Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005CDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_005CDBBE |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005D68EE FindFirstFileW,FindClose, | 0_2_005D68EE |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005D698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 0_2_005D698F |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005CD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_005CD076 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005CD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_005CD3A9 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005D9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_005D9642 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005D979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_005D979D |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005D9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 0_2_005D9B2B |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005D5C97 FindFirstFileW,FindNextFileW,FindClose, | 0_2_005D5C97 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0084DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 1_2_0084DBBE |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_008568EE FindFirstFileW,FindClose, | 1_2_008568EE |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0085698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 1_2_0085698F |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0084D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_0084D076 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0084D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_0084D3A9 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00859642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_00859642 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0085979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_0085979D |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00859B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 1_2_00859B2B |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00855C97 FindFirstFileW,FindNextFileW,FindClose, | 1_2_00855C97 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 2_2_0040928E |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 2_2_0041C322 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 2_2_0040C388 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 2_2_004096A0 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 2_2_00408847 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00407877 FindFirstFileW,FindNextFileW, | 2_2_00407877 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 2_2_0040BB6B |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 2_2_00419B86 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 2_2_0040BD72 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0327698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 3_2_0327698F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_032768EE FindFirstFileW,FindClose, | 3_2_032768EE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0326D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 3_2_0326D3A9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0326D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 3_2_0326D076 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0327979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 3_2_0327979D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03279642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 3_2_03279642 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03279B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 3_2_03279B2B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0326DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 3_2_0326DBBE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03275C97 FindFirstFileW,FindNextFileW,FindClose, | 3_2_03275C97 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 8_2_0040928E |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 8_2_0041C322 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 8_2_0040C388 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 8_2_004096A0 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 8_2_00408847 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00407877 FindFirstFileW,FindNextFileW, | 8_2_00407877 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 8_2_0040BB6B |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 8_2_00419B86 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 8_2_0040BD72 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005F9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 0_2_005F9576 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00879576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 1_2_00879576 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03299576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 3_2_03299576 |
Source: 8.2.RegAsymX.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 8.2.RegAsymX.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 8.2.RegAsymX.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 8.2.RegAsymX.exe.4130000.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 8.2.RegAsymX.exe.4130000.2.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 8.2.RegAsymX.exe.4130000.2.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 8.2.RegAsymX.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 8.2.RegAsymX.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 8.2.RegAsymX.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 8.2.RegAsymX.exe.4130000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 8.2.RegAsymX.exe.4130000.2.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 8.2.RegAsymX.exe.4130000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.RegAsymX.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.RegAsymX.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.RegAsymX.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 1.2.RegAsymX.exe.dd0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 1.2.RegAsymX.exe.dd0000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 1.2.RegAsymX.exe.dd0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.RegAsymX.exe.1040000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.RegAsymX.exe.1040000.2.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.RegAsymX.exe.1040000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.RegAsymX.exe.1040000.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.RegAsymX.exe.1040000.2.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.RegAsymX.exe.1040000.2.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 1.2.RegAsymX.exe.dd0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 1.2.RegAsymX.exe.dd0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 1.2.RegAsymX.exe.dd0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.RegAsymX.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.RegAsymX.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.RegAsymX.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000008.00000002.4144035421.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000008.00000002.4144035421.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000008.00000002.4144035421.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000002.00000002.4143842254.0000000001040000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000002.00000002.4143842254.0000000001040000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000002.00000002.4143842254.0000000001040000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000008.00000002.4143019501.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000008.00000002.4143019501.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000008.00000002.4143019501.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000002.00000002.4143167796.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000002.00000002.4143167796.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000002.00000002.4143167796.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000001.00000002.1695928275.0000000000DD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000001.00000002.1695928275.0000000000DD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000001.00000002.1695928275.0000000000DD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: Process Memory Space: RegAsymX.exe PID: 7564, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: RegAsymX.exe PID: 7608, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: RegAsymX.exe PID: 7936, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 3TpW2Sn68z.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: 3TpW2Sn68z.exe, 00000000.00000002.1682848717.0000000000622000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_814a09af-6 |
Source: 3TpW2Sn68z.exe, 00000000.00000002.1682848717.0000000000622000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_017a4c7f-1 |
Source: 3TpW2Sn68z.exe, 00000000.00000003.1681672618.0000000003DE1000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_deae4797-6 |
Source: 3TpW2Sn68z.exe, 00000000.00000003.1681672618.0000000003DE1000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_3ebbe7c7-3 |
Source: RegAsymX.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: RegAsymX.exe, 00000001.00000000.1681932970.00000000008A2000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_d894eeb2-c |
Source: RegAsymX.exe, 00000001.00000000.1681932970.00000000008A2000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_d93d97fc-5 |
Source: RegAsymX.exe, 00000002.00000002.4144768646.0000000003F72000.00000040.10000000.00040000.00000000.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_610698ee-5 |
Source: RegAsymX.exe, 00000002.00000002.4144768646.0000000003F72000.00000040.10000000.00040000.00000000.sdmp | String found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_69ad603f-e |
Source: RegAsymX.exe, 00000002.00000002.4144625611.0000000003DB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_7e079ba4-9 |
Source: RegAsymX.exe, 00000002.00000002.4144625611.0000000003DB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_bc41f37b-8 |
Source: RegAsymX.exe, 00000002.00000002.4143541171.00000000008A2000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_2f49fdef-1 |
Source: RegAsymX.exe, 00000002.00000002.4143541171.00000000008A2000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_5b8ae25b-2 |
Source: svchost.exe, 00000003.00000002.2005838898.00000000032C2000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_4b7a6453-9 |
Source: svchost.exe, 00000003.00000002.2005838898.00000000032C2000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_0407e11f-a |
Source: RegAsymX.exe, 00000008.00000000.1810224415.00000000008A2000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_7002a894-9 |
Source: RegAsymX.exe, 00000008.00000000.1810224415.00000000008A2000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_c4435ec3-3 |
Source: RegAsymX.exe, 00000008.00000002.4144091090.0000000004276000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_095845a4-a |
Source: RegAsymX.exe, 00000008.00000002.4144091090.0000000004276000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_f2a9c828-4 |
Source: 3TpW2Sn68z.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_959647dd-f |
Source: 3TpW2Sn68z.exe | String found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_745d09d1-8 |
Source: RegAsymX.exe.0.dr | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_2e2a7c22-2 |
Source: RegAsymX.exe.0.dr | String found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_2fc89a24-2 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError, | 2_2_0041812A |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0041330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle, | 2_2_0041330D |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0041BBC6 OpenProcess,NtResumeProcess,CloseHandle, | 2_2_0041BBC6 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0041BB9A OpenProcess,NtSuspendProcess,CloseHandle, | 2_2_0041BB9A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0329A2D7 NtdllDialogWndProc_W, | 3_2_0329A2D7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_032987B2 NtdllDialogWndProc_W,CallWindowProcW, | 3_2_032987B2 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03218BA4 NtdllDialogWndProc_W, | 3_2_03218BA4 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03298AAA NtdllDialogWndProc_W, | 3_2_03298AAA |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03298FC9 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W, | 3_2_03298FC9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03299380 NtdllDialogWndProc_W, | 3_2_03299380 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_032993CB NtdllDialogWndProc_W, | 3_2_032993CB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0329911E DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W, | 3_2_0329911E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03203170 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow, | 3_2_03203170 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03219052 NtdllDialogWndProc_W, | 3_2_03219052 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_032190A7 NtdllDialogWndProc_W, | 3_2_032190A7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_032990A1 SendMessageW,NtdllDialogWndProc_W, | 3_2_032990A1 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_032197C0 GetParent,NtdllDialogWndProc_W, | 3_2_032197C0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0329953A GetWindowLongW,NtdllDialogWndProc_W, | 3_2_0329953A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03299576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 3_2_03299576 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03299400 ClientToScreen,NtdllDialogWndProc_W, | 3_2_03299400 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0321997D NtdllDialogWndProc_W,GetSysColor,SetBkColor,NtdllDialogWndProc_W, | 3_2_0321997D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03299F86 GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W, | 3_2_03299F86 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03299E74 NtdllDialogWndProc_W, | 3_2_03299E74 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03299EF3 GetClientRect,GetCursorPos,ScreenToClient,NtdllDialogWndProc_W, | 3_2_03299EF3 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0041330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle, | 8_2_0041330D |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0041BBC6 OpenProcess,NtResumeProcess,CloseHandle, | 8_2_0041BBC6 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0041BB9A OpenProcess,NtSuspendProcess,CloseHandle, | 8_2_0041BB9A |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_0056BF40 | 0_2_0056BF40 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005D2046 | 0_2_005D2046 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_00568060 | 0_2_00568060 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005C8298 | 0_2_005C8298 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_0059E4FF | 0_2_0059E4FF |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_0059676B | 0_2_0059676B |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005F4873 | 0_2_005F4873 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_0056CAF0 | 0_2_0056CAF0 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_0058CAA0 | 0_2_0058CAA0 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_0057CC39 | 0_2_0057CC39 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_00596DD9 | 0_2_00596DD9 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_0057B119 | 0_2_0057B119 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005691C0 | 0_2_005691C0 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_00581394 | 0_2_00581394 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_00581706 | 0_2_00581706 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_0058781B | 0_2_0058781B |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_0057997D | 0_2_0057997D |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_00567920 | 0_2_00567920 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005819B0 | 0_2_005819B0 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_00587A4A | 0_2_00587A4A |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_00581C77 | 0_2_00581C77 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_00587CA7 | 0_2_00587CA7 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005EBE44 | 0_2_005EBE44 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_00599EEE | 0_2_00599EEE |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_00581F32 | 0_2_00581F32 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_02023660 | 0_2_02023660 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_007E8060 | 1_2_007E8060 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00852046 | 1_2_00852046 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00848298 | 1_2_00848298 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0081E4FF | 1_2_0081E4FF |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0081676B | 1_2_0081676B |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00874873 | 1_2_00874873 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0080CAA0 | 1_2_0080CAA0 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_007ECAF0 | 1_2_007ECAF0 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_007FCC39 | 1_2_007FCC39 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00816DD9 | 1_2_00816DD9 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_007FB119 | 1_2_007FB119 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_007E91C0 | 1_2_007E91C0 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00801394 | 1_2_00801394 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00801706 | 1_2_00801706 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0080781B | 1_2_0080781B |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_007F997D | 1_2_007F997D |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_008019B0 | 1_2_008019B0 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_007E7920 | 1_2_007E7920 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00807A4A | 1_2_00807A4A |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00807CA7 | 1_2_00807CA7 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00801C77 | 1_2_00801C77 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00819EEE | 1_2_00819EEE |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0086BE44 | 1_2_0086BE44 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00801F32 | 1_2_00801F32 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00603660 | 1_2_00603660 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0043706A | 2_2_0043706A |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00414005 | 2_2_00414005 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0043E11C | 2_2_0043E11C |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_004541D9 | 2_2_004541D9 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_004381E8 | 2_2_004381E8 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0041F18B | 2_2_0041F18B |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00446270 | 2_2_00446270 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0043E34B | 2_2_0043E34B |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_004533AB | 2_2_004533AB |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0042742E | 2_2_0042742E |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00437566 | 2_2_00437566 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0043E5A8 | 2_2_0043E5A8 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_004387F0 | 2_2_004387F0 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0043797E | 2_2_0043797E |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_004339D7 | 2_2_004339D7 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0044DA49 | 2_2_0044DA49 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00427AD7 | 2_2_00427AD7 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0041DBF3 | 2_2_0041DBF3 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00427C40 | 2_2_00427C40 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00437DB3 | 2_2_00437DB3 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00435EEB | 2_2_00435EEB |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0043DEED | 2_2_0043DEED |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00426E9F | 2_2_00426E9F |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_01033660 | 2_2_01033660 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03268298 | 3_2_03268298 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03208060 | 3_2_03208060 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03272046 | 3_2_03272046 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0323676B | 3_2_0323676B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0323E4FF | 3_2_0323E4FF |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0322CAA0 | 3_2_0322CAA0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0320CAF0 | 3_2_0320CAF0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03294873 | 3_2_03294873 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03236DD9 | 3_2_03236DD9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0321CC39 | 3_2_0321CC39 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03221394 | 3_2_03221394 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0321B119 | 3_2_0321B119 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_032091C0 | 3_2_032091C0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03221706 | 3_2_03221706 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03227A4A | 3_2_03227A4A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03207920 | 3_2_03207920 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0321997D | 3_2_0321997D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_032219B0 | 3_2_032219B0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0322781B | 3_2_0322781B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03221F32 | 3_2_03221F32 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0328BE44 | 3_2_0328BE44 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03239EEE | 3_2_03239EEE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03221C77 | 3_2_03221C77 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03227CA7 | 3_2_03227CA7 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0043706A | 8_2_0043706A |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00414005 | 8_2_00414005 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0043E11C | 8_2_0043E11C |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_004541D9 | 8_2_004541D9 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_004381E8 | 8_2_004381E8 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0041F18B | 8_2_0041F18B |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00446270 | 8_2_00446270 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0043E34B | 8_2_0043E34B |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_004533AB | 8_2_004533AB |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0042742E | 8_2_0042742E |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00437566 | 8_2_00437566 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0043E5A8 | 8_2_0043E5A8 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_004387F0 | 8_2_004387F0 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0043797E | 8_2_0043797E |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_004339D7 | 8_2_004339D7 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0044DA49 | 8_2_0044DA49 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00427AD7 | 8_2_00427AD7 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0041DBF3 | 8_2_0041DBF3 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00427C40 | 8_2_00427C40 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00437DB3 | 8_2_00437DB3 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00435EEB | 8_2_00435EEB |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0043DEED | 8_2_0043DEED |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00426E9F | 8_2_00426E9F |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_018A3660 | 8_2_018A3660 |
Source: 8.2.RegAsymX.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 8.2.RegAsymX.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.RegAsymX.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 8.2.RegAsymX.exe.4130000.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 8.2.RegAsymX.exe.4130000.2.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.RegAsymX.exe.4130000.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 8.2.RegAsymX.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 8.2.RegAsymX.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.RegAsymX.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 8.2.RegAsymX.exe.4130000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 8.2.RegAsymX.exe.4130000.2.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.RegAsymX.exe.4130000.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.RegAsymX.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.RegAsymX.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.RegAsymX.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 1.2.RegAsymX.exe.dd0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 1.2.RegAsymX.exe.dd0000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 1.2.RegAsymX.exe.dd0000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.RegAsymX.exe.1040000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.RegAsymX.exe.1040000.2.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.RegAsymX.exe.1040000.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.RegAsymX.exe.1040000.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.RegAsymX.exe.1040000.2.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.RegAsymX.exe.1040000.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 1.2.RegAsymX.exe.dd0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 1.2.RegAsymX.exe.dd0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 1.2.RegAsymX.exe.dd0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.RegAsymX.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.RegAsymX.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.RegAsymX.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000008.00000002.4144035421.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000008.00000002.4144035421.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000008.00000002.4144035421.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000002.00000002.4143842254.0000000001040000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000002.00000002.4143842254.0000000001040000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000002.00000002.4143842254.0000000001040000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000008.00000002.4143019501.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000008.00000002.4143019501.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000008.00000002.4143019501.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000002.00000002.4143167796.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000002.00000002.4143167796.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000002.00000002.4143167796.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000001.00000002.1695928275.0000000000DD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000001.00000002.1695928275.0000000000DD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000001.00000002.1695928275.0000000000DD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: Process Memory Space: RegAsymX.exe PID: 7564, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: RegAsymX.exe PID: 7608, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: RegAsymX.exe PID: 7936, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_0057F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 0_2_0057F98E |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005F1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 0_2_005F1C41 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_007FF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 1_2_007FF98E |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00871C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 1_2_00871C41 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0321F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 3_2_0321F98E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03291C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 3_2_03291C41 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005CDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_005CDBBE |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005D68EE FindFirstFileW,FindClose, | 0_2_005D68EE |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005D698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 0_2_005D698F |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005CD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_005CD076 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005CD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_005CD3A9 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005D9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_005D9642 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005D979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_005D979D |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005D9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 0_2_005D9B2B |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005D5C97 FindFirstFileW,FindNextFileW,FindClose, | 0_2_005D5C97 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0084DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 1_2_0084DBBE |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_008568EE FindFirstFileW,FindClose, | 1_2_008568EE |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0085698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 1_2_0085698F |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0084D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_0084D076 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0084D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_0084D3A9 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00859642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_00859642 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0085979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_0085979D |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00859B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 1_2_00859B2B |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00855C97 FindFirstFileW,FindNextFileW,FindClose, | 1_2_00855C97 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 2_2_0040928E |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 2_2_0041C322 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 2_2_0040C388 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 2_2_004096A0 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 2_2_00408847 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00407877 FindFirstFileW,FindNextFileW, | 2_2_00407877 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 2_2_0040BB6B |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 2_2_00419B86 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 2_2_0040BD72 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0327698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 3_2_0327698F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_032768EE FindFirstFileW,FindClose, | 3_2_032768EE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0326D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 3_2_0326D3A9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0326D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 3_2_0326D076 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0327979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 3_2_0327979D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03279642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 3_2_03279642 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03279B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 3_2_03279B2B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0326DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 3_2_0326DBBE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03275C97 FindFirstFileW,FindNextFileW,FindClose, | 3_2_03275C97 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 8_2_0040928E |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 8_2_0041C322 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 8_2_0040C388 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 8_2_004096A0 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 8_2_00408847 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00407877 FindFirstFileW,FindNextFileW, | 8_2_00407877 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 8_2_0040BB6B |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 8_2_00419B86 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 8_2_0040BD72 |
Source: Amcache.hve.6.dr | Binary or memory string: VMware |
Source: Amcache.hve.6.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.6.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.6.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.6.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.6.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.6.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.6.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: RegAsymX.exe, 00000002.00000002.4144358556.0000000001346000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll81 |
Source: Amcache.hve.6.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.6.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.6.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.6.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.6.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.6.dr | Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0 |
Source: Amcache.hve.6.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.6.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.6.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.6.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.6.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.6.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.6.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.6.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.6.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.6.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.6.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.6.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.6.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.6.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.6.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_00584CE8 mov eax, dword ptr fs:[00000030h] | 0_2_00584CE8 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_020234F0 mov eax, dword ptr fs:[00000030h] | 0_2_020234F0 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_02023550 mov eax, dword ptr fs:[00000030h] | 0_2_02023550 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_02021E7E mov eax, dword ptr fs:[00000030h] | 0_2_02021E7E |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_02021E90 mov eax, dword ptr fs:[00000030h] | 0_2_02021E90 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00804CE8 mov eax, dword ptr fs:[00000030h] | 1_2_00804CE8 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_006034F0 mov eax, dword ptr fs:[00000030h] | 1_2_006034F0 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00603550 mov eax, dword ptr fs:[00000030h] | 1_2_00603550 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00601E7E mov eax, dword ptr fs:[00000030h] | 1_2_00601E7E |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00601E90 mov eax, dword ptr fs:[00000030h] | 1_2_00601E90 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00443355 mov eax, dword ptr fs:[00000030h] | 2_2_00443355 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_01033550 mov eax, dword ptr fs:[00000030h] | 2_2_01033550 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_010334F0 mov eax, dword ptr fs:[00000030h] | 2_2_010334F0 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_01031E7E mov eax, dword ptr fs:[00000030h] | 2_2_01031E7E |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_01031E90 mov eax, dword ptr fs:[00000030h] | 2_2_01031E90 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03224CE8 mov eax, dword ptr fs:[00000030h] | 3_2_03224CE8 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00443355 mov eax, dword ptr fs:[00000030h] | 8_2_00443355 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_018A3550 mov eax, dword ptr fs:[00000030h] | 8_2_018A3550 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_018A34F0 mov eax, dword ptr fs:[00000030h] | 8_2_018A34F0 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_018A1E90 mov eax, dword ptr fs:[00000030h] | 8_2_018A1E90 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_018A1E7E mov eax, dword ptr fs:[00000030h] | 8_2_018A1E7E |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_00592622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00592622 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_0058083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_0058083F |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_005809D5 SetUnhandledExceptionFilter, | 0_2_005809D5 |
Source: C:\Users\user\Desktop\3TpW2Sn68z.exe | Code function: 0_2_00580C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 0_2_00580C21 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00812622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 1_2_00812622 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_0080083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 1_2_0080083F |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_008009D5 SetUnhandledExceptionFilter, | 1_2_008009D5 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 1_2_00800C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 1_2_00800C21 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 2_2_0043503C |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 2_2_00434A8A |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 2_2_0043BB71 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 2_2_00434BD8 SetUnhandledExceptionFilter, | 2_2_00434BD8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03232622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_03232622 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_032209D5 SetUnhandledExceptionFilter, | 3_2_032209D5 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0322083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_0322083F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_03220C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 3_2_03220C21 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 8_2_0043503C |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 8_2_00434A8A |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 8_2_0043BB71 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: 8_2_00434BD8 SetUnhandledExceptionFilter, | 8_2_00434BD8 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: EnumSystemLocalesW, | 2_2_0045201B |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: EnumSystemLocalesW, | 2_2_004520B6 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 2_2_00452143 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: GetLocaleInfoW, | 2_2_00452393 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: EnumSystemLocalesW, | 2_2_00448484 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 2_2_004524BC |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: GetLocaleInfoW, | 2_2_004525C3 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 2_2_00452690 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: GetLocaleInfoW, | 2_2_0044896D |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: GetLocaleInfoA, | 2_2_0040F90C |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 2_2_00451D58 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: EnumSystemLocalesW, | 2_2_00451FD0 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: EnumSystemLocalesW, | 8_2_0045201B |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: EnumSystemLocalesW, | 8_2_004520B6 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 8_2_00452143 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: GetLocaleInfoW, | 8_2_00452393 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: EnumSystemLocalesW, | 8_2_00448484 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 8_2_004524BC |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: GetLocaleInfoW, | 8_2_004525C3 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 8_2_00452690 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: GetLocaleInfoW, | 8_2_0044896D |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: GetLocaleInfoA, | 8_2_0040F90C |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 8_2_00451D58 |
Source: C:\Users\user\AppData\Local\directory\RegAsymX.exe | Code function: EnumSystemLocalesW, | 8_2_00451FD0 |