Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 51.103.213.187 |
Source: server.exe, 00000001.00000002.4124389201.0000000005CE0000.00000004.08000000.00040000.00000000.sdmp, server.exe, 00000001.00000002.4121788498.0000000002F61000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://DynDns.com |
Source: server.exe, 00000001.00000002.4121788498.0000000002F61000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://Paltalk.com |
Source: server.exe, 00000001.00000002.4124389201.0000000005CE0000.00000004.08000000.00040000.00000000.sdmp |
String found in binary or memory: http://Paltalk.com/Software |
Source: server.exe, 00000001.00000002.4124389201.0000000005CE0000.00000004.08000000.00040000.00000000.sdmp, server.exe, 00000001.00000002.4121788498.0000000002F61000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://Yahoo.com |
Source: njrat.exe, 00000000.00000002.1717863913.000000000071E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://go.micros |
Source: server.exe, 00000001.00000002.4121788498.0000000002F61000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://hotmail.com |
Source: server.exe, 00000001.00000002.4124389201.0000000005CE0000.00000004.08000000.00040000.00000000.sdmp |
String found in binary or memory: http://hotmail.com9Software |
Source: server.exe, 00000001.00000002.4124389201.0000000005CE0000.00000004.08000000.00040000.00000000.sdmp, server.exe, 00000001.00000002.4121788498.0000000002F61000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://no-ip.com |
Source: vbc.exe, 0000000B.00000002.2319099670.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
String found in binary or memory: http://securityxploded.com/browser-password-dump.php |
Source: server.exe, 00000001.00000002.4124389201.0000000005CE0000.00000004.08000000.00040000.00000000.sdmp, server.exe, 00000001.00000002.4121788498.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000B.00000002.2319063439.000000000019B000.00000004.00000010.00020000.00000000.sdmp, vbc.exe, 0000000B.00000002.2319290644.000000000064B000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 0000000B.00000002.2319099670.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
String found in binary or memory: http://www.SecurityXploded.com |
Source: server.exe, 00000001.00000002.4124389201.0000000005CE0000.00000004.08000000.00040000.00000000.sdmp, server.exe, 00000001.00000002.4121788498.0000000002F61000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.noip.com/ |
Source: server.exe, 00000001.00000002.4124389201.0000000005CE0000.00000004.08000000.00040000.00000000.sdmp, server.exe, 00000001.00000002.4121788498.0000000002F61000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.oovoo.com/?Encrypted |
Source: njrat.exe, 495a56e87a9043e1648a2f6d33cf682f.exe.1.dr, server.exe.0.dr |
String found in binary or memory: https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0 |
Source: njrat.exe, type: SAMPLE |
Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: njrat.exe, type: SAMPLE |
Matched rule: Identify njRat Author: Brian Wallace @botnet_hunter |
Source: njrat.exe, type: SAMPLE |
Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: 00000000.00000000.1653664845.0000000000152000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: 00000000.00000000.1653664845.0000000000152000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Identify njRat Author: Brian Wallace @botnet_hunter |
Source: C:\Windows\server.exe, type: DROPPED |
Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: C:\Windows\server.exe, type: DROPPED |
Matched rule: Identify njRat Author: Brian Wallace @botnet_hunter |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\495a56e87a9043e1648a2f6d33cf682f.exe, type: DROPPED |
Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\495a56e87a9043e1648a2f6d33cf682f.exe, type: DROPPED |
Matched rule: Identify njRat Author: Brian Wallace @botnet_hunter |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\495a56e87a9043e1648a2f6d33cf682f.exe, type: DROPPED |
Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Windows\server.exe, type: DROPPED |
Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: njrat.exe, type: SAMPLE |
Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: njrat.exe, type: SAMPLE |
Matched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net |
Source: njrat.exe, type: SAMPLE |
Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: 00000000.00000000.1653664845.0000000000152000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: 00000000.00000000.1653664845.0000000000152000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net |
Source: C:\Windows\server.exe, type: DROPPED |
Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: C:\Windows\server.exe, type: DROPPED |
Matched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\495a56e87a9043e1648a2f6d33cf682f.exe, type: DROPPED |
Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\495a56e87a9043e1648a2f6d33cf682f.exe, type: DROPPED |
Matched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\495a56e87a9043e1648a2f6d33cf682f.exe, type: DROPPED |
Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Windows\server.exe, type: DROPPED |
Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: vbc.exe, 0000000B.00000002.2319099670.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: vbc.exe, 0000000B.00000002.2319099670.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
Binary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger'); |
Source: vbc.exe, 0000000B.00000002.2319099670.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM ' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence'; |
Source: vbc.exe, 0000000B.00000002.2319099670.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
Binary or memory string: select * from logins where blacklisted_by_user=0; |
Source: vbc.exe, 0000000B.00000002.2319099670.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
Binary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s; |
Source: vbc.exe, 0000000B.00000002.2319099670.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
Binary or memory string: select * from moz_logins; |
Source: vbc.exe, 0000000B.00000002.2319099670.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM ' || quote(name) || ';'FROM sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0 |
Source: Login Data.11.dr |
Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: vbc.exe, 0000000B.00000002.2319099670.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
Binary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: shfolder.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: avicap32.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: msvfw32.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: windowscodecs.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: ifmon.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: mprapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: rasmontr.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: rasapi32.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: rasman.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: mfc42u.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: rasman.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: authfwcfg.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: fwpolicyiomgr.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: firewallapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: fwbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: dhcpcmonitor.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: dot3cfg.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: dot3api.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: onex.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: eappcfg.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: eappprxy.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: fwcfg.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: hnetmon.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: netshell.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: nlaapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: netsetupapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: netiohlp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: dhcpcsvc.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: nshhttp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: httpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: nshipsec.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: activeds.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: polstore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: winipsec.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: adsldpc.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: adsldpc.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: nshwfp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: cabinet.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: p2pnetsh.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: p2p.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: rpcnsh.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: whhelper.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: wlancfg.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: wlanapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: wshelper.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: wevtapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: peerdistsh.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: wcmapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: rmclient.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: mobilenetworking.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: ktmw32.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: mprmsg.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\server.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe |
Section loaded: vaultcli.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\njrat.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\server.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |