Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00844696 GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_00844696 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0084C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_0084C9C7 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0084C93C FindFirstFileW,FindClose, | 0_2_0084C93C |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0084F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0084F200 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0084F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0084F35D |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0084F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_0084F65E |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00843A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_00843A2B |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00843D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_00843D4E |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0084BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_0084BF27 |
Source: svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://aborters.duckdns.org:8081 |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://anotherarmy.dns.army:8081 |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://varders.kozow.com:8081 |
Source: svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org?q= |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005C3B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005C3B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005C3B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text= |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005C3B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:226546%0D%0ADate%20a |
Source: svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: svchost.exe, 00000001.00000003.1725164095.0000000006D45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: svchost.exe, 00000001.00000003.1725164095.0000000006D45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005CE7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=en |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005CE2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=enlB |
Source: svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: svchost.exe, 00000001.00000003.1725164095.0000000006D45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtabv209h |
Source: svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://gemini.google.com/app?q= |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005BA5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3766303344.0000000005C3B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3766303344.0000000005C14000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005BA5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005C14000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189 |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005C3B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3766303344.0000000005BCF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3766303344.0000000005C14000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$ |
Source: svchost.exe, 00000001.00000003.1725164095.0000000006D45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/v20 |
Source: svchost.exe, 00000001.00000003.1725164095.0000000006D45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005D18000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3766303344.0000000005D09000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/ |
Source: svchost.exe, 00000001.00000002.3766303344.0000000005D13000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/lB |
Source: 0.2.8JVG9KELay.exe.d70000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 00000000.00000002.1326810338.0000000000D70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000001.00000002.3764565909.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: Process Memory Space: svchost.exe PID: 8432, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_007EE800 | 0_2_007EE800 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0080DBB5 | 0_2_0080DBB5 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_007EFE40 | 0_2_007EFE40 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_007EE060 | 0_2_007EE060 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0086804A | 0_2_0086804A |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_007F4140 | 0_2_007F4140 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00802405 | 0_2_00802405 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00816522 | 0_2_00816522 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00860665 | 0_2_00860665 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0081267E | 0_2_0081267E |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_007F6843 | 0_2_007F6843 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0080283A | 0_2_0080283A |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_008189DF | 0_2_008189DF |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00816A94 | 0_2_00816A94 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00860AE2 | 0_2_00860AE2 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_007F8A0E | 0_2_007F8A0E |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0083EB07 | 0_2_0083EB07 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00848B13 | 0_2_00848B13 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0080CD61 | 0_2_0080CD61 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00817006 | 0_2_00817006 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_007F710E | 0_2_007F710E |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_007F3190 | 0_2_007F3190 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_007E1287 | 0_2_007E1287 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_008033C7 | 0_2_008033C7 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0080F419 | 0_2_0080F419 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_008016C4 | 0_2_008016C4 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_007F5680 | 0_2_007F5680 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_008078D3 | 0_2_008078D3 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_007F58C0 | 0_2_007F58C0 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00801BB8 | 0_2_00801BB8 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00819D05 | 0_2_00819D05 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00801FD0 | 0_2_00801FD0 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0080BFE6 | 0_2_0080BFE6 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_007D35E0 | 0_2_007D35E0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_00408C60 | 1_2_00408C60 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_0040DC11 | 1_2_0040DC11 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_00407C3F | 1_2_00407C3F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_00418CCC | 1_2_00418CCC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_00406CA0 | 1_2_00406CA0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_004028B0 | 1_2_004028B0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_0041A4BE | 1_2_0041A4BE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_00418244 | 1_2_00418244 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_00401650 | 1_2_00401650 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_00402F20 | 1_2_00402F20 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_004193C4 | 1_2_004193C4 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_00418788 | 1_2_00418788 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_00402F89 | 1_2_00402F89 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_00402B90 | 1_2_00402B90 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_004073A0 | 1_2_004073A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_053FD4EA | 1_2_053FD4EA |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_053FD7B8 | 1_2_053FD7B8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_053F7633 | 1_2_053F7633 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_053FC6BB | 1_2_053FC6BB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_053FD21B | 1_2_053FD21B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_053FCC6B | 1_2_053FCC6B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_053FCF30 | 1_2_053FCF30 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_053F2EF8 | 1_2_053F2EF8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_053F6EE8 | 1_2_053F6EE8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_053FEEE0 | 1_2_053FEEE0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_053FC993 | 1_2_053FC993 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_053F586F | 1_2_053F586F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_053F4311 | 1_2_053F4311 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_053F5880 | 1_2_053F5880 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_053FFBA8 | 1_2_053FFBA8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AE800 | 1_2_087AE800 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A5168 | 1_2_087A5168 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A9D68 | 1_2_087A9D68 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087ACDF0 | 1_2_087ACDF0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A9698 | 1_2_087A9698 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A9478 | 1_2_087A9478 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A1860 | 1_2_087A1860 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AEC58 | 1_2_087AEC58 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A1850 | 1_2_087A1850 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AEC49 | 1_2_087AEC49 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A0040 | 1_2_087A0040 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A0012 | 1_2_087A0012 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AF4F7 | 1_2_087AF4F7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A8CE0 | 1_2_087A8CE0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A8CDF | 1_2_087A8CDF |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AF0B0 | 1_2_087AF0B0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AF0A0 | 1_2_087AF0A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A5163 | 1_2_087A5163 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AF960 | 1_2_087AF960 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AF954 | 1_2_087AF954 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AF508 | 1_2_087AF508 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087ACDE0 | 1_2_087ACDE0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AD248 | 1_2_087AD248 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AD239 | 1_2_087AD239 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087ADAF8 | 1_2_087ADAF8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087ADAE8 | 1_2_087ADAE8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A26A0 | 1_2_087A26A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AD6A0 | 1_2_087AD6A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AD690 | 1_2_087AD690 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087ADF50 | 1_2_087ADF50 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087ADF3F | 1_2_087ADF3F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A0B30 | 1_2_087A0B30 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A0B20 | 1_2_087A0B20 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AE7F0 | 1_2_087AE7F0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A1FB8 | 1_2_087A1FB8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087A1FB3 | 1_2_087A1FB3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AE3A8 | 1_2_087AE3A8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_2_087AE39D | 1_2_087AE39D |
Source: 0.2.8JVG9KELay.exe.d70000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000000.00000002.1326810338.0000000000D70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000001.00000002.3764565909.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: Process Memory Space: svchost.exe PID: 8432, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599874 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599750 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599627 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599500 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599387 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599276 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599168 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599057 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598938 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598813 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598688 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598562 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598453 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598344 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598201 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598078 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597963 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597844 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597735 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597610 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597485 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597360 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597235 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597110 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596985 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596860 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596735 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596610 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596498 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596375 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596266 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596141 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596032 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595907 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595782 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595672 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595563 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595438 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595313 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595188 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595063 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594953 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594844 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594719 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594609 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594500 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594391 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594280 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594157 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep count: 31 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -28592453314249787s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8524 | Thread sleep count: 1585 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -599874s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8524 | Thread sleep count: 8248 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -599750s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -599627s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -599500s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -599387s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -599276s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -599168s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -599057s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -598938s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -598813s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -598688s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -598562s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -598453s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -598344s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -598201s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -598078s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -597963s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -597844s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -597735s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -597610s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -597485s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -597360s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -597235s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -597110s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -596985s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -596860s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -596735s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -596610s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -596498s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -596375s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -596266s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -596141s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -596032s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -595907s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -595782s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -595672s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -595563s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -595438s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -595313s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -595188s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -595063s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -594953s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -594844s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -594719s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -594609s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -594500s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -594391s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -594280s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe TID: 8520 | Thread sleep time: -594157s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00844696 GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_00844696 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0084C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_0084C9C7 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0084C93C FindFirstFileW,FindClose, | 0_2_0084C93C |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0084F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0084F200 |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0084F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0084F35D |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0084F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_0084F65E |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00843A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_00843A2B |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_00843D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_00843D4E |
Source: C:\Users\user\Desktop\8JVG9KELay.exe | Code function: 0_2_0084BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_0084BF27 |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599874 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599750 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599627 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599500 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599387 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599276 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599168 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 599057 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598938 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598813 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598688 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598562 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598453 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598344 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598201 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 598078 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597963 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597844 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597735 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597610 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597485 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597360 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597235 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 597110 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596985 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596860 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596735 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596610 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596498 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596375 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596266 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596141 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 596032 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595907 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595782 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595672 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595563 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595438 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595313 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595188 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 595063 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594953 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594844 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594719 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594609 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594500 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594391 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594280 | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Thread delayed: delay time: 594157 | Jump to behavior |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696428655] |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696428655d |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696428655u |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696428655o |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696428655t |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696428655] |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696428655d |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696428655x |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655x |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696428655f |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696428655t |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655} |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696428655t |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696428655u |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655} |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696428655j |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^ |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696428655} |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696428655} |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696428655t |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x |
Source: svchost.exe, 00000001.00000002.3764951839.000000000346B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696428655s |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655x |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~ |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696428655f |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696428655s |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696428655o |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696428655j |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^ |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696428655 |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~ |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h |
Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696428655x |