Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006C6CA9 GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_006C6CA9 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006C60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, | 0_2_006C60DD |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006C63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, | 0_2_006C63F9 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006CEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_006CEB60 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006CF56F FindFirstFileW,FindClose, | 0_2_006CF56F |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006CF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_006CF5FA |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006D1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_006D1B2F |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006D1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_006D1C8A |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006D1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_006D1F94 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DB6CA9 GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_00DB6CA9 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DB60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, | 2_2_00DB60DD |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DB63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, | 2_2_00DB63F9 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DBEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_00DBEB60 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DBF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 2_2_00DBF5FA |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DBF56F FindFirstFileW,FindClose, | 2_2_00DBF56F |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DC1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_00DC1B2F |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DC1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_00DC1C8A |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DC1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_00DC1F94 |
Source: RegSvcs.exe, 00000005.00000002.2335172794.000000000304B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3396205301.000000000333B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://mail.privateemail.com |
Source: RegSvcs.exe, 00000005.00000002.2335172794.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3396205301.00000000032E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: RegSvcs.exe, 00000005.00000002.2336361371.0000000003FE5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2334390218.0000000002C7F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2337231553.0000000005560000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2338131116.00000000056F0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://account.dyn.com/ |
Source: RegSvcs.exe, 00000005.00000002.2336361371.0000000003FE5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2334390218.0000000002C7F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2337231553.0000000005560000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2338131116.00000000056F0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2335172794.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3396205301.00000000032E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.org |
Source: RegSvcs.exe, 0000000B.00000002.3395099614.000000000149C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.org/ |
Source: RegSvcs.exe, 00000005.00000002.2333247848.000000000110C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.org/7 |
Source: RegSvcs.exe, 00000005.00000002.2333247848.0000000001179000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.org/f |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006EF7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 0_2_006EF7FF |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DDF7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 2_2_00DDF7FF |
Source: 9.2.juvenile.exe.3c30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 5.2.RegSvcs.exe.3fe6458.4.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 5.2.RegSvcs.exe.4033190.3.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 5.2.RegSvcs.exe.5560000.7.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 5.2.RegSvcs.exe.2cbf09e.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 5.2.RegSvcs.exe.5560ee8.6.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 5.2.RegSvcs.exe.2cbf09e.2.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 2.2.juvenile.exe.f20000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 5.2.RegSvcs.exe.5560ee8.6.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 5.2.RegSvcs.exe.3fe5570.5.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 4.2.juvenile.exe.3840000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 5.2.RegSvcs.exe.4033190.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 5.2.RegSvcs.exe.2cbff86.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 5.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 5.2.RegSvcs.exe.5560000.7.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 5.2.RegSvcs.exe.3fe5570.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.juvenile.exe.2080000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 5.2.RegSvcs.exe.2cbff86.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 5.2.RegSvcs.exe.56f0000.8.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 5.2.RegSvcs.exe.3fe6458.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 00000007.00000002.2303120094.0000000002080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000004.00000002.2202431029.0000000003840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000005.00000002.2337231553.0000000005560000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 00000005.00000002.2322641026.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000002.00000002.2175869516.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000009.00000002.2321963047.0000000003C30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000005.00000002.2338131116.00000000056F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: This is a third-party compiled AutoIt script. | 0_2_00683D19 |
Source: MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe, 00000000.00000002.2160211904.000000000072E000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_dfabc592-e |
Source: MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe, 00000000.00000002.2160211904.000000000072E000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: kSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_d82fe9f1-0 |
Source: MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe, 00000000.00000003.2155101697.00000000036DD000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_6f649583-9 |
Source: MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe, 00000000.00000003.2155101697.00000000036DD000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_692c9dd8-2 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: This is a third-party compiled AutoIt script. | 2_2_00D73D19 |
Source: juvenile.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: juvenile.exe, 00000002.00000002.2175750569.0000000000E1E000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_56674717-7 |
Source: juvenile.exe, 00000002.00000002.2175750569.0000000000E1E000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_5ab3fd78-5 |
Source: juvenile.exe, 00000004.00000000.2174988347.0000000000E1E000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_d8ce1cf1-a |
Source: juvenile.exe, 00000004.00000000.2174988347.0000000000E1E000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_17b70289-f |
Source: juvenile.exe, 00000007.00000000.2278497964.0000000000E1E000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_e1273130-7 |
Source: juvenile.exe, 00000007.00000000.2278497964.0000000000E1E000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_5b8b8653-3 |
Source: juvenile.exe, 00000009.00000000.2294737720.0000000000E1E000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_8c26c196-7 |
Source: juvenile.exe, 00000009.00000000.2294737720.0000000000E1E000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_975049a0-a |
Source: MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_20256902-1 |
Source: MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | String found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_20f96451-8 |
Source: juvenile.exe.0.dr | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_981e69f8-f |
Source: juvenile.exe.0.dr | String found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_120b9de9-b |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006AB043 | 0_2_006AB043 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_00693200 | 0_2_00693200 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_00693B70 | 0_2_00693B70 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006B410F | 0_2_006B410F |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006A02A4 | 0_2_006A02A4 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_0068E3E3 | 0_2_0068E3E3 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006B038E | 0_2_006B038E |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006B467F | 0_2_006B467F |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006A06D9 | 0_2_006A06D9 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006EAACE | 0_2_006EAACE |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006B4BEF | 0_2_006B4BEF |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006ACCC1 | 0_2_006ACCC1 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_0068AF50 | 0_2_0068AF50 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_00686F07 | 0_2_00686F07 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_0069B11F | 0_2_0069B11F |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006E31BC | 0_2_006E31BC |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006AD1B9 | 0_2_006AD1B9 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006B724D | 0_2_006B724D |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006A123A | 0_2_006A123A |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006893F0 | 0_2_006893F0 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006C13CA | 0_2_006C13CA |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_0069F563 | 0_2_0069F563 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006CB6CC | 0_2_006CB6CC |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006896C0 | 0_2_006896C0 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006EF7FF | 0_2_006EF7FF |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006877B0 | 0_2_006877B0 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006B79C9 | 0_2_006B79C9 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_0069FA57 | 0_2_0069FA57 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_00689B60 | 0_2_00689B60 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_00687D19 | 0_2_00687D19 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_0069FE6F | 0_2_0069FE6F |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006A9ED0 | 0_2_006A9ED0 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_00687FA3 | 0_2_00687FA3 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_00F06DF8 | 0_2_00F06DF8 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D9B043 | 2_2_00D9B043 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D83200 | 2_2_00D83200 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D83B70 | 2_2_00D83B70 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DA410F | 2_2_00DA410F |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D902A4 | 2_2_00D902A4 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DA038E | 2_2_00DA038E |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D7E3B0 | 2_2_00D7E3B0 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D906D9 | 2_2_00D906D9 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DA467F | 2_2_00DA467F |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DDAACE | 2_2_00DDAACE |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DA4BEF | 2_2_00DA4BEF |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D9CCC1 | 2_2_00D9CCC1 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D7AF50 | 2_2_00D7AF50 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D76F07 | 2_2_00D76F07 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D9D1B9 | 2_2_00D9D1B9 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DD31BC | 2_2_00DD31BC |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D8B11F | 2_2_00D8B11F |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DA724D | 2_2_00DA724D |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D9123A | 2_2_00D9123A |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DB13CA | 2_2_00DB13CA |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D793F0 | 2_2_00D793F0 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D8F563 | 2_2_00D8F563 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D796C0 | 2_2_00D796C0 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DBB6CC | 2_2_00DBB6CC |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DDF7FF | 2_2_00DDF7FF |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D777B0 | 2_2_00D777B0 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DA79C9 | 2_2_00DA79C9 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D8FA57 | 2_2_00D8FA57 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D79B60 | 2_2_00D79B60 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D77D19 | 2_2_00D77D19 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D99ED0 | 2_2_00D99ED0 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D8FE6F | 2_2_00D8FE6F |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D77FA3 | 2_2_00D77FA3 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_0121AC68 | 2_2_0121AC68 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 4_2_0110E500 | 4_2_0110E500 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_00408C60 | 5_2_00408C60 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_0040DC11 | 5_2_0040DC11 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_00407C3F | 5_2_00407C3F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_00418CCC | 5_2_00418CCC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_00406CA0 | 5_2_00406CA0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_004028B0 | 5_2_004028B0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_0041A4BE | 5_2_0041A4BE |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_00418244 | 5_2_00418244 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_00401650 | 5_2_00401650 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_00402F20 | 5_2_00402F20 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_004193C4 | 5_2_004193C4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_00418788 | 5_2_00418788 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_00402F89 | 5_2_00402F89 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_00402B90 | 5_2_00402B90 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_004073A0 | 5_2_004073A0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_02B0D8E0 | 5_2_02B0D8E0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_02B0CCC8 | 5_2_02B0CCC8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_02B00EE0 | 5_2_02B00EE0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_02B01030 | 5_2_02B01030 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_02B0D010 | 5_2_02B0D010 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_05C565A1 | 5_2_05C565A1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_05C5C5A8 | 5_2_05C5C5A8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_05C55E18 | 5_2_05C55E18 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_05C59098 | 5_2_05C59098 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_05C50040 | 5_2_05C50040 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_05C50006 | 5_2_05C50006 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_05C5F3DB | 5_2_05C5F3DB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_06D04E30 | 5_2_06D04E30 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_06D00040 | 5_2_06D00040 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_06D05DC8 | 5_2_06D05DC8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_06D0A338 | 5_2_06D0A338 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 5_2_06D01138 | 5_2_06D01138 |
Source: 9.2.juvenile.exe.3c30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 5.2.RegSvcs.exe.3fe6458.4.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 5.2.RegSvcs.exe.4033190.3.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 5.2.RegSvcs.exe.5560000.7.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 5.2.RegSvcs.exe.2cbf09e.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 5.2.RegSvcs.exe.5560ee8.6.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 5.2.RegSvcs.exe.2cbf09e.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 2.2.juvenile.exe.f20000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 5.2.RegSvcs.exe.5560ee8.6.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 5.2.RegSvcs.exe.3fe5570.5.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 4.2.juvenile.exe.3840000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 5.2.RegSvcs.exe.4033190.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 5.2.RegSvcs.exe.2cbff86.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 5.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 5.2.RegSvcs.exe.5560000.7.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 5.2.RegSvcs.exe.3fe5570.5.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.juvenile.exe.2080000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 5.2.RegSvcs.exe.2cbff86.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 5.2.RegSvcs.exe.56f0000.8.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 5.2.RegSvcs.exe.3fe6458.4.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 00000007.00000002.2303120094.0000000002080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000004.00000002.2202431029.0000000003840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000005.00000002.2337231553.0000000005560000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 00000005.00000002.2322641026.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000002.00000002.2175869516.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000009.00000002.2321963047.0000000003C30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000005.00000002.2338131116.00000000056F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 5.2.RegSvcs.exe.5560ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 5.2.RegSvcs.exe.5560ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 5.2.RegSvcs.exe.4033190.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 5.2.RegSvcs.exe.4033190.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, 4JJG6X.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, 4JJG6X.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, 8C78isHTVco.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, 8C78isHTVco.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, 8C78isHTVco.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, 8C78isHTVco.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: unknown | Process created: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe "C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe" | |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Process created: C:\Users\user\AppData\Local\cyclop\juvenile.exe "C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe" | |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe" | |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process created: C:\Users\user\AppData\Local\cyclop\juvenile.exe "C:\Users\user\AppData\Local\cyclop\juvenile.exe" | |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\cyclop\juvenile.exe" | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbs" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\user\AppData\Local\cyclop\juvenile.exe "C:\Users\user\AppData\Local\cyclop\juvenile.exe" | |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\cyclop\juvenile.exe" | |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process created: C:\Users\user\AppData\Local\cyclop\juvenile.exe "C:\Users\user\AppData\Local\cyclop\juvenile.exe" | |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\cyclop\juvenile.exe" | |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Process created: C:\Users\user\AppData\Local\cyclop\juvenile.exe "C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process created: C:\Users\user\AppData\Local\cyclop\juvenile.exe "C:\Users\user\AppData\Local\cyclop\juvenile.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\cyclop\juvenile.exe" | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\user\AppData\Local\cyclop\juvenile.exe "C:\Users\user\AppData\Local\cyclop\juvenile.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\cyclop\juvenile.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process created: C:\Users\user\AppData\Local\cyclop\juvenile.exe "C:\Users\user\AppData\Local\cyclop\juvenile.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\cyclop\juvenile.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Section loaded: wldp.dll | Jump to behavior |
Source: 5.2.RegSvcs.exe.5560ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs | High entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'yGItGSIT6n4pY', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB' |
Source: 5.2.RegSvcs.exe.4033190.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs | High entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'yGItGSIT6n4pY', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB' |
Source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs | High entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'yGItGSIT6n4pY', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB' |
Source: 5.2.RegSvcs.exe.2cbff86.1.raw.unpack, WP6RZJql8gZrNhVA9v.cs | High entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'yGItGSIT6n4pY', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB' |
Source: 5.2.RegSvcs.exe.3fe6458.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs | High entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'yGItGSIT6n4pY', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB' |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006E8111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 0_2_006E8111 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_0069EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 0_2_0069EB42 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DD8111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 2_2_00DD8111 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00D8EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 2_2_00D8EB42 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006C6CA9 GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_006C6CA9 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006C60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, | 0_2_006C60DD |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006C63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, | 0_2_006C63F9 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006CEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_006CEB60 |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006CF56F FindFirstFileW,FindClose, | 0_2_006CF56F |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006CF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_006CF5FA |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006D1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_006D1B2F |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006D1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_006D1C8A |
Source: C:\Users\user\Desktop\MVV ALIADO - S-REQ-19-00064 40ft 1x20.exe | Code function: 0_2_006D1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_006D1F94 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DB6CA9 GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_00DB6CA9 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DB60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, | 2_2_00DB60DD |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DB63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, | 2_2_00DB63F9 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DBEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_00DBEB60 |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DBF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 2_2_00DBF5FA |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DBF56F FindFirstFileW,FindClose, | 2_2_00DBF56F |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DC1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_00DC1B2F |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DC1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_00DC1C8A |
Source: C:\Users\user\AppData\Local\cyclop\juvenile.exe | Code function: 2_2_00DC1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_00DC1F94 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 100000 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99875 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99766 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99656 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99547 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99437 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99328 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99219 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99094 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 98984 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 100000 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99890 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99781 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99671 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99562 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99453 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99343 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99234 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 99124 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 98977 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 98797 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 98422 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 98312 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 98203 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 98093 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 97984 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 97874 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 97765 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 97656 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 97546 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 97437 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 97327 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 97218 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 97108 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 96999 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 96881 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 96750 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 96640 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 96531 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 96414 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 96281 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 96165 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 96047 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 95900 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 95732 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 95609 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 95500 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 95390 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 95281 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 95171 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 95062 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 94953 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 94843 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 94734 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 94625 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 94515 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 94406 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 94296 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 94187 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 94078 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 93968 | Jump to behavior |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe6458.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.4033190.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560000.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbf09e.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560ee8.6.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbf09e.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560ee8.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe5570.5.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.4033190.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbff86.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560000.7.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe5570.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbff86.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.56f0000.8.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe6458.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000005.00000002.2334390218.0000000002C7F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2335172794.0000000003045000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2336361371.0000000003FE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2337231553.0000000005560000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000B.00000002.3396205301.000000000330A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2335172794.000000000301A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2338131116.00000000056F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000B.00000002.3396205301.0000000003335000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: RegSvcs.exe PID: 2948, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RegSvcs.exe PID: 5676, type: MEMORYSTR |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe6458.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.4033190.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560000.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbf09e.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560ee8.6.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbf09e.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560ee8.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe5570.5.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.4033190.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbff86.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560000.7.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe5570.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbff86.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.56f0000.8.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe6458.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000005.00000002.2334390218.0000000002C7F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2336361371.0000000003FE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2337231553.0000000005560000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2338131116.00000000056F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe6458.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.4033190.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560000.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbf09e.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560ee8.6.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbf09e.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560ee8.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe5570.5.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.4033190.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbff86.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560000.7.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe5570.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbff86.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.56f0000.8.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe6458.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000005.00000002.2334390218.0000000002C7F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2336361371.0000000003FE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2337231553.0000000005560000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000B.00000002.3396205301.000000000330A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2335172794.000000000301A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2338131116.00000000056F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: RegSvcs.exe PID: 2948, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RegSvcs.exe PID: 5676, type: MEMORYSTR |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe6458.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.4033190.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560000.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbf09e.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560ee8.6.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbf09e.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560ee8.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe5570.5.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.4033190.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbff86.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560000.7.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe5570.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbff86.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.56f0000.8.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe6458.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000005.00000002.2334390218.0000000002C7F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2335172794.0000000003045000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2336361371.0000000003FE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2337231553.0000000005560000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000B.00000002.3396205301.000000000330A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2335172794.000000000301A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2338131116.00000000056F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000B.00000002.3396205301.0000000003335000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: RegSvcs.exe PID: 2948, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RegSvcs.exe PID: 5676, type: MEMORYSTR |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe6458.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.4033190.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560000.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbf09e.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560ee8.6.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbf09e.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560ee8.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe5570.5.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.4033190.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbff86.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.56f0000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.5560000.7.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe5570.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.2cbff86.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.56f0000.8.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.RegSvcs.exe.3fe6458.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000005.00000002.2334390218.0000000002C7F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2336361371.0000000003FE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2337231553.0000000005560000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.2338131116.00000000056F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |