source: svchost.exe, 00000012.00000000.435829049.0000023260B50000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.940173415.0000023260B50000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.435512851.0000023260B50000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.onenote.net/livetile/?Language=en-US |
Source: svchost.exe, 00000028.00000003.654901611.000002062ADA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://disneyplus.com/legal. |
Source: 60f12053-d245-44a6-bc56-ad6e6ab7a7c9.f2d7e325-8812-419f-93c5-393f1d8412fe.down_meta.25.dr | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4IhjW?ver=1f70Last-Mo |
Source: 359095cb-bf2b-41bf-8103-13a2a8012235.a3ca69e3-e705-4f64-a747-3b1b77a563b2.down_meta.25.dr | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4Ivzu?ver=4f7dContent |
Source: aa32b058-0d4a-4dd4-a681-a185709cfe4c.c81d4019-1330-4010-8ca2-301e518d770c.down_meta.25.dr | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4PlTB?ver=2a94Content |
Source: 6faba965-83b0-4727-9cf6-f717a8d19482.up_meta.25.dr | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4Pwej?ver=cbf0 |
Source: 6faba965-83b0-4727-9cf6-f717a8d19482.593aeaca-14dd-4f73-a505-b9177043fbb4.down_meta.25.dr, 7d74c1c9-e7b4-43ae-af85-d91ef9a0b3dd.593aeaca-14dd-4f73-a505-b9177043fbb4.down_meta.25.dr | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4Pwej?ver=cbf0Content |
Source: 883a00d1-26f9-46de-b0d6-299b64c5e1d5.8072ed17-626f-4b05-8d4e-e1f8c9d17eb3.down_meta.25.dr, 328613bb-d9fd-464d-8e18-36a56bfcd660.8072ed17-626f-4b05-8d4e-e1f8c9d17eb3.down_meta.25.dr | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWHdvF?ver=db75Content- |
Source: backgroundTaskHost.exe, 00000018.00000000.517659898.0000019687A43000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.492172317.0000019687A43000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.497564176.0000019687A43000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.474469001.0000019687A43000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.501989041.0000019687A43000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.482751547.0000019687A43000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000002.653090452.0000019687A59000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.478770028.0000019687A43000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.511817816.0000019687A43000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.469612248.0000019687A43000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.487190551.0000019687A43000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.506188205.0000019687A43000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://pf.directory.live.com/profile/profile.asmx |
Source: svchost.exe, 00000025.00000002.953014239.00000266A5C1B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.586857196.00000266A5C1B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://site-cdn.onenote.net/161182431559_Images/LiveTileImages/MediumAndLarge/Image1.png |
Source: svchost.exe, 00000028.00000003.651043924.000002062AD9C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000028.00000003.650880528.000002062B202000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000028.00000003.651148131.000002062ADAD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000028.00000003.651394135.000002062B202000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.hotspotshield.com/ |
Source: backgroundTaskHost.exe, 00000018.00000000.479135816.0000019687B02000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000002.654120987.0000019687B02000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.bing.c |
Source: svchost.exe, 00000028.00000003.654901611.000002062ADA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.disneyplus.com/legal/privacy-policy |
Source: svchost.exe, 00000028.00000003.654901611.000002062ADA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights |
Source: svchost.exe, 00000028.00000003.651043924.000002062AD9C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000028.00000003.650880528.000002062B202000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000028.00000003.651148131.000002062ADAD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000028.00000003.651394135.000002062B202000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.hotspotshield.com/terms/ |
Source: svchost.exe, 00000028.00000003.651043924.000002062AD9C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000028.00000003.650880528.000002062B202000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000028.00000003.651148131.000002062ADAD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000028.00000003.651394135.000002062B202000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.pango.co/privacy |
Source: svchost.exe, 00000028.00000003.661304130.000002062B202000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000028.00000003.660891846.000002062ADBC000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000028.00000003.661072190.000002062ADBC000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000028.00000003.661121292.000002062ADA6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.tiktok.com/legal/report/feedback |
Source: UBpReASuEC.dll, type: SAMPLE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: UBpReASuEC.dll, type: SAMPLE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 4.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 4.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 6.0.mssecsvc.exe.7100a4.7.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 6.0.mssecsvc.exe.7100a4.7.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 4.0.mssecsvc.exe.7100a4.5.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 4.0.mssecsvc.exe.7100a4.5.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 6.0.mssecsvc.exe.7100a4.5.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 6.0.mssecsvc.exe.7100a4.5.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 4.0.mssecsvc.exe.7100a4.7.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 4.0.mssecsvc.exe.7100a4.7.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 4.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 4.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 4.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 4.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 6.0.mssecsvc.exe.7100a4.3.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 6.0.mssecsvc.exe.7100a4.3.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 4.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 4.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 4.0.mssecsvc.exe.7100a4.3.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 4.0.mssecsvc.exe.7100a4.3.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 6.0.mssecsvc.exe.7100a4.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 6.0.mssecsvc.exe.7100a4.5.raw.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT) |
Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 6.0.mssecsvc.exe.7100a4.7.raw.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 6.0.mssecsvc.exe.7100a4.7.raw.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 4.0.mssecsvc.exe.7100a4.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 4.0.mssecsvc.exe.7100a4.3.raw.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 4.0.mssecsvc.exe.7100a4.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 4.0.mssecsvc.exe.7100a4.5.raw.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 6.0.mssecsvc.exe.7100a4.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 6.0.mssecsvc.exe.7100a4.3.raw.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 4.0.mssecsvc.exe.7100a4.7.raw.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 4.0.mssecsvc.exe.7100a4.7.raw.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT) |
Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT) |
Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 6.0.mssecsvc.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 6.0.mssecsvc.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT) |
Source: 6.0.mssecsvc.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT) |
Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 4.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 4.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT) |
Source: 4.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 4.0.mssecsvc.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 4.0.mssecsvc.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT) |
Source: 4.0.mssecsvc.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 4.0.mssecsvc.exe.400000.6.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 4.0.mssecsvc.exe.400000.6.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT) |
Source: 4.0.mssecsvc.exe.400000.6.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 4.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 4.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT) |
Source: 4.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 4.0.mssecsvc.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 4.0.mssecsvc.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT) |
Source: 4.0.mssecsvc.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 6.0.mssecsvc.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 6.0.mssecsvc.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT) |
Source: 6.0.mssecsvc.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 6.0.mssecsvc.exe.400000.6.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: 6.0.mssecsvc.exe.400000.6.unpack, type: UNPACKEDPE | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT) |
Source: 6.0.mssecsvc.exe.400000.6.unpack, type: UNPACKEDPE | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 00000006.00000000.398897193.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 00000006.00000000.397658913.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 00000009.00000000.403899564.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 00000004.00000000.390830304.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 00000004.00000000.395187719.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 00000006.00000000.400479545.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 00000006.00000000.395761146.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 00000009.00000002.517693947.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 00000004.00000000.392372689.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 00000004.00000002.713109877.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 00000006.00000002.470687764.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: 00000004.00000000.396673500.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: C:\Windows\tasksche.exe, type: DROPPED | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: C:\Windows\tasksche.exe, type: DROPPED | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: C:\Windows\mssecsvc.exe, type: DROPPED | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly) |
Source: C:\Windows\mssecsvc.exe, type: DROPPED | Matched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT) |
Source: C:\Windows\mssecsvc.exe, type: DROPPED | Matched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team |
Source: UBpReASuEC.dll, type: SAMPLE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: UBpReASuEC.dll, type: SAMPLE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 4.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 4.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 6.0.mssecsvc.exe.7100a4.7.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 6.0.mssecsvc.exe.7100a4.7.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 4.0.mssecsvc.exe.7100a4.5.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 4.0.mssecsvc.exe.7100a4.5.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 6.0.mssecsvc.exe.7100a4.5.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 6.0.mssecsvc.exe.7100a4.5.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 4.0.mssecsvc.exe.7100a4.7.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 4.0.mssecsvc.exe.7100a4.7.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 4.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 4.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 4.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 4.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 6.0.mssecsvc.exe.7100a4.3.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 6.0.mssecsvc.exe.7100a4.3.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 4.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 4.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 4.0.mssecsvc.exe.7100a4.3.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 4.0.mssecsvc.exe.7100a4.3.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 6.0.mssecsvc.exe.7100a4.5.raw.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 6.0.mssecsvc.exe.7100a4.5.raw.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A |
Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 6.0.mssecsvc.exe.7100a4.7.raw.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 6.0.mssecsvc.exe.7100a4.7.raw.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 4.0.mssecsvc.exe.7100a4.3.raw.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 4.0.mssecsvc.exe.7100a4.3.raw.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 4.0.mssecsvc.exe.7100a4.5.raw.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 4.0.mssecsvc.exe.7100a4.5.raw.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 6.0.mssecsvc.exe.7100a4.3.raw.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 6.0.mssecsvc.exe.7100a4.3.raw.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 4.0.mssecsvc.exe.7100a4.7.raw.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 4.0.mssecsvc.exe.7100a4.7.raw.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A |
Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A |
Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 6.0.mssecsvc.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 6.0.mssecsvc.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A |
Source: 6.0.mssecsvc.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A |
Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 4.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 4.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A |
Source: 4.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 4.0.mssecsvc.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 4.0.mssecsvc.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A |
Source: 4.0.mssecsvc.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 4.0.mssecsvc.exe.400000.6.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 4.0.mssecsvc.exe.400000.6.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A |
Source: 4.0.mssecsvc.exe.400000.6.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 4.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 4.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A |
Source: 4.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 4.0.mssecsvc.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 4.0.mssecsvc.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A |
Source: 4.0.mssecsvc.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 6.0.mssecsvc.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 6.0.mssecsvc.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A |
Source: 6.0.mssecsvc.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 6.0.mssecsvc.exe.400000.6.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: 6.0.mssecsvc.exe.400000.6.unpack, type: UNPACKEDPE | Matched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A |
Source: 6.0.mssecsvc.exe.400000.6.unpack, type: UNPACKEDPE | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 00000006.00000000.398897193.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 00000006.00000000.397658913.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 00000009.00000000.403899564.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 00000004.00000000.390830304.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 00000004.00000000.395187719.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 00000006.00000000.400479545.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 00000006.00000000.395761146.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 00000009.00000002.517693947.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 00000004.00000000.392372689.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 00000004.00000002.713109877.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 00000006.00000002.470687764.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: 00000004.00000000.396673500.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: C:\Windows\tasksche.exe, type: DROPPED | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: C:\Windows\tasksche.exe, type: DROPPED | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: C:\Windows\mssecsvc.exe, type: DROPPED | Matched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T |
Source: C:\Windows\mssecsvc.exe, type: DROPPED | Matched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A |
Source: C:\Windows\mssecsvc.exe, type: DROPPED | Matched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_00BD05F2 FindCloseChangeNotification,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,FindCloseChangeNotification,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,FindCloseChangeNotification,FindCloseChangeNotification, | 4_2_00BD05F2 |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_00BD042D GetModuleHandleA,GetVersion,VirtualAlloc,FindCloseChangeNotification,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,FindCloseChangeNotification, | 4_2_00BD042D |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_00BD252F NtOpenSection, | 4_2_00BD252F |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_00BD2574 NtMapViewOfSection,FindCloseChangeNotification,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess, | 4_2_00BD2574 |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_00BD2477 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory, | 4_2_00BD2477 |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_00BD116F LoadLibraryA,GetModuleHandleA,NtCreateProcessEx,NtMapViewOfSection,NtQueryInformationToken,NtAdjustPrivilegesToken, | 4_2_00BD116F |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_00BD144A LookupPrivilegeValueA,NtAdjustPrivilegesToken, | 4_2_00BD144A |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_00BD24AE lstrcpyW,lstrlenW,NtCreateSection, | 4_2_00BD24AE |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_00BD339D NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile, | 4_2_00BD339D |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_00BD1422 LookupPrivilegeValueA,NtAdjustPrivilegesToken, | 4_2_00BD1422 |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_00BD3378 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile, | 4_2_00BD3378 |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_7FEA05F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle, | 4_2_7FEA05F2 |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_7FEA24AE lstrcpyW,lstrlenW,NtCreateSection, | 4_2_7FEA24AE |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_7FEA339D NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile, | 4_2_7FEA339D |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_7FEA3378 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile, | 4_2_7FEA3378 |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_7FEA2477 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory, | 4_2_7FEA2477 |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_7FEA2574 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess, | 4_2_7FEA2574 |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_7FEA144A LookupPrivilegeValueA,NtAdjustPrivilegesToken, | 4_2_7FEA144A |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_7FEA252F NtOpenSection, | 4_2_7FEA252F |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_7FEA042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle, | 4_2_7FEA042D |
Source: C:\Windows\mssecsvc.exe | Code function: 4_2_7FEA1422 LookupPrivilegeValueA,NtAdjustPrivilegesToken, | 4_2_7FEA1422 |
Source: C:\Windows\mssecsvc.exe | Code function: 9_2_00B905F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,FindCloseChangeNotification,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle, | 9_2_00B905F2 |
Source: C:\Windows\mssecsvc.exe | Code function: 9_2_00B9252F NtOpenSection, | 9_2_00B9252F |
Source: C:\Windows\mssecsvc.exe | Code function: 9_2_00B92574 NtMapViewOfSection,FindCloseChangeNotification,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess, | 9_2_00B92574 |
Source: C:\Windows\mssecsvc.exe | Code function: 9_2_00B92477 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory, | 9_2_00B92477 |
Source: C:\Windows\mssecsvc.exe | Code function: 9_2_00B9116F LoadLibraryA,GetModuleHandleA,NtCreateProcessEx,NtMapViewOfSection,NtQueryInformationToken,NtAdjustPrivilegesToken, | 9_2_00B9116F |
Source: C:\Windows\mssecsvc.exe | Code function: 9_2_00B9144A LookupPrivilegeValueA,NtAdjustPrivilegesToken, | 9_2_00B9144A |
Source: C:\Windows\mssecsvc.exe | Code function: 9_2_00B924AE lstrcpyW,lstrlenW,NtCreateSection, | 9_2_00B924AE |
Source: C:\Windows\mssecsvc.exe | Code function: 9_2_00B9339D NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile, | 9_2_00B9339D |
Source: C:\Windows\mssecsvc.exe | Code function: 9_2_00B9042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle, | 9_2_00B9042D |
Source: C:\Windows\mssecsvc.exe | Code function: 9_2_00B91422 LookupPrivilegeValueA,NtAdjustPrivilegesToken, | 9_2_00B91422 |
Source: C:\Windows\mssecsvc.exe | Code function: 9_2_00B93378 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile, | 9_2_00B93378 |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: (@vmicheartbeat |
Source: svchost.exe, 0000001B.00000000.530406338.0000029A9CAB5000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: (@Allow inbound TCP port 636 traffic for vmicheartbeatLMEMp |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: c-Licen"@vmicheartbeat-block-out |
Source: svchost.exe, 00000025.00000000.586250079.00000266A5B7E000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.17134</osVer><proc>x64</proc><lcid>en-US</lcid><geoId>244</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware7,1</deviceName></agent></connect>X |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *@vmicvss-block-out |
Source: svchost.exe, 0000001B.00000000.530406338.0000029A9CAB5000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: (@Allow outbound TCP traffic for vmicheartbeatLMEM` |
Source: svchost.exe, 00000013.00000000.441750757.0000013E23228000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000013.00000000.442234393.0000013E23228000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000013.00000002.923809237.0000013E23228000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.513098530.0000019689539000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000002.655370947.0000019689539000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000028.00000002.683534614.000002062A484000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000028.00000002.684248942.000002062A4EE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Block any other inbound traffic for vmicheartbeat |
Source: svchost.exe, 00000025.00000002.952494580.00000266A5B7E000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.17134</osVer><proc>x64</proc><lcid>en-US</lcid><geoId>244</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware7,1</deviceName></agent></connect>< |
Source: dwm.exe, 00000015.00000002.937197080.0000024126E20000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&1EC51BF7&0&000000 |
Source: svchost.exe, 0000001B.00000000.530406338.0000029A9CAB5000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *@Allow inbound TCP port 389 traffic for vmicheartbeatLMEMp |
Source: svchost.exe, 00000025.00000002.927632282.00000266A4FC0000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.17134</osVer><proc>x64</proc><lcid>en-US</lcid><geoId>244</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware7,1</deviceName></agent></connect> |
Source: svchost.exe, 00000014.00000002.915352448.000001E26D828000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000@ |
Source: svchost.exe, 00000025.00000002.919102052.00000266A4843000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.570612328.00000266A4843000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: (@Microsoft-Windows-Hyper-V-Hypervisor |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: "@vmicheartbeat |
Source: svchost.exe, 0000001E.00000002.925647945.0000018476029000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000_0r |
Source: svchost.exe, 00000012.00000002.935997567.0000023260A52000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: vmicshutdown |
Source: dwm.exe, 00000015.00000002.937197080.0000024126E20000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000/ |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: &@vmicheartbeat-allow-in-1 |
Source: svchost.exe, 00000012.00000000.432317240.000002325FE96000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&1EC51BF7&0&000000@a |
Source: svchost.exe, 0000001B.00000002.932879008.0000029A9C400000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: "@Block any outbound traffic for vmicshutdown |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: &@vmicshutdown |
Source: svchost.exe, 00000012.00000000.433024630.0000023260236000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: vmicvss |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: .@Allow inbound TCP port 389 traffic for vmicheartbeat |
Source: svchost.exe, 00000012.00000000.433024630.0000023260236000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: $@vmicshutdown |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: &@Allow inbound TCP port 636 traffic for vmicheartbeat |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: ,@vmicvss |
Source: svchost.exe, 00000025.00000000.583806432.00000266A5A00000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware |
Source: svchost.exe, 00000025.00000000.586250079.00000266A5B7E000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.17134</osVer><proc>x64</proc><lcid>en-US</lcid><geoId>244</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware7,1</deviceName></agent></connect>oso |
Source: svchost.exe, 00000014.00000002.916878109.000001E26D849000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: (@SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&1EC51BF7&0&000000 |
Source: svchost.exe, 00000025.00000002.952494580.00000266A5B7E000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.17134</osVer><proc>x64</proc><lcid>en-US</lcid><geoId>244</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware7,1</deviceName></agent></connect></conn |
Source: svchost.exe, 0000001B.00000002.932879008.0000029A9C400000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: (@Allow outbound TCP traffic for vmicheartbeat |
Source: svchost.exe, 00000025.00000000.586250079.00000266A5B7E000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.17134</osVer><proc>x64</proc><lcid>en-US</lcid><geoId>244</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware7,1</deviceName></agent></connect>c><lci |
Source: svchost.exe, 00000012.00000000.432317240.000002325FE96000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: vmicheartbeat |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: "@vmicvss-block-in |
Source: svchost.exe, 00000025.00000002.952494580.00000266A5B7E000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.17134</osVer><proc>x64</proc><lcid>en-US</lcid><geoId>244</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware7,1</deviceName></agent></connect>WNS 1 |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: ,@vmicshutdown-block-out |
Source: lsass.exe, 0000000A.00000000.406267729.0000020A0F082000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicvssNT SERVICE |
Source: backgroundTaskHost.exe, 00000018.00000002.655566709.0000019689548000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWpm |
Source: svchost.exe, 00000025.00000000.586250079.00000266A5B7E000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.17134</osVer><proc>x64</proc><lcid>en-US</lcid><geoId>244</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware7,1</deviceName></agent></connect>c><lc |
Source: backgroundTaskHost.exe, 00000018.00000000.488298108.0000019689548000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.470958836.0000019689548000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWMSAFD Tcpip [RAW/IPv6] |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: "&@Block any other outbound traffic for vmicheartbeat |
Source: svchost.exe, 0000001B.00000000.530406338.0000029A9CAB5000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @Allow outbound TCP traffic for vmicheartbeatLMEM` |
Source: svchost.exe, 00000012.00000000.432885126.0000023260213000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: (@vmicshutdown |
Source: svchost.exe, 00000025.00000000.575535498.00000266A5400000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk2.0NULLSCSI0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\4&2509f6e&0&00A8 |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: "@Block any outbound traffic for vmicvss |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: (@vmicheartbeat-allow-in-2 |
Source: mssecsvc.exe, 00000004.00000002.715152073.0000000000DC9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.473354431.0000000000D44000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.405855460.0000020A0F013000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000002.916543919.0000020A0F013000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000000A.00000000.408786696.0000020A0F013000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.914678495.000002EB37828000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.925395220.0000029A9B0B5000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001B.00000000.526064728.0000029A9B0B5000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001C.00000000.536167383.000001B5A282D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001C.00000002.915131423.000001B5A282D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001E.00000002.926192564.000001847603D000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: lsass.exe, 0000000A.00000000.406267729.0000020A0F082000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicshutdownNT SERVICE |
Source: svchost.exe, 00000012.00000000.433024630.0000023260236000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: $@vmicshutdowne |
Source: svchost.exe, 00000025.00000000.586250079.00000266A5B7E000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.17134</osVer><proc>x64</proc><lcid>en-US</lcid><geoId>244</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware7,1</deviceName></agent></connect>cat |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: .@vmicshutdown |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *@vmicshutdown-block-in |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: $@vmicheartbeat |
Source: svchost.exe, 0000001B.00000002.932879008.0000029A9C400000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *@Block any inbound traffic for vmicshutdown |
Source: svchost.exe, 00000025.00000002.919102052.00000266A4843000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.570612328.00000266A4843000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: $Microsoft-Windows-Hyper-V-Hypervisor |
Source: svchost.exe, 00000017.00000002.912583826.000002EB37802000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService |
Source: lsass.exe, 0000000A.00000000.406267729.0000020A0F082000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicheartbeatNT SERVICE |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *@vmicheartbeat-allow-out |
Source: svchost.exe, 0000001B.00000000.530406338.0000029A9CAB5000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @Allow inbound TCP port 389 traffic for vmicheartbeatLMEMp |
Source: backgroundTaskHost.exe, 00000018.00000002.653443453.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.482934202.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.502128636.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.512021088.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.478934256.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.517793482.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.469844015.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.492450987.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.506335861.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp, backgroundTaskHost.exe, 00000018.00000000.497685292.0000019687A9C000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW@ |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @vmicheartbeat-block-in |
Source: svchost.exe, 00000025.00000000.583806432.00000266A5A00000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: nonicVMware Virtual disk 2.0 NULL |
Source: svchost.exe, 00000012.00000000.433024630.0000023260236000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @vmicheartbeat |
Source: svchost.exe, 0000001B.00000000.527634222.0000029A9C426000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: &@Block any inbound traffic for vmicvss |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\winlogon.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\lsass.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\dwm.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\rgltVt target: unknown protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\whptVt target: C:\Windows\System32\winlogon.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\whptVt target: C:\Windows\System32\lsass.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\whptVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\whptVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\whptVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\whptVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\whptVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\whptVt target: C:\Windows\System32\svchost.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Section loaded: \BaseNamedObjects\whptVt target: C:\Windows\System32\dwm.exe protection: execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9A50 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9830 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA040 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F99D0 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA120 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9670 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9A50 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9830 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA040 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F99D0 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA120 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9670 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9A50 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9830 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA040 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F99D0 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA120 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9670 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9A50 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9830 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA040 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F99D0 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA120 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9670 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9A50 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9830 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA040 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F99D0 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA120 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9670 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9A50 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9830 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA040 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F99D0 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA120 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9670 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9A50 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9830 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA040 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F99D0 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA120 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9670 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9A50 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9830 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA040 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F99D0 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA120 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9670 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9A50 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9830 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA040 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F99D0 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA120 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9670 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9A50 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9830 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA040 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F99D0 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA120 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9670 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9A50 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9830 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA040 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F99D0 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA120 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9670 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9A50 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9830 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA040 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F99D0 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772FA120 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\mssecsvc.exe | Memory protected: unknown base: 772F9670 protect: page execute and read and write | Jump to behavior |