Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CD4696 GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_00CD4696 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CDC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_00CDC9C7 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CDC93C FindFirstFileW,FindClose, | 0_2_00CDC93C |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CDF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00CDF200 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CDF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00CDF35D |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CDF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_00CDF65E |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CD3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_00CD3A2B |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CD3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_00CD3D4E |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CDBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_00CDBF27 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00084696 GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_00084696 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0008C93C FindFirstFileW,FindClose, | 2_2_0008C93C |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0008C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 2_2_0008C9C7 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0008F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0008F200 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0008F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0008F35D |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0008F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0008F65E |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00083A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00083A2B |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00083D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00083D4E |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0008BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0008BF27 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 5_2_0040C388 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 5_2_0040928E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 5_2_0041C322 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 5_2_004096A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 5_2_00408847 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00407877 FindFirstFileW,FindNextFileW, | 5_2_00407877 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0044E8F9 FindFirstFileExA, | 5_2_0044E8F9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 5_2_0040BB6B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 5_2_00419B86 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 5_2_0040BD72 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 12_2_0040928E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 12_2_0041C322 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 12_2_0040C388 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 12_2_004096A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 12_2_00408847 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_00407877 FindFirstFileW,FindNextFileW, | 12_2_00407877 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0044E8F9 FindFirstFileExA, | 12_2_0044E8F9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 12_2_0040BB6B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 12_2_00419B86 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 12_2_0040BD72 |
Source: 12.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 12.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 12.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 11.2.name.exe.36c0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 11.2.name.exe.36c0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 11.2.name.exe.36c0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.name.exe.3f80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.name.exe.3f80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.name.exe.3f80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 4.2.name.exe.36b0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 4.2.name.exe.36b0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 4.2.name.exe.36b0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 12.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 12.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 12.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 4.2.name.exe.36b0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 4.2.name.exe.36b0000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 4.2.name.exe.36b0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 11.2.name.exe.36c0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 11.2.name.exe.36c0000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 11.2.name.exe.36c0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.name.exe.3f80000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.name.exe.3f80000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.name.exe.3f80000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000005.00000002.2347910354.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000005.00000002.2347910354.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000005.00000002.2347910354.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000004.00000002.2055858818.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000004.00000002.2055858818.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000004.00000002.2055858818.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0000000C.00000002.2181096608.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0000000C.00000002.2181096608.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0000000C.00000002.2181096608.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000002.00000002.2040296471.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000002.00000002.2040296471.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000002.00000002.2040296471.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0000000B.00000002.2182098787.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0000000B.00000002.2182098787.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0000000B.00000002.2182098787.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: Process Memory Space: name.exe PID: 6176, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: name.exe PID: 6364, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: svchost.exe PID: 3712, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: name.exe PID: 4160, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: svchost.exe PID: 6548, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C73633 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow, | 0_2_00C73633 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFC27C ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W, | 0_2_00CFC27C |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFC220 NtdllDialogWndProc_W, | 0_2_00CFC220 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFC49C PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W, | 0_2_00CFC49C |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFC788 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W, | 0_2_00CFC788 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFC8EE DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W, | 0_2_00CFC8EE |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFC86D SendMessageW,NtdllDialogWndProc_W, | 0_2_00CFC86D |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFCBF9 NtdllDialogWndProc_W, | 0_2_00CFCBF9 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFCBAE NtdllDialogWndProc_W, | 0_2_00CFCBAE |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFCB50 NtdllDialogWndProc_W, | 0_2_00CFCB50 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFCB7F NtdllDialogWndProc_W, | 0_2_00CFCB7F |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFCC2E ClientToScreen,NtdllDialogWndProc_W, | 0_2_00CFCC2E |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFCDAC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 0_2_00CFCDAC |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFCD6C GetWindowLongW,NtdllDialogWndProc_W, | 0_2_00CFCD6C |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C71287 NtdllDialogWndProc_W,GetSysColor,SetBkColor,745AC8D0,NtdllDialogWndProc_W, | 0_2_00C71287 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C71290 NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient, | 0_2_00C71290 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFD6C6 NtdllDialogWndProc_W, | 0_2_00CFD6C6 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C716DE GetParent,NtdllDialogWndProc_W, | 0_2_00C716DE |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C716B5 NtdllDialogWndProc_W, | 0_2_00C716B5 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7167D NtdllDialogWndProc_W, | 0_2_00C7167D |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFD74C GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W, | 0_2_00CFD74C |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7189B NtdllDialogWndProc_W, | 0_2_00C7189B |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFDA9A NtdllDialogWndProc_W, | 0_2_00CFDA9A |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFBF4D NtdllDialogWndProc_W,CallWindowProcW, | 0_2_00CFBF4D |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00023633 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow, | 2_2_00023633 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000AC220 NtdllDialogWndProc_W, | 2_2_000AC220 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000AC27C ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W, | 2_2_000AC27C |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000AC49C PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W, | 2_2_000AC49C |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000AC788 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W, | 2_2_000AC788 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000AC86D SendMessageW,NtdllDialogWndProc_W, | 2_2_000AC86D |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000AC8EE DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W, | 2_2_000AC8EE |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000ACB50 NtdllDialogWndProc_W, | 2_2_000ACB50 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000ACB7F NtdllDialogWndProc_W, | 2_2_000ACB7F |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000ACBAE NtdllDialogWndProc_W, | 2_2_000ACBAE |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000ACBF9 NtdllDialogWndProc_W, | 2_2_000ACBF9 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000ACC2E ClientToScreen,NtdllDialogWndProc_W, | 2_2_000ACC2E |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000ACD6C GetWindowLongW,NtdllDialogWndProc_W, | 2_2_000ACD6C |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000ACDAC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 2_2_000ACDAC |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00021287 NtdllDialogWndProc_W,GetSysColor,SetBkColor,745AC8D0,NtdllDialogWndProc_W, | 2_2_00021287 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00021290 NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient, | 2_2_00021290 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0002167D NtdllDialogWndProc_W, | 2_2_0002167D |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000216B5 NtdllDialogWndProc_W, | 2_2_000216B5 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000AD6C6 NtdllDialogWndProc_W, | 2_2_000AD6C6 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000216DE GetParent,NtdllDialogWndProc_W, | 2_2_000216DE |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000AD74C GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W, | 2_2_000AD74C |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0002189B NtdllDialogWndProc_W, | 2_2_0002189B |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000ADA9A NtdllDialogWndProc_W, | 2_2_000ADA9A |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000ABF4D NtdllDialogWndProc_W,CallWindowProcW, | 2_2_000ABF4D |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7E800 | 0_2_00C7E800 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C9DBB5 | 0_2_00C9DBB5 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7FE40 | 0_2_00C7FE40 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CF804A | 0_2_00CF804A |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7E060 | 0_2_00C7E060 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C84140 | 0_2_00C84140 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C92405 | 0_2_00C92405 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CA6522 | 0_2_00CA6522 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CF0665 | 0_2_00CF0665 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CA267E | 0_2_00CA267E |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C86843 | 0_2_00C86843 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C9283A | 0_2_00C9283A |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CA89DF | 0_2_00CA89DF |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CF0AE2 | 0_2_00CF0AE2 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CA6A94 | 0_2_00CA6A94 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C88A0E | 0_2_00C88A0E |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CCEB07 | 0_2_00CCEB07 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CD8B13 | 0_2_00CD8B13 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C9CD61 | 0_2_00C9CD61 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CA7006 | 0_2_00CA7006 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C83190 | 0_2_00C83190 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C8710E | 0_2_00C8710E |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C71287 | 0_2_00C71287 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C933C7 | 0_2_00C933C7 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C9F419 | 0_2_00C9F419 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C916C4 | 0_2_00C916C4 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C85680 | 0_2_00C85680 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C858C0 | 0_2_00C858C0 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C978D3 | 0_2_00C978D3 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C91BB8 | 0_2_00C91BB8 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CA9D05 | 0_2_00CA9D05 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C91FD0 | 0_2_00C91FD0 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C9BFE6 | 0_2_00C9BFE6 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_03143650 | 0_2_03143650 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0002E800 | 2_2_0002E800 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0004DBB5 | 2_2_0004DBB5 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0002FE40 | 2_2_0002FE40 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000A804A | 2_2_000A804A |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0002E060 | 2_2_0002E060 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00034140 | 2_2_00034140 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00042405 | 2_2_00042405 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00056522 | 2_2_00056522 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000A0665 | 2_2_000A0665 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0005267E | 2_2_0005267E |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0004283A | 2_2_0004283A |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00036843 | 2_2_00036843 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000589DF | 2_2_000589DF |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00038A0E | 2_2_00038A0E |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00056A94 | 2_2_00056A94 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000A0AE2 | 2_2_000A0AE2 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0007EB07 | 2_2_0007EB07 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00088B13 | 2_2_00088B13 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0004CD61 | 2_2_0004CD61 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00057006 | 2_2_00057006 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0003710E | 2_2_0003710E |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00033190 | 2_2_00033190 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00021287 | 2_2_00021287 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000433C7 | 2_2_000433C7 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0004F419 | 2_2_0004F419 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00035680 | 2_2_00035680 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000416C4 | 2_2_000416C4 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000358C0 | 2_2_000358C0 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000478D3 | 2_2_000478D3 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00041BB8 | 2_2_00041BB8 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00059D05 | 2_2_00059D05 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00041FD0 | 2_2_00041FD0 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0004BFE6 | 2_2_0004BFE6 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_03F73650 | 2_2_03F73650 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 4_2_00D33650 | 4_2_00D33650 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0043706A | 5_2_0043706A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00414005 | 5_2_00414005 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0043E11C | 5_2_0043E11C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_004541D9 | 5_2_004541D9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_004381E8 | 5_2_004381E8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0041F18B | 5_2_0041F18B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00446270 | 5_2_00446270 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0043E34B | 5_2_0043E34B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_004533AB | 5_2_004533AB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0042742E | 5_2_0042742E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00437566 | 5_2_00437566 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0043E5A8 | 5_2_0043E5A8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_004387F0 | 5_2_004387F0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0043797E | 5_2_0043797E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_004339D7 | 5_2_004339D7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0044DA49 | 5_2_0044DA49 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00427AD7 | 5_2_00427AD7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0041DBF3 | 5_2_0041DBF3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00427C40 | 5_2_00427C40 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00437DB3 | 5_2_00437DB3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00435EEB | 5_2_00435EEB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0043DEED | 5_2_0043DEED |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00426E9F | 5_2_00426E9F |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 11_2_03263650 | 11_2_03263650 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0043706A | 12_2_0043706A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_00414005 | 12_2_00414005 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0043E11C | 12_2_0043E11C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_004541D9 | 12_2_004541D9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_004381E8 | 12_2_004381E8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0041F18B | 12_2_0041F18B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_00446270 | 12_2_00446270 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0043E34B | 12_2_0043E34B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_004533AB | 12_2_004533AB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0042742E | 12_2_0042742E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_00437566 | 12_2_00437566 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0043E5A8 | 12_2_0043E5A8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_004387F0 | 12_2_004387F0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0043797E | 12_2_0043797E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_004339D7 | 12_2_004339D7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0044DA49 | 12_2_0044DA49 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_00427AD7 | 12_2_00427AD7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0041DBF3 | 12_2_0041DBF3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_00427C40 | 12_2_00427C40 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_00437DB3 | 12_2_00437DB3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_00435EEB | 12_2_00435EEB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0043DEED | 12_2_0043DEED |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_00426E9F | 12_2_00426E9F |
Source: 12.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 12.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 12.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 11.2.name.exe.36c0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 11.2.name.exe.36c0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 11.2.name.exe.36c0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.name.exe.3f80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.name.exe.3f80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.name.exe.3f80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 4.2.name.exe.36b0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 4.2.name.exe.36b0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 4.2.name.exe.36b0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 12.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 12.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 12.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 4.2.name.exe.36b0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 4.2.name.exe.36b0000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 4.2.name.exe.36b0000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 11.2.name.exe.36c0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 11.2.name.exe.36c0000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 11.2.name.exe.36c0000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.name.exe.3f80000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.name.exe.3f80000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.name.exe.3f80000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000005.00000002.2347910354.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000005.00000002.2347910354.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000005.00000002.2347910354.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000004.00000002.2055858818.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000004.00000002.2055858818.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000004.00000002.2055858818.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0000000C.00000002.2181096608.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0000000C.00000002.2181096608.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0000000C.00000002.2181096608.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000002.00000002.2040296471.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000002.00000002.2040296471.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000002.00000002.2040296471.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0000000B.00000002.2182098787.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0000000B.00000002.2182098787.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0000000B.00000002.2182098787.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: Process Memory Space: name.exe PID: 6176, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: name.exe PID: 6364, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: svchost.exe PID: 3712, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: name.exe PID: 4160, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: svchost.exe PID: 6548, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CC0181 pushfd ; retf | 0_2_00CC0195 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CC019E pushfd ; retf | 0_2_00CC01A5 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CC01AE pushfd ; retf | 0_2_00CC01B1 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CC01A6 pushfd ; retf | 0_2_00CC01AD |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CC02AB push FFFFFFC0h; retf | 0_2_00CC02AD |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7C946 push ds; retf | 0_2_00C7C949 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7C94C push ds; retf | 0_2_00C7C94D |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7C950 push ds; retf | 0_2_00C7C951 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7C927 push ds; retf | 0_2_00C7C929 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7C937 push ds; retf | 0_2_00C7C93D |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7C934 push ds; retf | 0_2_00C7C935 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7C93F push ds; retf | 0_2_00C7C945 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C80A68 push eax; retf | 0_2_00C80A69 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C80A64 push eax; retf | 0_2_00C80A65 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C80A3B push eax; retf | 0_2_00C80A41 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C98B85 push ecx; ret | 0_2_00C98B98 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7B740 push es; retf | 0_2_00C7B75A |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7B88B push cs; retf | 0_2_00C7B892 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7B889 push cs; retf | 0_2_00C7B88A |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7B894 push cs; retf | 0_2_00C7B89A |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CFF848 pushfd ; iretd | 0_2_00CFF84E |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00C7B83B push cs; retf | 0_2_00C7B872 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CB1A9A push ss; retf | 0_2_00CB1A9C |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CB1A9D push ss; retf | 0_2_00CB1AA0 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CB1AA2 push ss; retf | 0_2_00CB1AAC |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0002C590 push eax; retn 0002h | 2_2_0002C599 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00048B85 push ecx; ret | 2_2_00048B98 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_000AF84D pushfd ; iretd | 2_2_000AF84E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00457186 push ecx; ret | 5_2_00457199 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0045E55D push esi; ret | 5_2_0045E566 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00457AA8 push eax; ret | 5_2_00457AC6 |
Source: C:\Users\user\Desktop\jv4ri.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\directory\name.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CD4696 GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_00CD4696 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CDC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_00CDC9C7 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CDC93C FindFirstFileW,FindClose, | 0_2_00CDC93C |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CDF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00CDF200 |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CDF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00CDF35D |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CDF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_00CDF65E |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CD3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_00CD3A2B |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CD3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_00CD3D4E |
Source: C:\Users\user\Desktop\jv4ri.exe | Code function: 0_2_00CDBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_00CDBF27 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00084696 GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_00084696 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0008C93C FindFirstFileW,FindClose, | 2_2_0008C93C |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0008C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 2_2_0008C9C7 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0008F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0008F200 |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0008F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0008F35D |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0008F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0008F65E |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00083A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00083A2B |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_00083D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00083D4E |
Source: C:\Users\user\AppData\Local\directory\name.exe | Code function: 2_2_0008BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0008BF27 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 5_2_0040C388 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 5_2_0040928E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 5_2_0041C322 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 5_2_004096A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 5_2_00408847 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00407877 FindFirstFileW,FindNextFileW, | 5_2_00407877 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0044E8F9 FindFirstFileExA, | 5_2_0044E8F9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 5_2_0040BB6B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 5_2_00419B86 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 5_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 5_2_0040BD72 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 12_2_0040928E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 12_2_0041C322 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 12_2_0040C388 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 12_2_004096A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 12_2_00408847 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_00407877 FindFirstFileW,FindNextFileW, | 12_2_00407877 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0044E8F9 FindFirstFileExA, | 12_2_0044E8F9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 12_2_0040BB6B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 12_2_00419B86 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 12_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 12_2_0040BD72 |
Source: Amcache.hve.8.dr | Binary or memory string: VMware |
Source: Amcache.hve.8.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.8.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.8.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.8.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.8.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.8.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.8.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.8.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.8.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.8.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.8.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: svchost.exe, 00000005.00000002.2348445947.0000000003412000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: Amcache.hve.8.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.8.dr | Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0 |
Source: Amcache.hve.8.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.8.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.8.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.8.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.8.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.8.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.8.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.8.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.8.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.8.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.8.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.8.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.8.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.8.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.8.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoA, | 5_2_0040F90C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 5_2_0045201B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 5_2_004520B6 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 5_2_00452143 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 5_2_00452393 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 5_2_00448484 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 5_2_004524BC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 5_2_004525C3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 5_2_00452690 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 5_2_0044896D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 5_2_00451D58 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 5_2_00451FD0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 12_2_0045201B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 12_2_004520B6 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 12_2_00452143 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 12_2_00452393 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 12_2_00448484 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 12_2_004524BC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 12_2_004525C3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 12_2_00452690 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 12_2_0044896D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoA, | 12_2_0040F90C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 12_2_00451D58 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 12_2_00451FD0 |