![]() ![]() " welcome to cryptostorm's member forums ~ you don't have to be a cryptostorm member to post here take a peek at our legendary cryptostorm_is twitter feed if you're into that kind of thing we're rolling out voodoo network security across cryptostorm - big things happening, indeed! " (Indicator: "twitter") "urlref_3978" has type "HTML document UTF-8 Unicode text with very long lines" "urlref_47_t_8544" has type "HTML document UTF-8 Unicode text with very long lines" "urlref_" has type "HTML document ASCII text" "AdobeFnt14.lst.2232" has type "PostScript document text" Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime) "iexplore.exe" loaded module "%WINDIR%\SYSTEM32\OLEAUT32.DLL" at base 760E0000 "iexplore.exe" loaded module "OLEAUT32.DLL" at base 760E0000 "iexplore.exe" loaded module "%WINDIR%\SYSTEM32\NPMPROXY.DLL" at base 70620000 "iexplore.exe" loaded module "RPCRTREMOTE.DLL" at base 75580000 "iexplore.exe" loaded module "%WINDIR%\SYSTEM32\RSAENH.DLL" at base 74DB0000 "iexplore.exe" loaded module "CRYPTSP.DLL" at base 75010000 "iexplore.exe" loaded module "ADVAPI32.DLL" at base 76190000 "iexplore.exe" loaded module "API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL" at base 76170000 "iexplore.exe" loaded module "%WINDIR%\SYSTEM32\NETPROFM.DLL" at base 70D60000 ![]() "iexplore.exe" loaded module "CLBCATQ.DLL" at base 75F70000 "iexplore.exe" loaded module "CRYPTBASE.DLL" at base 754E0000 "iexplore.exe" loaded module "OLE32.DLL" at base 75A30000 "iexplore.exe" loaded module "NTMARTA.DLL" at base 74B20000 "AcroRd32.exe" loaded module "ADOBEXMP.DLL" at base 6AAC0000 "AcroRd32.exe" loaded module "%WINDIR%\SYSTEM32\DAVCLNT.DLL" at base 6EF90000 "AcroRd32.exe" loaded module "%WINDIR%\SYSTEM32\NTLANMAN.DLL" at base 6F880000 "AcroRd32.exe" loaded module "%WINDIR%\SYSTEM32\DRPROV.DLL" at base 6FD10000 "iexplore.exe" wrote bytes "E9B9435EFC" to virtual address "0x75DC3B9B" wrote bytes "E9C20A7CFC" to virtual address "0x75DED274" wrote bytes "E96FF17AFC" to virtual address "0x75DFE9C9" wrote bytes "E937F27AFC" to virtual address "0x75DFE963" wrote bytes "E9E9F07AFC" to virtual address "0x75DFE9ED" Hook Detection relevance 10/10 "iexplore.exe" wrote bytes "E9EFB91EFE" to virtual address "0x743C388E" (part of module "COMCT元2.DLL") "iexplore.exe" wrote bytes "E99CF37AFC" to virtual address "0x75DFE869" wrote bytes "E92E0D7CFC" to virtual address "0x75DECF42" wrote bytes "E9B34B6CFC" to virtual address "0x75DAEC7C" wrote bytes "E954A17DFC" to virtual address "0x75DD3B7F" wrote bytes "E9FC7914FE" to virtual address "0x74467922" (part of module "COMCT元2.DLL") "iexplore.exe" wrote bytes "E9395446FC" to virtual address "0x761493FC" wrote bytes "E99AC38CFC" to virtual address "0x75CE2694" (part of module "COMDLG32.DLL") ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |